From 3392200e2c844710a2d1b6d9c9942c8b9769f71e Mon Sep 17 00:00:00 2001 From: Andrew Jewell <107044381+ajewellamz@users.noreply.github.com> Date: Mon, 3 Feb 2025 14:16:31 -0500 Subject: [PATCH] chore: release Rust 1.0.0 (#1612) --- .github/workflows/ci_todos.yml | 4 +- DynamoDbEncryption/runtimes/rust/Cargo.toml | 2 +- SUPPORT_POLICY.rst | 17 + releases/rust/db_esdk/Cargo.toml | 20 +- releases/rust/db_esdk/README.md | 2 +- .../db_esdk/examples/basic_get_put_example.rs | 4 +- .../clientsupplier/client_supplier_example.rs | 4 +- .../regional_role_client_supplier.rs | 2 +- .../itemencryptor/item_encrypt_decrypt.rs | 4 +- .../examples/keyring/hierarchical_keyring.rs | 4 +- .../examples/keyring/kms_rsa_keyring.rs | 6 +- .../keyring/mrk_discovery_multi_keyring.rs | 4 +- .../db_esdk/examples/keyring/multi_keyring.rs | 4 +- .../examples/keyring/multi_mrk_keyring.rs | 4 +- .../examples/keyring/raw_aes_keyring.rs | 4 +- .../examples/keyring/raw_rsa_keyring.rs | 4 +- .../db_esdk/examples/multi_get_put_example.rs | 4 +- .../basic_searchable_encryption.rs | 568 +- .../beacon_styles_searchable_encryption.rs | 4 +- .../complexexample/beacon_config.rs | 4 +- .../compound_beacon_searchable_encryption.rs | 6 +- .../virtual_beacon_searchable_encryption.rs | 6 +- releases/rust/db_esdk/src/aes_gcm.rs | 2 +- releases/rust/db_esdk/src/aes_kdf_ctr.rs | 2 +- releases/rust/db_esdk/src/client.rs | 6 +- ...batch_execute_statement_input_transform.rs | 2 +- ...atch_execute_statement_output_transform.rs | 2 +- .../client/batch_get_item_input_transform.rs | 2 +- .../client/batch_get_item_output_transform.rs | 2 +- .../batch_write_item_input_transform.rs | 2 +- .../batch_write_item_output_transform.rs | 2 +- .../src/client/delete_item_input_transform.rs | 2 +- .../client/delete_item_output_transform.rs | 2 +- .../execute_statement_input_transform.rs | 2 +- .../execute_statement_output_transform.rs | 2 +- .../execute_transaction_input_transform.rs | 2 +- .../execute_transaction_output_transform.rs | 2 +- .../src/client/get_item_input_transform.rs | 5 +- .../src/client/get_item_output_transform.rs | 5 +- .../src/client/put_item_input_transform.rs | 5 +- .../src/client/put_item_output_transform.rs | 5 +- .../src/client/query_input_transform.rs | 8 +- .../src/client/query_output_transform.rs | 8 +- .../db_esdk/src/client/resolve_attributes.rs | 8 +- .../src/client/scan_input_transform.rs | 8 +- .../src/client/scan_output_transform.rs | 8 +- .../transact_get_items_input_transform.rs | 2 +- .../transact_get_items_output_transform.rs | 2 +- .../transact_write_items_input_transform.rs | 2 +- .../transact_write_items_output_transform.rs | 2 +- .../src/client/update_item_input_transform.rs | 2 +- .../client/update_item_output_transform.rs | 2 +- releases/rust/db_esdk/src/conversions.rs | 164 +- ...batch_execute_statement_input_transform.rs | 4 +- ...execute_statement_input_transform_input.rs | 10 +- ...xecute_statement_input_transform_output.rs | 10 +- ...execute_statement_input_transform_input.rs | 18 +- ...xecute_statement_input_transform_output.rs | 18 +- ...atch_execute_statement_output_transform.rs | 4 +- ...xecute_statement_output_transform_input.rs | 10 +- ...ecute_statement_output_transform_output.rs | 10 +- ...xecute_statement_output_transform_input.rs | 18 +- ...ecute_statement_output_transform_output.rs | 18 +- .../batch_get_item_input_transform.rs | 4 +- .../_batch_get_item_input_transform_input.rs | 8 +- .../_batch_get_item_input_transform_output.rs | 8 +- .../batch_get_item_input_transform_input.rs | 18 +- .../batch_get_item_input_transform_output.rs | 18 +- .../batch_get_item_output_transform.rs | 4 +- .../_batch_get_item_output_transform_input.rs | 8 +- ..._batch_get_item_output_transform_output.rs | 8 +- .../batch_get_item_output_transform_input.rs | 18 +- .../batch_get_item_output_transform_output.rs | 18 +- .../batch_write_item_input_transform.rs | 4 +- ..._batch_write_item_input_transform_input.rs | 8 +- ...batch_write_item_input_transform_output.rs | 8 +- .../batch_write_item_input_transform_input.rs | 18 +- ...batch_write_item_input_transform_output.rs | 18 +- .../batch_write_item_output_transform.rs | 4 +- ...batch_write_item_output_transform_input.rs | 8 +- ...atch_write_item_output_transform_output.rs | 8 +- ...batch_write_item_output_transform_input.rs | 18 +- ...atch_write_item_output_transform_output.rs | 18 +- .../rust/db_esdk/src/conversions/client.rs | 4 +- .../delete_item_input_transform.rs | 4 +- .../_delete_item_input_transform_input.rs | 8 +- .../_delete_item_input_transform_output.rs | 8 +- .../delete_item_input_transform_input.rs | 18 +- .../delete_item_input_transform_output.rs | 18 +- .../delete_item_output_transform.rs | 4 +- .../_delete_item_output_transform_input.rs | 8 +- .../_delete_item_output_transform_output.rs | 8 +- .../delete_item_output_transform_input.rs | 18 +- .../delete_item_output_transform_output.rs | 18 +- .../_dynamo_db_tables_encryption_config.rs | 13 +- .../rust/db_esdk/src/conversions/error.rs | 30 +- .../execute_statement_input_transform.rs | 4 +- ...execute_statement_input_transform_input.rs | 8 +- ...xecute_statement_input_transform_output.rs | 8 +- ...execute_statement_input_transform_input.rs | 18 +- ...xecute_statement_input_transform_output.rs | 18 +- .../execute_statement_output_transform.rs | 4 +- ...xecute_statement_output_transform_input.rs | 8 +- ...ecute_statement_output_transform_output.rs | 8 +- ...xecute_statement_output_transform_input.rs | 18 +- ...ecute_statement_output_transform_output.rs | 18 +- .../execute_transaction_input_transform.rs | 4 +- ...ecute_transaction_input_transform_input.rs | 8 +- ...cute_transaction_input_transform_output.rs | 8 +- ...ecute_transaction_input_transform_input.rs | 18 +- ...cute_transaction_input_transform_output.rs | 18 +- .../execute_transaction_output_transform.rs | 4 +- ...cute_transaction_output_transform_input.rs | 11 +- ...ute_transaction_output_transform_output.rs | 11 +- ...cute_transaction_output_transform_input.rs | 18 +- ...ute_transaction_output_transform_output.rs | 18 +- .../conversions/get_item_input_transform.rs | 4 +- .../_get_item_input_transform_input.rs | 8 +- .../_get_item_input_transform_output.rs | 8 +- .../get_item_input_transform_input.rs | 18 +- .../get_item_input_transform_output.rs | 18 +- .../conversions/get_item_output_transform.rs | 4 +- .../_get_item_output_transform_input.rs | 8 +- .../_get_item_output_transform_output.rs | 8 +- .../get_item_output_transform_input.rs | 18 +- .../get_item_output_transform_output.rs | 18 +- .../conversions/put_item_input_transform.rs | 4 +- .../_put_item_input_transform_input.rs | 8 +- .../_put_item_input_transform_output.rs | 8 +- .../put_item_input_transform_input.rs | 18 +- .../put_item_input_transform_output.rs | 18 +- .../conversions/put_item_output_transform.rs | 4 +- .../_put_item_output_transform_input.rs | 8 +- .../_put_item_output_transform_output.rs | 8 +- .../put_item_output_transform_input.rs | 18 +- .../put_item_output_transform_output.rs | 18 +- .../src/conversions/query_input_transform.rs | 4 +- .../_query_input_transform_input.rs | 15 +- .../_query_input_transform_output.rs | 15 +- .../query_input_transform_input.rs | 18 +- .../query_input_transform_output.rs | 18 +- .../src/conversions/query_output_transform.rs | 4 +- .../_query_output_transform_input.rs | 22 +- .../_query_output_transform_output.rs | 15 +- .../query_output_transform_input.rs | 18 +- .../query_output_transform_output.rs | 18 +- .../src/conversions/resolve_attributes.rs | 4 +- .../_resolve_attributes_input.rs | 10 +- .../_resolve_attributes_output.rs | 8 +- .../conversions/resolve_attributes_input.rs | 20 +- .../conversions/resolve_attributes_output.rs | 18 +- .../src/conversions/scan_input_transform.rs | 4 +- .../_scan_input_transform_input.rs | 15 +- .../_scan_input_transform_output.rs | 15 +- .../conversions/scan_input_transform_input.rs | 18 +- .../scan_input_transform_output.rs | 18 +- .../src/conversions/scan_output_transform.rs | 4 +- .../_scan_output_transform_input.rs | 22 +- .../_scan_output_transform_output.rs | 15 +- .../scan_output_transform_input.rs | 18 +- .../scan_output_transform_output.rs | 18 +- .../transact_get_items_input_transform.rs | 4 +- ...ransact_get_items_input_transform_input.rs | 8 +- ...ansact_get_items_input_transform_output.rs | 8 +- ...ransact_get_items_input_transform_input.rs | 18 +- ...ansact_get_items_input_transform_output.rs | 18 +- .../transact_get_items_output_transform.rs | 4 +- ...ansact_get_items_output_transform_input.rs | 8 +- ...nsact_get_items_output_transform_output.rs | 8 +- ...ansact_get_items_output_transform_input.rs | 18 +- ...nsact_get_items_output_transform_output.rs | 18 +- .../transact_write_items_input_transform.rs | 4 +- ...nsact_write_items_input_transform_input.rs | 8 +- ...sact_write_items_input_transform_output.rs | 11 +- ...nsact_write_items_input_transform_input.rs | 18 +- ...sact_write_items_input_transform_output.rs | 18 +- .../transact_write_items_output_transform.rs | 4 +- ...sact_write_items_output_transform_input.rs | 11 +- ...act_write_items_output_transform_output.rs | 11 +- ...sact_write_items_output_transform_input.rs | 18 +- ...act_write_items_output_transform_output.rs | 18 +- .../update_item_input_transform.rs | 4 +- .../_update_item_input_transform_input.rs | 8 +- .../_update_item_input_transform_output.rs | 8 +- .../update_item_input_transform_input.rs | 18 +- .../update_item_input_transform_output.rs | 18 +- .../update_item_output_transform.rs | 4 +- .../_update_item_output_transform_input.rs | 8 +- .../_update_item_output_transform_output.rs | 8 +- .../update_item_output_transform_input.rs | 18 +- .../update_item_output_transform_output.rs | 18 +- releases/rust/db_esdk/src/dafny_libraries.rs | 4 +- releases/rust/db_esdk/src/ddb.rs | 12 +- releases/rust/db_esdk/src/deps.rs | 14 +- ...s_cryptography_dbEncryptionSdk_dynamoDb.rs | 6 +- .../client.rs | 5 +- ...mo_db_encryption_branch_key_id_supplier.rs | 2 +- .../get_encrypted_data_key_description.rs | 2 +- .../conversions.rs | 92 +- .../conversions/as_set.rs | 17 +- .../conversions/beacon_key_source.rs | 10 +- .../conversions/beacon_style.rs | 10 +- .../conversions/beacon_version.rs | 40 +- .../conversions/client.rs | 4 +- .../conversions/compound_beacon.rs | 34 +- .../conversions/constructor.rs | 23 +- .../conversions/constructor_part.rs | 22 +- ...mo_db_encryption_branch_key_id_supplier.rs | 4 +- ...encryption_branch_key_id_supplier_input.rs | 10 +- ...ncryption_branch_key_id_supplier_output.rs | 10 +- ...encryption_branch_key_id_supplier_input.rs | 24 +- ...ncryption_branch_key_id_supplier_output.rs | 24 +- .../_dynamo_db_encryption_config.rs | 15 +- .../dynamo_db_key_branch_key_id_supplier.rs | 32 +- .../dynamo_db_table_encryption_config.rs | 38 +- .../dynamo_db_tables_encryption_config.rs | 24 +- .../encrypted_data_key_description.rs | 22 +- .../conversions/encrypted_part.rs | 22 +- .../conversions/error.rs | 38 +- .../get_branch_key_id_from_ddb_key.rs | 4 +- .../_get_branch_key_id_from_ddb_key_input.rs | 12 +- .../_get_branch_key_id_from_ddb_key_output.rs | 10 +- .../get_branch_key_id_from_ddb_key_input.rs | 24 +- .../get_branch_key_id_from_ddb_key_output.rs | 22 +- .../get_encrypted_data_key_description.rs | 4 +- ...et_encrypted_data_key_description_input.rs | 10 +- ...t_encrypted_data_key_description_output.rs | 12 +- ...et_encrypted_data_key_description_input.rs | 24 +- ...t_encrypted_data_key_description_output.rs | 26 +- ...et_encrypted_data_key_description_union.rs | 14 +- .../conversions/get_prefix.rs | 21 +- .../conversions/get_segment.rs | 21 +- .../conversions/get_segments.rs | 21 +- .../conversions/get_substring.rs | 22 +- .../conversions/get_suffix.rs | 21 +- .../conversions/insert.rs | 19 +- .../conversions/legacy_dynamo_db_encryptor.rs | 18 +- .../conversions/legacy_override.rs | 26 +- .../conversions/legacy_policy.rs | 6 +- .../conversions/lower.rs | 17 +- .../conversions/multi_key_store.rs | 26 +- .../conversions/part_only.rs | 21 +- .../conversions/plaintext_override.rs | 6 +- .../conversions/search_config.rs | 24 +- .../conversions/shared.rs | 19 +- .../conversions/shared_set.rs | 21 +- .../conversions/signed_part.rs | 21 +- .../conversions/single_key_store.rs | 35 +- .../conversions/standard_beacon.rs | 24 +- .../conversions/upper.rs | 17 +- .../conversions/virtual_field.rs | 24 +- .../conversions/virtual_part.rs | 25 +- .../conversions/virtual_transform.rs | 10 +- .../error/sealed_unhandled.rs | 4 +- ...mo_db_encryption_branch_key_id_supplier.rs | 8 +- ...encryption_branch_key_id_supplier_input.rs | 42 +- ...ncryption_branch_key_id_supplier_output.rs | 42 +- .../builders.rs | 44 +- .../get_branch_key_id_from_ddb_key.rs | 8 +- .../_get_branch_key_id_from_ddb_key_input.rs | 68 +- .../_get_branch_key_id_from_ddb_key_output.rs | 44 +- .../builders.rs | 61 +- .../get_encrypted_data_key_description.rs | 8 +- ...et_encrypted_data_key_description_input.rs | 42 +- ...t_encrypted_data_key_description_output.rs | 42 +- .../builders.rs | 44 +- .../types/_as_set.rs | 22 +- .../types/_beacon_key_source.rs | 48 +- .../types/_beacon_style.rs | 120 +- .../types/_beacon_version.rs | 551 +- .../types/_compound_beacon.rs | 308 +- .../types/_constructor.rs | 82 +- .../types/_constructor_part.rs | 88 +- ...encryption_branch_key_id_supplier_input.rs | 42 +- ...ncryption_branch_key_id_supplier_output.rs | 42 +- .../_dynamo_db_table_encryption_config.rs | 586 +- .../_dynamo_db_tables_encryption_config.rs | 42 +- .../types/_encrypted_data_key_description.rs | 186 +- .../types/_encrypted_part.rs | 90 +- .../_get_branch_key_id_from_ddb_key_input.rs | 68 +- .../_get_branch_key_id_from_ddb_key_output.rs | 44 +- ...et_encrypted_data_key_description_input.rs | 42 +- ...t_encrypted_data_key_description_output.rs | 42 +- ...et_encrypted_data_key_description_union.rs | 48 +- .../types/_get_prefix.rs | 46 +- .../types/_get_segment.rs | 90 +- .../types/_get_segments.rs | 134 +- .../types/_get_substring.rs | 90 +- .../types/_get_suffix.rs | 46 +- .../types/_insert.rs | 46 +- .../types/_legacy_override.rs | 218 +- .../types/_legacy_policy.rs | 16 +- .../types/_lower.rs | 22 +- .../types/_multi_key_store.rs | 182 +- .../types/_part_only.rs | 23 +- .../types/_plaintext_override.rs | 16 +- .../types/_search_config.rs | 132 +- .../types/_shared.rs | 46 +- .../types/_shared_set.rs | 46 +- .../types/_signed_part.rs | 134 +- .../types/_single_key_store.rs | 150 +- .../types/_standard_beacon.rs | 198 +- .../types/_upper.rs | 22 +- .../types/_virtual_field.rs | 116 +- .../types/_virtual_part.rs | 124 +- .../types/_virtual_transform.rs | 210 +- .../types/dynamo_db_encryption_config.rs | 17 +- .../dynamo_db_key_branch_key_id_supplier.rs | 12 +- .../types/error.rs | 51 +- .../types/legacy_dynamo_db_encryptor.rs | 15 +- .../validation.rs | 1018 +- ..._dbEncryptionSdk_dynamoDb_itemEncryptor.rs | 6 +- .../client.rs | 7 +- .../client/decrypt_item.rs | 2 +- .../client/encrypt_item.rs | 2 +- .../conversions.rs | 16 +- .../conversions/client.rs | 4 +- .../conversions/decrypt_item.rs | 4 +- .../decrypt_item/_decrypt_item_input.rs | 12 +- .../decrypt_item/_decrypt_item_output.rs | 14 +- .../conversions/decrypt_item_input.rs | 24 +- .../conversions/decrypt_item_output.rs | 32 +- .../_dynamo_db_item_encryptor_config.rs | 29 +- .../conversions/encrypt_item.rs | 4 +- .../encrypt_item/_encrypt_item_input.rs | 12 +- .../encrypt_item/_encrypt_item_output.rs | 14 +- .../conversions/encrypt_item_input.rs | 24 +- .../conversions/encrypt_item_output.rs | 32 +- .../conversions/error.rs | 30 +- .../conversions/parsed_header.rs | 28 +- .../error/sealed_unhandled.rs | 4 +- .../operation/decrypt_item.rs | 4 +- .../decrypt_item/_decrypt_item_input.rs | 68 +- .../decrypt_item/_decrypt_item_output.rs | 128 +- .../operation/decrypt_item/builders.rs | 58 +- .../operation/encrypt_item.rs | 4 +- .../encrypt_item/_encrypt_item_input.rs | 68 +- .../encrypt_item/_encrypt_item_output.rs | 128 +- .../operation/encrypt_item/builders.rs | 58 +- .../types.rs | 5 - .../types/_decrypt_item_input.rs | 68 +- .../types/_decrypt_item_output.rs | 128 +- .../types/_encrypt_item_input.rs | 68 +- .../types/_encrypt_item_output.rs | 128 +- .../types/_parsed_header.rs | 398 +- .../types/dynamo_db_item_encryptor_config.rs | 532 +- .../types/error.rs | 51 +- .../validation.rs | 1831 +- ...hy_dbEncryptionSdk_structuredEncryption.rs | 6 +- .../client.rs | 7 +- .../client/decrypt_path_structure.rs | 2 +- .../client/decrypt_structure.rs | 2 +- .../client/encrypt_path_structure.rs | 2 +- .../client/encrypt_structure.rs | 2 +- .../client/resolve_auth_actions.rs | 2 +- .../conversions.rs | 48 +- .../conversions/auth_item.rs | 24 +- .../conversions/authenticate_action.rs | 6 +- .../conversions/client.rs | 4 +- .../conversions/crypto_action.rs | 6 +- .../conversions/crypto_item.rs | 24 +- .../conversions/decrypt_path_structure.rs | 4 +- .../_decrypt_path_structure_input.rs | 14 +- .../_decrypt_path_structure_output.rs | 12 +- .../decrypt_path_structure_input.rs | 28 +- .../decrypt_path_structure_output.rs | 26 +- .../conversions/decrypt_structure.rs | 4 +- .../_decrypt_structure_input.rs | 16 +- .../_decrypt_structure_output.rs | 14 +- .../conversions/decrypt_structure_input.rs | 32 +- .../conversions/decrypt_structure_output.rs | 30 +- .../conversions/encrypt_path_structure.rs | 4 +- .../_encrypt_path_structure_input.rs | 16 +- .../_encrypt_path_structure_output.rs | 12 +- .../encrypt_path_structure_input.rs | 30 +- .../encrypt_path_structure_output.rs | 26 +- .../conversions/encrypt_structure.rs | 4 +- .../_encrypt_structure_input.rs | 18 +- .../_encrypt_structure_output.rs | 14 +- .../conversions/encrypt_structure_input.rs | 34 +- .../conversions/encrypt_structure_output.rs | 30 +- .../conversions/error.rs | 30 +- .../conversions/parsed_header.rs | 24 +- .../conversions/path_segment.rs | 10 +- .../conversions/resolve_auth_actions.rs | 4 +- .../_resolve_auth_actions_input.rs | 12 +- .../_resolve_auth_actions_output.rs | 12 +- .../conversions/resolve_auth_actions_input.rs | 26 +- .../resolve_auth_actions_output.rs | 26 +- .../conversions/structure_segment.rs | 22 +- .../conversions/structured_data_terminal.rs | 26 +- .../_structured_encryption_config.rs | 15 +- .../error/sealed_unhandled.rs | 4 +- .../operation/decrypt_path_structure.rs | 4 +- .../_decrypt_path_structure_input.rs | 194 +- .../_decrypt_path_structure_output.rs | 130 +- .../decrypt_path_structure/builders.rs | 162 +- .../operation/decrypt_structure.rs | 4 +- .../_decrypt_structure_input.rs | 216 +- .../_decrypt_structure_output.rs | 152 +- .../operation/decrypt_structure/builders.rs | 182 +- .../operation/encrypt_path_structure.rs | 4 +- .../_encrypt_path_structure_input.rs | 240 +- .../_encrypt_path_structure_output.rs | 130 +- .../encrypt_path_structure/builders.rs | 196 +- .../operation/encrypt_structure.rs | 4 +- .../_encrypt_structure_input.rs | 284 +- .../_encrypt_structure_output.rs | 152 +- .../operation/encrypt_structure/builders.rs | 231 +- .../operation/resolve_auth_actions.rs | 4 +- .../_resolve_auth_actions_input.rs | 164 +- .../_resolve_auth_actions_output.rs | 66 +- .../resolve_auth_actions/builders.rs | 120 +- .../types.rs | 2 - .../types/_auth_item.rs | 148 +- .../types/_authenticate_action.rs | 4 +- .../types/_crypto_action.rs | 14 +- .../types/_crypto_item.rs | 160 +- .../types/_decrypt_path_structure_input.rs | 194 +- .../types/_decrypt_path_structure_output.rs | 130 +- .../types/_decrypt_structure_input.rs | 216 +- .../types/_decrypt_structure_output.rs | 152 +- .../types/_encrypt_path_structure_input.rs | 240 +- .../types/_encrypt_path_structure_output.rs | 130 +- .../types/_encrypt_structure_input.rs | 284 +- .../types/_encrypt_structure_output.rs | 152 +- .../types/_parsed_header.rs | 256 +- .../types/_path_segment.rs | 18 +- .../types/_resolve_auth_actions_input.rs | 164 +- .../types/_resolve_auth_actions_output.rs | 66 +- .../types/_structure_segment.rs | 36 +- .../types/_structured_data_terminal.rs | 80 +- .../types/error.rs | 32 +- .../types/structured_encryption_config.rs | 17 +- .../validation.rs | 2463 +- .../src/deps/aws_cryptography_keyStore.rs | 6 +- .../deps/aws_cryptography_keyStore/client.rs | 8 +- .../client/create_key.rs | 2 +- .../client/create_key_store.rs | 2 +- .../client/get_active_branch_key.rs | 2 +- .../client/get_beacon_key.rs | 2 +- .../client/get_branch_key_version.rs | 2 +- .../client/get_key_store_info.rs | 2 +- .../client/version_key.rs | 2 +- .../aws_cryptography_keyStore/conversions.rs | 52 +- .../conversions/beacon_key_materials.rs | 16 +- .../conversions/branch_key_materials.rs | 16 +- .../conversions/client.rs | 10 +- .../conversions/create_key.rs | 4 +- .../create_key/_create_key_input.rs | 53 +- .../create_key/_create_key_output.rs | 16 +- .../conversions/create_key_input.rs | 26 +- .../conversions/create_key_output.rs | 14 +- .../conversions/create_key_store.rs | 4 +- .../_create_key_store_input.rs | 10 +- .../_create_key_store_output.rs | 10 +- .../conversions/create_key_store_input.rs | 14 +- .../conversions/create_key_store_output.rs | 14 +- .../conversions/discovery.rs | 36 +- .../conversions/error.rs | 52 +- .../conversions/get_active_branch_key.rs | 4 +- .../_get_active_branch_key_input.rs | 11 +- .../_get_active_branch_key_output.rs | 10 +- .../get_active_branch_key_input.rs | 19 +- .../get_active_branch_key_output.rs | 22 +- .../conversions/get_beacon_key.rs | 4 +- .../get_beacon_key/_get_beacon_key_input.rs | 16 +- .../get_beacon_key/_get_beacon_key_output.rs | 17 +- .../conversions/get_beacon_key_input.rs | 14 +- .../conversions/get_beacon_key_output.rs | 14 +- .../conversions/get_branch_key_version.rs | 4 +- .../_get_branch_key_version_input.rs | 10 +- .../_get_branch_key_version_output.rs | 10 +- .../get_branch_key_version_input.rs | 22 +- .../get_branch_key_version_output.rs | 21 +- .../conversions/get_key_store_info.rs | 2 +- .../_get_key_store_info_output.rs | 10 +- .../conversions/get_key_store_info_output.rs | 17 +- .../key_store_config/_key_store_config.rs | 13 +- .../conversions/kms_configuration.rs | 8 +- .../conversions/mr_discovery.rs | 24 +- .../conversions/version_key.rs | 4 +- .../version_key/_version_key_input.rs | 16 +- .../version_key/_version_key_output.rs | 11 +- .../conversions/version_key_input.rs | 14 +- .../conversions/version_key_output.rs | 14 +- .../error/sealed_unhandled.rs | 4 +- .../operation/create_key.rs | 10 +- .../operation/create_key/_create_key_input.rs | 116 +- .../create_key/_create_key_output.rs | 50 +- .../operation/create_key/builders.rs | 93 +- .../operation/create_key_store.rs | 10 +- .../_create_key_store_input.rs | 15 +- .../_create_key_store_output.rs | 36 +- .../operation/create_key_store/builders.rs | 21 +- .../operation/get_active_branch_key.rs | 12 +- .../_get_active_branch_key_input.rs | 44 +- .../_get_active_branch_key_output.rs | 58 +- .../get_active_branch_key/builders.rs | 49 +- .../operation/get_beacon_key.rs | 10 +- .../get_beacon_key/_get_beacon_key_input.rs | 50 +- .../get_beacon_key/_get_beacon_key_output.rs | 64 +- .../operation/get_beacon_key/builders.rs | 51 +- .../operation/get_branch_key_version.rs | 12 +- .../_get_branch_key_version_input.rs | 92 +- .../_get_branch_key_version_output.rs | 58 +- .../get_branch_key_version/builders.rs | 83 +- .../operation/get_key_store_info.rs | 15 +- .../_get_key_store_info_output.rs | 244 +- .../operation/get_key_store_info/_unit.rs | 23 +- .../operation/get_key_store_info/builders.rs | 22 +- .../operation/version_key.rs | 10 +- .../version_key/_version_key_input.rs | 50 +- .../version_key/_version_key_output.rs | 21 +- .../operation/version_key/builders.rs | 51 +- .../deps/aws_cryptography_keyStore/types.rs | 4 - .../types/_beacon_key_materials.rs | 236 +- .../types/_branch_key_materials.rs | 220 +- .../types/_create_key_input.rs | 117 +- .../types/_create_key_output.rs | 51 +- .../types/_create_key_store_input.rs | 25 +- .../types/_create_key_store_output.rs | 45 +- .../types/_discovery.rs | 17 +- .../types/_get_active_branch_key_input.rs | 52 +- .../types/_get_active_branch_key_output.rs | 66 +- .../types/_get_beacon_key_input.rs | 51 +- .../types/_get_beacon_key_output.rs | 68 +- .../types/_get_branch_key_version_input.rs | 102 +- .../types/_get_branch_key_version_output.rs | 66 +- .../types/_get_key_store_info_output.rs | 259 +- .../types/_kms_configuration.rs | 120 +- .../types/_mr_discovery.rs | 37 +- .../types/_version_key_input.rs | 51 +- .../types/_version_key_output.rs | 22 +- .../aws_cryptography_keyStore/types/error.rs | 32 +- .../types/key_store_config.rs | 371 +- .../aws_cryptography_keyStore/validation.rs | 1840 +- .../aws_cryptography_materialProviders.rs | 6 +- .../client.rs | 8 +- .../create_aws_kms_discovery_keyring.rs | 2 +- .../create_aws_kms_discovery_multi_keyring.rs | 2 +- .../client/create_aws_kms_ecdh_keyring.rs | 2 +- .../create_aws_kms_hierarchical_keyring.rs | 2 +- .../client/create_aws_kms_keyring.rs | 2 +- .../create_aws_kms_mrk_discovery_keyring.rs | 2 +- ...ate_aws_kms_mrk_discovery_multi_keyring.rs | 2 +- .../client/create_aws_kms_mrk_keyring.rs | 2 +- .../create_aws_kms_mrk_multi_keyring.rs | 2 +- .../client/create_aws_kms_multi_keyring.rs | 2 +- .../client/create_aws_kms_rsa_keyring.rs | 2 +- .../create_cryptographic_materials_cache.rs | 2 +- .../client/create_default_client_supplier.rs | 2 +- ...default_cryptographic_materials_manager.rs | 2 +- .../client/create_multi_keyring.rs | 2 +- .../client/create_raw_aes_keyring.rs | 2 +- .../client/create_raw_ecdh_keyring.rs | 2 +- .../client/create_raw_rsa_keyring.rs | 2 +- .../create_required_encryption_context_cmm.rs | 2 +- ...ption_materials_with_plaintext_data_key.rs | 2 +- ...yption_materials_has_plaintext_data_key.rs | 2 +- .../client/get_algorithm_suite_info.rs | 2 +- .../client/initialize_decryption_materials.rs | 2 +- .../client/initialize_encryption_materials.rs | 2 +- .../client/valid_algorithm_suite_info.rs | 2 +- .../valid_decryption_materials_transition.rs | 2 +- .../valid_encryption_materials_transition.rs | 2 +- .../validate_commitment_policy_on_decrypt.rs | 2 +- .../validate_commitment_policy_on_encrypt.rs | 2 +- .../conversions.rs | 254 +- .../conversions/aes_wrapping_alg.rs | 6 +- .../conversions/algorithm_suite_id.rs | 10 +- .../conversions/algorithm_suite_info.rs | 21 +- .../conversions/branch_key_id_supplier.rs | 30 +- .../conversions/cache_type.rs | 8 +- .../conversions/client.rs | 4 +- .../conversions/client_supplier.rs | 106 +- .../conversions/commitment_policy.rs | 10 +- .../create_aws_kms_discovery_keyring.rs | 2 +- ..._create_aws_kms_discovery_keyring_input.rs | 14 +- .../create_aws_kms_discovery_keyring_input.rs | 26 +- .../create_aws_kms_discovery_multi_keyring.rs | 2 +- ...e_aws_kms_discovery_multi_keyring_input.rs | 16 +- ...e_aws_kms_discovery_multi_keyring_input.rs | 34 +- .../create_aws_kms_ecdh_keyring.rs | 2 +- .../_create_aws_kms_ecdh_keyring_input.rs | 12 +- .../create_aws_kms_ecdh_keyring_input.rs | 24 +- .../create_aws_kms_hierarchical_keyring.rs | 2 +- ...eate_aws_kms_hierarchical_keyring_input.rs | 14 +- ...eate_aws_kms_hierarchical_keyring_input.rs | 26 +- .../conversions/create_aws_kms_keyring.rs | 2 +- .../_create_aws_kms_keyring_input.rs | 12 +- .../create_aws_kms_keyring_input.rs | 24 +- .../create_aws_kms_mrk_discovery_keyring.rs | 2 +- ...ate_aws_kms_mrk_discovery_keyring_input.rs | 14 +- ...ate_aws_kms_mrk_discovery_keyring_input.rs | 26 +- ...ate_aws_kms_mrk_discovery_multi_keyring.rs | 2 +- ...s_kms_mrk_discovery_multi_keyring_input.rs | 16 +- ...s_kms_mrk_discovery_multi_keyring_input.rs | 32 +- .../conversions/create_aws_kms_mrk_keyring.rs | 2 +- .../_create_aws_kms_mrk_keyring_input.rs | 12 +- .../create_aws_kms_mrk_keyring_input.rs | 24 +- .../create_aws_kms_mrk_multi_keyring.rs | 2 +- ..._create_aws_kms_mrk_multi_keyring_input.rs | 16 +- .../create_aws_kms_mrk_multi_keyring_input.rs | 28 +- .../create_aws_kms_multi_keyring.rs | 2 +- .../_create_aws_kms_multi_keyring_input.rs | 16 +- .../create_aws_kms_multi_keyring_input.rs | 28 +- .../conversions/create_aws_kms_rsa_keyring.rs | 2 +- .../_create_aws_kms_rsa_keyring_input.rs | 14 +- .../create_aws_kms_rsa_keyring_input.rs | 26 +- .../create_cryptographic_materials_cache.rs | 2 +- ...ate_cryptographic_materials_cache_input.rs | 10 +- ...ate_cryptographic_materials_cache_input.rs | 28 +- .../create_default_client_supplier.rs | 2 +- .../_create_default_client_supplier_input.rs | 10 +- .../create_default_client_supplier_input.rs | 22 +- ...default_cryptographic_materials_manager.rs | 2 +- ...t_cryptographic_materials_manager_input.rs | 10 +- ...t_cryptographic_materials_manager_input.rs | 24 +- .../conversions/create_multi_keyring.rs | 2 +- .../_create_multi_keyring_input.rs | 12 +- .../conversions/create_multi_keyring_input.rs | 24 +- .../conversions/create_raw_aes_keyring.rs | 2 +- .../_create_raw_aes_keyring_input.rs | 10 +- .../create_raw_aes_keyring_input.rs | 22 +- .../conversions/create_raw_ecdh_keyring.rs | 2 +- .../_create_raw_ecdh_keyring_input.rs | 10 +- .../create_raw_ecdh_keyring_input.rs | 22 +- .../conversions/create_raw_rsa_keyring.rs | 2 +- .../_create_raw_rsa_keyring_input.rs | 10 +- .../create_raw_rsa_keyring_input.rs | 22 +- .../create_required_encryption_context_cmm.rs | 2 +- ...e_required_encryption_context_cmm_input.rs | 14 +- ...e_required_encryption_context_cmm_input.rs | 32 +- .../cryptographic_materials_cache.rs | 60 +- .../cryptographic_materials_manager.rs | 44 +- .../conversions/dbe_algorithm_suite_id.rs | 6 +- .../conversions/dbe_commitment_policy.rs | 6 +- .../conversions/decrypt_materials.rs | 4 +- .../_decrypt_materials_input.rs | 14 +- .../_decrypt_materials_output.rs | 10 +- .../conversions/decrypt_materials_input.rs | 26 +- .../conversions/decrypt_materials_output.rs | 22 +- .../conversions/decryption_materials.rs | 22 +- ...ption_materials_with_plaintext_data_key.rs | 2 +- ...materials_with_plaintext_data_key_input.rs | 10 +- .../conversions/default_cache.rs | 17 +- .../conversions/delete_cache_entry.rs | 2 +- .../_delete_cache_entry_input.rs | 10 +- .../conversions/delete_cache_entry_input.rs | 22 +- .../conversions/derivation_algorithm.rs | 10 +- .../conversions/direct_key_wrapping.rs | 21 +- .../conversions/discovery_filter.rs | 22 +- .../conversions/ecdsa.rs | 24 +- .../conversions/edk_wrapping_algorithm.rs | 10 +- .../conversions/encrypt.rs | 8 +- .../conversions/encrypted_data_key.rs | 23 +- .../conversions/encryption_materials.rs | 26 +- ...yption_materials_has_plaintext_data_key.rs | 2 +- ..._materials_has_plaintext_data_key_input.rs | 14 +- ..._private_key_to_static_public_key_input.rs | 26 +- .../conversions/error.rs | 52 +- .../conversions/esdk_algorithm_suite_id.rs | 6 +- .../conversions/esdk_commitment_policy.rs | 6 +- .../conversions/get_algorithm_suite_info.rs | 2 +- .../_get_algorithm_suite_info_output.rs | 10 +- .../conversions/get_branch_key_id.rs | 4 +- .../_get_branch_key_id_input.rs | 10 +- .../_get_branch_key_id_output.rs | 10 +- .../conversions/get_branch_key_id_input.rs | 22 +- .../conversions/get_branch_key_id_output.rs | 22 +- .../conversions/get_cache_entry.rs | 4 +- .../get_cache_entry/_get_cache_entry_input.rs | 11 +- .../_get_cache_entry_output.rs | 11 +- .../conversions/get_cache_entry_input.rs | 21 +- .../conversions/get_cache_entry_output.rs | 22 +- .../conversions/get_client.rs | 2 +- .../get_client/_get_client_input.rs | 21 +- .../conversions/get_client_input.rs | 19 +- .../conversions/get_encryption_materials.rs | 4 +- .../_get_encryption_materials_input.rs | 14 +- .../_get_encryption_materials_output.rs | 10 +- .../get_encryption_materials_input.rs | 26 +- .../get_encryption_materials_output.rs | 22 +- .../conversions/hkdf.rs | 34 +- .../conversions/identity.rs | 14 +- .../initialize_decryption_materials.rs | 4 +- .../_initialize_decryption_materials_input.rs | 10 +- ..._initialize_decryption_materials_output.rs | 10 +- .../initialize_decryption_materials_input.rs | 22 +- .../initialize_encryption_materials.rs | 4 +- .../_initialize_encryption_materials_input.rs | 10 +- ..._initialize_encryption_materials_output.rs | 14 +- .../initialize_encryption_materials_input.rs | 22 +- .../conversions/intermediate_key_wrapping.rs | 22 +- .../conversions/key_agreement_scheme.rs | 10 +- .../conversions/keyring.rs | 145 +- .../kms_ecdh_static_configurations.rs | 10 +- ..._private_key_to_static_public_key_input.rs | 22 +- .../kms_public_key_discovery_input.rs | 22 +- .../_material_providers_config.rs | 15 +- .../conversions/materials.rs | 8 +- .../conversions/multi_threaded_cache.rs | 21 +- .../conversions/no_cache.rs | 14 +- .../conversions/none.rs | 28 +- .../conversions/on_decrypt.rs | 4 +- .../on_decrypt/_on_decrypt_input.rs | 10 +- .../on_decrypt/_on_decrypt_output.rs | 8 +- .../conversions/on_decrypt_input.rs | 21 +- .../conversions/on_decrypt_output.rs | 22 +- .../conversions/on_encrypt.rs | 4 +- .../on_encrypt/_on_encrypt_input.rs | 8 +- .../on_encrypt/_on_encrypt_output.rs | 8 +- .../conversions/on_encrypt_input.rs | 19 +- .../conversions/on_encrypt_output.rs | 22 +- .../conversions/padding_scheme.rs | 8 +- .../conversions/public_key_discovery_input.rs | 22 +- .../conversions/put_cache_entry.rs | 2 +- .../put_cache_entry/_put_cache_entry_input.rs | 11 +- .../conversions/put_cache_entry_input.rs | 21 +- .../raw_ecdh_static_configurations.rs | 10 +- ..._private_key_to_static_public_key_input.rs | 22 +- .../conversions/signature_algorithm.rs | 10 +- .../conversions/single_threaded_cache.rs | 22 +- .../conversions/static_configurations.rs | 10 +- .../conversions/storm_tracking_cache.rs | 23 +- .../symmetric_signature_algorithm.rs | 10 +- .../conversions/time_units.rs | 8 +- .../conversions/update_usage_metadata.rs | 2 +- .../_update_usage_metadata_input.rs | 10 +- .../update_usage_metadata_input.rs | 22 +- .../conversions/valid_algorithm_suite_info.rs | 2 +- .../_valid_algorithm_suite_info_input.rs | 10 +- .../valid_decryption_materials_transition.rs | 2 +- ...d_decryption_materials_transition_input.rs | 10 +- ...d_decryption_materials_transition_input.rs | 28 +- .../valid_encryption_materials_transition.rs | 2 +- ...d_encryption_materials_transition_input.rs | 10 +- ...d_encryption_materials_transition_input.rs | 28 +- .../validate_commitment_policy_on_decrypt.rs | 2 +- ...date_commitment_policy_on_decrypt_input.rs | 10 +- ...date_commitment_policy_on_decrypt_input.rs | 28 +- .../validate_commitment_policy_on_encrypt.rs | 2 +- ...date_commitment_policy_on_encrypt_input.rs | 10 +- ...date_commitment_policy_on_encrypt_input.rs | 28 +- .../error/sealed_unhandled.rs | 4 +- .../create_aws_kms_discovery_keyring.rs | 19 +- ..._create_aws_kms_discovery_keyring_input.rs | 164 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 120 +- .../create_aws_kms_discovery_multi_keyring.rs | 19 +- ...e_aws_kms_discovery_multi_keyring_input.rs | 220 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 156 +- .../operation/create_aws_kms_ecdh_keyring.rs | 15 +- .../_create_aws_kms_ecdh_keyring_input.rs | 222 +- .../_create_keyring_output.rs | 62 +- .../create_aws_kms_ecdh_keyring/builders.rs | 159 +- .../create_aws_kms_hierarchical_keyring.rs | 19 +- ...eate_aws_kms_hierarchical_keyring_input.rs | 254 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 207 +- .../operation/create_aws_kms_keyring.rs | 15 +- .../_create_aws_kms_keyring_input.rs | 140 +- .../_create_keyring_output.rs | 62 +- .../create_aws_kms_keyring/builders.rs | 106 +- .../create_aws_kms_mrk_discovery_keyring.rs | 19 +- ...ate_aws_kms_mrk_discovery_keyring_input.rs | 206 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 148 +- ...ate_aws_kms_mrk_discovery_multi_keyring.rs | 19 +- ...s_kms_mrk_discovery_multi_keyring_input.rs | 220 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 156 +- .../operation/create_aws_kms_mrk_keyring.rs | 15 +- .../_create_aws_kms_mrk_keyring_input.rs | 140 +- .../_create_keyring_output.rs | 62 +- .../create_aws_kms_mrk_keyring/builders.rs | 106 +- .../create_aws_kms_mrk_multi_keyring.rs | 19 +- ..._create_aws_kms_mrk_multi_keyring_input.rs | 200 +- .../_create_keyring_output.rs | 62 +- .../builders.rs | 144 +- .../operation/create_aws_kms_multi_keyring.rs | 19 +- .../_create_aws_kms_multi_keyring_input.rs | 200 +- .../_create_keyring_output.rs | 62 +- .../create_aws_kms_multi_keyring/builders.rs | 144 +- .../operation/create_aws_kms_rsa_keyring.rs | 15 +- .../_create_aws_kms_rsa_keyring_input.rs | 243 +- .../_create_keyring_output.rs | 62 +- .../create_aws_kms_rsa_keyring/builders.rs | 176 +- .../create_cryptographic_materials_cache.rs | 16 +- ...ate_cryptographic_materials_cache_input.rs | 58 +- ...te_cryptographic_materials_cache_output.rs | 42 +- .../builders.rs | 51 +- .../create_default_client_supplier.rs | 14 +- .../_create_default_client_supplier_input.rs | 17 +- .../_create_default_client_supplier_output.rs | 58 +- .../builders.rs | 10 +- ...default_cryptographic_materials_manager.rs | 16 +- ..._cryptographic_materials_manager_output.rs | 42 +- ...t_cryptographic_materials_manager_input.rs | 62 +- .../builders.rs | 52 +- .../operation/create_multi_keyring.rs | 15 +- .../_create_keyring_output.rs | 62 +- .../_create_multi_keyring_input.rs | 138 +- .../create_multi_keyring/builders.rs | 96 +- .../operation/create_raw_aes_keyring.rs | 15 +- .../_create_keyring_output.rs | 62 +- .../_create_raw_aes_keyring_input.rs | 198 +- .../create_raw_aes_keyring/builders.rs | 144 +- .../operation/create_raw_ecdh_keyring.rs | 15 +- .../_create_keyring_output.rs | 62 +- .../_create_raw_ecdh_keyring_input.rs | 120 +- .../create_raw_ecdh_keyring/builders.rs | 87 +- .../operation/create_raw_rsa_keyring.rs | 15 +- .../_create_keyring_output.rs | 62 +- .../_create_raw_rsa_keyring_input.rs | 244 +- .../create_raw_rsa_keyring/builders.rs | 177 +- .../create_required_encryption_context_cmm.rs | 16 +- ...e_required_encryption_context_cmm_input.rs | 142 +- ..._required_encryption_context_cmm_output.rs | 42 +- .../builders.rs | 122 +- .../operation/decrypt_materials.rs | 8 +- .../_decrypt_materials_input.rs | 322 +- .../_decrypt_materials_output.rs | 62 +- .../operation/decrypt_materials/builders.rs | 224 +- ...ption_materials_with_plaintext_data_key.rs | 18 +- .../_decryption_materials.rs | 324 +- .../_unit.rs | 17 +- .../builders.rs | 228 +- .../operation/delete_cache_entry.rs | 6 +- .../_delete_cache_entry_input.rs | 44 +- .../operation/delete_cache_entry/_unit.rs | 21 +- .../operation/delete_cache_entry/builders.rs | 40 +- ...yption_materials_has_plaintext_data_key.rs | 18 +- .../_encryption_materials.rs | 397 +- .../_unit.rs | 17 +- .../builders.rs | 276 +- .../operation/get_algorithm_suite_info.rs | 13 +- .../_algorithm_suite_info.rs | 530 +- .../_get_algorithm_suite_info_input.rs | 38 +- .../get_algorithm_suite_info/builders.rs | 38 +- .../operation/get_branch_key_id.rs | 8 +- .../_get_branch_key_id_input.rs | 62 +- .../_get_branch_key_id_output.rs | 44 +- .../operation/get_branch_key_id/builders.rs | 52 +- .../operation/get_cache_entry.rs | 8 +- .../get_cache_entry/_get_cache_entry_input.rs | 86 +- .../_get_cache_entry_output.rs | 236 +- .../operation/get_cache_entry/builders.rs | 72 +- .../operation/get_client.rs | 2 +- .../operation/get_client/_get_client_input.rs | 36 +- .../get_client/_get_client_output.rs | 44 +- .../operation/get_client/builders.rs | 40 +- .../operation/get_encryption_materials.rs | 8 +- .../_get_encryption_materials_input.rs | 292 +- .../_get_encryption_materials_output.rs | 62 +- .../get_encryption_materials/builders.rs | 206 +- .../initialize_decryption_materials.rs | 16 +- .../_decryption_materials.rs | 324 +- .../_initialize_decryption_materials_input.rs | 180 +- .../builders.rs | 130 +- .../initialize_encryption_materials.rs | 16 +- .../_encryption_materials.rs | 397 +- .../_initialize_encryption_materials_input.rs | 276 +- .../builders.rs | 198 +- .../operation/on_decrypt.rs | 2 +- .../operation/on_decrypt/_on_decrypt_input.rs | 128 +- .../on_decrypt/_on_decrypt_output.rs | 60 +- .../operation/on_decrypt/builders.rs | 100 +- .../operation/on_encrypt.rs | 2 +- .../operation/on_encrypt/_on_encrypt_input.rs | 60 +- .../on_encrypt/_on_encrypt_output.rs | 60 +- .../operation/on_encrypt/builders.rs | 54 +- .../operation/put_cache_entry.rs | 6 +- .../put_cache_entry/_put_cache_entry_input.rs | 284 +- .../operation/put_cache_entry/_unit.rs | 21 +- .../operation/put_cache_entry/builders.rs | 205 +- .../operation/update_usage_metadata.rs | 6 +- .../operation/update_usage_metadata/_unit.rs | 15 +- .../_update_usage_metadata_input.rs | 86 +- .../update_usage_metadata/builders.rs | 68 +- .../operation/valid_algorithm_suite_info.rs | 14 +- .../_algorithm_suite_info.rs | 530 +- .../valid_algorithm_suite_info/_unit.rs | 17 +- .../valid_algorithm_suite_info/builders.rs | 361 +- .../valid_decryption_materials_transition.rs | 18 +- .../_unit.rs | 17 +- ...d_decryption_materials_transition_input.rs | 126 +- .../builders.rs | 90 +- .../valid_encryption_materials_transition.rs | 18 +- .../_unit.rs | 17 +- ...d_encryption_materials_transition_input.rs | 126 +- .../builders.rs | 90 +- .../validate_commitment_policy_on_decrypt.rs | 18 +- .../_unit.rs | 17 +- ...date_commitment_policy_on_decrypt_input.rs | 126 +- .../builders.rs | 90 +- .../validate_commitment_policy_on_encrypt.rs | 18 +- .../_unit.rs | 17 +- ...date_commitment_policy_on_encrypt_input.rs | 126 +- .../builders.rs | 90 +- .../types/_aes_wrapping_alg.rs | 8 +- .../types/_algorithm_suite_id.rs | 64 +- .../types/_algorithm_suite_info.rs | 554 +- .../types/_cache_type.rs | 178 +- .../types/_commitment_policy.rs | 64 +- ..._create_aws_kms_discovery_keyring_input.rs | 162 +- ...e_aws_kms_discovery_multi_keyring_input.rs | 220 +- .../_create_aws_kms_ecdh_keyring_input.rs | 234 +- ...eate_aws_kms_hierarchical_keyring_input.rs | 254 +- .../types/_create_aws_kms_keyring_input.rs | 150 +- ...ate_aws_kms_mrk_discovery_keyring_input.rs | 206 +- ...s_kms_mrk_discovery_multi_keyring_input.rs | 220 +- .../_create_aws_kms_mrk_keyring_input.rs | 150 +- ..._create_aws_kms_mrk_multi_keyring_input.rs | 198 +- .../_create_aws_kms_multi_keyring_input.rs | 212 +- .../_create_aws_kms_rsa_keyring_input.rs | 257 +- ...ate_cryptographic_materials_cache_input.rs | 58 +- .../_create_default_client_supplier_input.rs | 15 +- ...t_cryptographic_materials_manager_input.rs | 62 +- .../types/_create_multi_keyring_input.rs | 146 +- .../types/_create_raw_aes_keyring_input.rs | 210 +- .../types/_create_raw_ecdh_keyring_input.rs | 128 +- .../types/_create_raw_rsa_keyring_input.rs | 258 +- ...e_required_encryption_context_cmm_input.rs | 142 +- .../types/_dbe_algorithm_suite_id.rs | 14 +- .../types/_dbe_commitment_policy.rs | 4 +- .../types/_decrypt_materials_input.rs | 336 +- .../types/_decrypt_materials_output.rs | 68 +- .../types/_decryption_materials.rs | 342 +- .../types/_default_cache.rs | 51 +- .../types/_delete_cache_entry_input.rs | 50 +- .../types/_derivation_algorithm.rs | 89 +- .../types/_direct_key_wrapping.rs | 23 +- .../types/_discovery_filter.rs | 98 +- .../types/_ecdsa.rs | 67 +- .../types/_edk_wrapping_algorithm.rs | 50 +- .../types/_encrypt.rs | 26 +- .../types/_encrypted_data_key.rs | 152 +- .../types/_encryption_materials.rs | 417 +- ..._private_key_to_static_public_key_input.rs | 44 +- .../types/_esdk_algorithm_suite_id.rs | 64 +- .../types/_esdk_commitment_policy.rs | 16 +- .../types/_get_branch_key_id_input.rs | 70 +- .../types/_get_branch_key_id_output.rs | 52 +- .../types/_get_cache_entry_input.rs | 96 +- .../types/_get_cache_entry_output.rs | 252 +- .../types/_get_client_input.rs | 46 +- .../types/_get_encryption_materials_input.rs | 306 +- .../types/_get_encryption_materials_output.rs | 68 +- .../types/_hkdf.rs | 209 +- .../types/_identity.rs | 22 +- .../_initialize_decryption_materials_input.rs | 178 +- .../_initialize_encryption_materials_input.rs | 274 +- .../types/_intermediate_key_wrapping.rs | 196 +- .../types/_key_agreement_scheme.rs | 23 +- .../types/_kms_ecdh_static_configurations.rs | 47 +- ..._private_key_to_static_public_key_input.rs | 138 +- .../types/_kms_public_key_discovery_input.rs | 50 +- .../types/_materials.rs | 134 +- .../types/_multi_threaded_cache.rs | 102 +- .../types/_no_cache.rs | 22 +- .../types/_none.rs | 20 +- .../types/_on_decrypt_input.rs | 140 +- .../types/_on_decrypt_output.rs | 70 +- .../types/_on_encrypt_input.rs | 70 +- .../types/_on_encrypt_output.rs | 70 +- .../types/_padding_scheme.rs | 16 +- .../types/_public_key_discovery_input.rs | 52 +- .../types/_put_cache_entry_input.rs | 302 +- .../types/_raw_ecdh_static_configurations.rs | 55 +- ..._private_key_to_static_public_key_input.rs | 92 +- .../types/_signature_algorithm.rs | 62 +- .../types/_single_threaded_cache.rs | 102 +- .../types/_static_configurations.rs | 48 +- .../types/_storm_tracking_cache.rs | 426 +- .../types/_symmetric_signature_algorithm.rs | 46 +- .../types/_time_units.rs | 4 +- .../types/_update_usage_metadata_input.rs | 94 +- ...d_decryption_materials_transition_input.rs | 126 +- ...d_encryption_materials_transition_input.rs | 126 +- ...date_commitment_policy_on_decrypt_input.rs | 126 +- ...date_commitment_policy_on_encrypt_input.rs | 126 +- .../types/branch_key_id_supplier.rs | 12 +- .../types/client_supplier.rs | 24 +- .../types/client_supplier/get_client.rs | 2 +- .../types/cryptographic_materials_cache.rs | 45 +- .../types/cryptographic_materials_manager.rs | 14 +- .../types/error.rs | 152 +- .../types/keyring.rs | 40 +- .../types/keyring/on_decrypt.rs | 2 +- .../types/keyring/on_encrypt.rs | 2 +- .../types/material_providers_config.rs | 17 +- .../validation.rs | 9788 +- .../src/deps/aws_cryptography_primitives.rs | 6 +- .../aws_cryptography_primitives/client.rs | 8 +- .../client/aes_decrypt.rs | 2 +- .../client/aes_encrypt.rs | 2 +- .../client/aes_kdf_counter_mode.rs | 2 +- .../client/compress_public_key.rs | 2 +- .../client/decompress_public_key.rs | 2 +- .../client/derive_shared_secret.rs | 2 +- .../client/digest.rs | 5 +- .../client/ecdsa_sign.rs | 2 +- .../client/ecdsa_verify.rs | 2 +- .../client/generate_ecc_key_pair.rs | 2 +- .../client/generate_ecdsa_signature_key.rs | 2 +- .../client/generate_random_bytes.rs | 2 +- .../client/generate_rsa_key_pair.rs | 2 +- .../client/get_public_key_from_private_key.rs | 2 +- .../client/get_rsa_key_modulus_length.rs | 2 +- .../client/h_mac.rs | 9 +- .../client/hkdf.rs | 9 +- .../client/hkdf_expand.rs | 2 +- .../client/hkdf_extract.rs | 2 +- .../client/kdf_counter_mode.rs | 2 +- .../client/parse_public_key.rs | 2 +- .../client/rsa_decrypt.rs | 2 +- .../client/rsa_encrypt.rs | 2 +- .../client/validate_public_key.rs | 2 +- .../conversions.rs | 140 +- .../conversions/aes_ctr.rs | 34 +- .../conversions/aes_decrypt.rs | 2 +- .../aes_decrypt/_aes_decrypt_input.rs | 37 +- .../conversions/aes_decrypt_input.rs | 14 +- .../conversions/aes_encrypt.rs | 4 +- .../aes_encrypt/_aes_encrypt_input.rs | 33 +- .../aes_encrypt/_aes_encrypt_output.rs | 18 +- .../conversions/aes_encrypt_input.rs | 14 +- .../conversions/aes_encrypt_output.rs | 14 +- .../conversions/aes_gcm.rs | 36 +- .../conversions/aes_kdf_counter_mode.rs | 2 +- .../_aes_kdf_counter_mode_input.rs | 10 +- .../conversions/aes_kdf_ctr_input.rs | 14 +- .../conversions/client.rs | 4 +- .../conversions/compress_public_key.rs | 4 +- .../_compress_public_key_input.rs | 11 +- .../_compress_public_key_output.rs | 11 +- .../conversions/compress_public_key_input.rs | 22 +- .../conversions/compress_public_key_output.rs | 21 +- .../crypto_config/_crypto_config.rs | 7 +- .../conversions/decompress_public_key.rs | 4 +- .../_decompress_public_key_input.rs | 10 +- .../_decompress_public_key_output.rs | 10 +- .../decompress_public_key_input.rs | 21 +- .../decompress_public_key_output.rs | 21 +- .../conversions/derive_shared_secret.rs | 4 +- .../_derive_shared_secret_input.rs | 10 +- .../_derive_shared_secret_output.rs | 10 +- .../conversions/derive_shared_secret_input.rs | 21 +- .../derive_shared_secret_output.rs | 21 +- .../conversions/digest.rs | 2 +- .../conversions/digest/_digest_input.rs | 20 +- .../conversions/digest_algorithm.rs | 8 +- .../conversions/digest_input.rs | 24 +- .../conversions/ecc_private_key.rs | 14 +- .../conversions/ecc_public_key.rs | 24 +- .../conversions/ecdh_curve_spec.rs | 8 +- .../conversions/ecdsa_sign.rs | 2 +- .../ecdsa_sign/_ecdsa_sign_input.rs | 10 +- .../conversions/ecdsa_sign_input.rs | 14 +- .../conversions/ecdsa_signature_algorithm.rs | 6 +- .../conversions/ecdsa_verify.rs | 2 +- .../ecdsa_verify/_ecdsa_verify_input.rs | 10 +- .../conversions/ecdsa_verify_input.rs | 14 +- .../conversions/error.rs | 52 +- .../conversions/generate_ecc_key_pair.rs | 4 +- .../_generate_ecc_key_pair_input.rs | 10 +- .../_generate_ecc_key_pair_output.rs | 10 +- .../generate_ecc_key_pair_input.rs | 21 +- .../generate_ecc_key_pair_output.rs | 21 +- .../generate_ecdsa_signature_key.rs | 4 +- .../_generate_ecdsa_signature_key_input.rs | 10 +- .../_generate_ecdsa_signature_key_output.rs | 10 +- .../generate_ecdsa_signature_key_input.rs | 22 +- .../generate_ecdsa_signature_key_output.rs | 22 +- .../conversions/generate_random_bytes.rs | 2 +- .../_generate_random_bytes_input.rs | 10 +- .../generate_random_bytes_input.rs | 21 +- .../conversions/generate_rsa_key_pair.rs | 4 +- .../_generate_rsa_key_pair_input.rs | 10 +- .../_generate_rsa_key_pair_output.rs | 10 +- .../generate_rsa_key_pair_input.rs | 21 +- .../generate_rsa_key_pair_output.rs | 21 +- .../get_public_key_from_private_key.rs | 4 +- .../_get_public_key_from_private_key_input.rs | 10 +- ..._get_public_key_from_private_key_output.rs | 10 +- .../get_public_key_from_private_key_input.rs | 22 +- .../get_public_key_from_private_key_output.rs | 22 +- .../conversions/get_rsa_key_modulus_length.rs | 4 +- .../_get_rsa_key_modulus_length_input.rs | 10 +- .../_get_rsa_key_modulus_length_output.rs | 10 +- .../get_rsa_key_modulus_length_input.rs | 22 +- .../get_rsa_key_modulus_length_output.rs | 22 +- .../conversions/h_mac.rs | 2 +- .../conversions/h_mac/_h_mac_input.rs | 24 +- .../conversions/h_mac_input.rs | 24 +- .../conversions/hkdf.rs | 2 +- .../conversions/hkdf/_hkdf_input.rs | 30 +- .../conversions/hkdf_expand.rs | 2 +- .../hkdf_expand/_hkdf_expand_input.rs | 26 +- .../conversions/hkdf_expand_input.rs | 14 +- .../conversions/hkdf_extract.rs | 2 +- .../hkdf_extract/_hkdf_extract_input.rs | 24 +- .../conversions/hkdf_extract_input.rs | 14 +- .../conversions/hkdf_input.rs | 24 +- .../conversions/kdf_counter_mode.rs | 2 +- .../_kdf_counter_mode_input.rs | 30 +- .../conversions/kdf_ctr_input.rs | 24 +- .../conversions/parse_public_key.rs | 4 +- .../_parse_public_key_input.rs | 10 +- .../_parse_public_key_output.rs | 10 +- .../conversions/parse_public_key_input.rs | 17 +- .../conversions/parse_public_key_output.rs | 17 +- .../conversions/rsa_decrypt.rs | 2 +- .../rsa_decrypt/_rsa_decrypt_input.rs | 24 +- .../conversions/rsa_decrypt_input.rs | 14 +- .../conversions/rsa_encrypt.rs | 2 +- .../rsa_encrypt/_rsa_encrypt_input.rs | 24 +- .../conversions/rsa_encrypt_input.rs | 14 +- .../conversions/rsa_padding_mode.rs | 8 +- .../conversions/rsa_private_key.rs | 14 +- .../conversions/rsa_public_key.rs | 24 +- .../conversions/validate_public_key.rs | 4 +- .../_validate_public_key_input.rs | 11 +- .../_validate_public_key_output.rs | 11 +- .../conversions/validate_public_key_input.rs | 22 +- .../conversions/validate_public_key_output.rs | 21 +- .../error/sealed_unhandled.rs | 4 +- .../operation/aes_decrypt.rs | 16 +- .../aes_decrypt/_aes_decrypt_input.rs | 281 +- .../aes_decrypt/_aes_decrypt_output.rs | 44 +- .../operation/aes_decrypt/builders.rs | 199 +- .../operation/aes_encrypt.rs | 10 +- .../aes_encrypt/_aes_encrypt_input.rs | 231 +- .../aes_encrypt/_aes_encrypt_output.rs | 94 +- .../operation/aes_encrypt/builders.rs | 165 +- .../operation/aes_kdf_counter_mode.rs | 16 +- .../_aes_kdf_ctr_input.rs | 126 +- .../_aes_kdf_ctr_output.rs | 36 +- .../aes_kdf_counter_mode/builders.rs | 101 +- .../operation/compress_public_key.rs | 12 +- .../_compress_public_key_input.rs | 110 +- .../_compress_public_key_output.rs | 44 +- .../operation/compress_public_key/builders.rs | 90 +- .../operation/decompress_public_key.rs | 12 +- .../_decompress_public_key_input.rs | 102 +- .../_decompress_public_key_output.rs | 52 +- .../decompress_public_key/builders.rs | 88 +- .../operation/derive_shared_secret.rs | 12 +- .../_derive_shared_secret_input.rs | 168 +- .../_derive_shared_secret_output.rs | 44 +- .../derive_shared_secret/builders.rs | 129 +- .../operation/digest.rs | 22 +- .../operation/digest/_digest_input.rs | 110 +- .../operation/digest/_digest_output.rs | 46 +- .../operation/digest/builders.rs | 92 +- .../operation/ecdsa_sign.rs | 16 +- .../operation/ecdsa_sign/_ecdsa_sign_input.rs | 160 +- .../ecdsa_sign/_ecdsa_sign_output.rs | 44 +- .../operation/ecdsa_sign/builders.rs | 121 +- .../operation/ecdsa_verify.rs | 14 +- .../ecdsa_verify/_ecdsa_verify_input.rs | 204 +- .../ecdsa_verify/_ecdsa_verify_output.rs | 44 +- .../operation/ecdsa_verify/builders.rs | 149 +- .../operation/generate_ecc_key_pair.rs | 12 +- .../_generate_ecc_key_pair_input.rs | 56 +- .../_generate_ecc_key_pair_output.rs | 168 +- .../generate_ecc_key_pair/builders.rs | 54 +- .../operation/generate_ecdsa_signature_key.rs | 16 +- .../_generate_ecdsa_signature_key_input.rs | 62 +- .../_generate_ecdsa_signature_key_output.rs | 158 +- .../generate_ecdsa_signature_key/builders.rs | 57 +- .../operation/generate_random_bytes.rs | 16 +- .../_generate_random_bytes_input.rs | 38 +- .../_generate_random_bytes_output.rs | 38 +- .../generate_random_bytes/builders.rs | 39 +- .../operation/generate_rsa_key_pair.rs | 12 +- .../_generate_rsa_key_pair_input.rs | 38 +- .../_generate_rsa_key_pair_output.rs | 110 +- .../generate_rsa_key_pair/builders.rs | 43 +- .../get_public_key_from_private_key.rs | 16 +- .../_get_public_key_from_private_key_input.rs | 114 +- ..._get_public_key_from_private_key_output.rs | 162 +- .../builders.rs | 93 +- .../operation/get_rsa_key_modulus_length.rs | 12 +- .../_get_rsa_key_modulus_length_input.rs | 44 +- .../_get_rsa_key_modulus_length_output.rs | 38 +- .../get_rsa_key_modulus_length/builders.rs | 49 +- .../operation/h_mac.rs | 22 +- .../operation/h_mac/_h_mac_input.rs | 154 +- .../operation/h_mac/_h_mac_output.rs | 46 +- .../operation/h_mac/builders.rs | 117 +- .../operation/hkdf.rs | 22 +- .../operation/hkdf/_hkdf_input.rs | 247 +- .../operation/hkdf/_hkdf_output.rs | 44 +- .../operation/hkdf/builders.rs | 179 +- .../operation/hkdf_expand.rs | 16 +- .../hkdf_expand/_hkdf_expand_input.rs | 202 +- .../hkdf_expand/_hkdf_expand_output.rs | 44 +- .../operation/hkdf_expand/builders.rs | 148 +- .../operation/hkdf_extract.rs | 16 +- .../hkdf_extract/_hkdf_extract_input.rs | 152 +- .../hkdf_extract/_hkdf_extract_output.rs | 44 +- .../operation/hkdf_extract/builders.rs | 114 +- .../operation/kdf_counter_mode.rs | 16 +- .../kdf_counter_mode/_kdf_ctr_input.rs | 246 +- .../kdf_counter_mode/_kdf_ctr_output.rs | 44 +- .../operation/kdf_counter_mode/builders.rs | 176 +- .../operation/parse_public_key.rs | 10 +- .../_parse_public_key_input.rs | 42 +- .../_parse_public_key_output.rs | 50 +- .../operation/parse_public_key/builders.rs | 51 +- .../operation/rsa_decrypt.rs | 16 +- .../rsa_decrypt/_rsa_decrypt_input.rs | 162 +- .../rsa_decrypt/_rsa_decrypt_output.rs | 44 +- .../operation/rsa_decrypt/builders.rs | 126 +- .../operation/rsa_encrypt.rs | 16 +- .../rsa_encrypt/_rsa_encrypt_input.rs | 158 +- .../rsa_encrypt/_rsa_encrypt_output.rs | 50 +- .../operation/rsa_encrypt/builders.rs | 120 +- .../operation/validate_public_key.rs | 12 +- .../_validate_public_key_input.rs | 104 +- .../_validate_public_key_output.rs | 38 +- .../operation/validate_public_key/builders.rs | 88 +- .../deps/aws_cryptography_primitives/types.rs | 3 - .../types/_aes_ctr.rs | 78 +- .../types/_aes_decrypt_input.rs | 282 +- .../types/_aes_encrypt_input.rs | 232 +- .../types/_aes_encrypt_output.rs | 98 +- .../types/_aes_gcm.rs | 122 +- .../types/_aes_kdf_ctr_input.rs | 139 +- .../types/_compress_public_key_input.rs | 120 +- .../types/_compress_public_key_output.rs | 52 +- .../types/_decompress_public_key_input.rs | 112 +- .../types/_decompress_public_key_output.rs | 60 +- .../types/_derive_shared_secret_input.rs | 180 +- .../types/_derive_shared_secret_output.rs | 52 +- .../types/_digest_algorithm.rs | 8 +- .../types/_digest_input.rs | 109 +- .../types/_ecc_private_key.rs | 43 +- .../types/_ecc_public_key.rs | 43 +- .../types/_ecdh_curve_spec.rs | 12 +- .../types/_ecdsa_sign_input.rs | 161 +- .../types/_ecdsa_signature_algorithm.rs | 4 +- .../types/_ecdsa_verify_input.rs | 208 +- .../types/_generate_ecc_key_pair_input.rs | 64 +- .../types/_generate_ecc_key_pair_output.rs | 180 +- .../_generate_ecdsa_signature_key_input.rs | 68 +- .../_generate_ecdsa_signature_key_output.rs | 168 +- .../types/_generate_random_bytes_input.rs | 46 +- .../types/_generate_rsa_key_pair_input.rs | 46 +- .../types/_generate_rsa_key_pair_output.rs | 120 +- .../_get_public_key_from_private_key_input.rs | 122 +- ..._get_public_key_from_private_key_output.rs | 172 +- .../_get_rsa_key_modulus_length_input.rs | 52 +- .../_get_rsa_key_modulus_length_output.rs | 44 +- .../types/_h_mac_input.rs | 145 +- .../types/_hkdf_expand_input.rs | 203 +- .../types/_hkdf_extract_input.rs | 156 +- .../types/_hkdf_input.rs | 239 +- .../types/_kdf_ctr_input.rs | 247 +- .../types/_parse_public_key_input.rs | 51 +- .../types/_parse_public_key_output.rs | 60 +- .../types/_rsa_decrypt_input.rs | 163 +- .../types/_rsa_encrypt_input.rs | 159 +- .../types/_rsa_padding_mode.rs | 16 +- .../types/_rsa_private_key.rs | 89 +- .../types/_rsa_public_key.rs | 89 +- .../types/_validate_public_key_input.rs | 114 +- .../types/_validate_public_key_output.rs | 46 +- .../types/crypto_config.rs | 25 +- .../types/error.rs | 20 +- .../aws_cryptography_primitives/validation.rs | 5255 +- .../src/deps/com_amazonaws_dynamodb/client.rs | 942 +- .../com_amazonaws_dynamodb/conversions.rs | 406 +- ...pproximate_creation_date_time_precision.rs | 6 +- .../conversions/archival_summary.rs | 24 +- .../conversions/attribute_action.rs | 6 +- .../conversions/attribute_definition.rs | 25 +- .../conversions/attribute_value.rs | 14 +- .../conversions/attribute_value_update.rs | 45 +- .../auto_scaling_policy_description.rs | 12 +- .../conversions/auto_scaling_policy_update.rs | 10 +- .../auto_scaling_settings_description.rs | 14 +- .../auto_scaling_settings_update.rs | 12 +- ...caling_policy_configuration_description.rs | 9 +- ...ing_scaling_policy_configuration_update.rs | 31 +- .../conversions/backup_description.rs | 16 +- .../conversions/backup_details.rs | 51 +- .../conversions/backup_status.rs | 8 +- .../conversions/backup_summary.rs | 74 +- .../conversions/backup_type.rs | 8 +- .../conversions/backup_type_filter.rs | 6 +- .../conversions/batch_execute_statement.rs | 8 +- .../_batch_execute_statement_request.rs | 14 +- .../_batch_execute_statement_response.rs | 20 +- .../conversions/batch_get_item.rs | 8 +- .../batch_get_item/_batch_get_item_request.rs | 14 +- .../_batch_get_item_response.rs | 28 +- .../conversions/batch_statement_error.rs | 12 +- .../batch_statement_error_code_enum.rs | 6 +- .../conversions/batch_statement_request.rs | 13 +- .../conversions/batch_statement_response.rs | 16 +- .../conversions/batch_write_item.rs | 8 +- .../_batch_write_item_request.rs | 18 +- .../_batch_write_item_response.rs | 28 +- .../conversions/billing_mode.rs | 8 +- .../conversions/billing_mode_summary.rs | 33 +- .../conversions/cancellation_reason.rs | 14 +- .../conversions/capacity.rs | 26 +- .../conversions/client.rs | 35 +- .../conversions/comparison_operator.rs | 6 +- .../conversions/condition.rs | 15 +- .../conversions/condition_check.rs | 19 +- .../conversions/conditional_operator.rs | 6 +- .../conversions/consumed_capacity.rs | 20 +- .../continuous_backups_description.rs | 11 +- .../conversions/continuous_backups_status.rs | 6 +- .../contributor_insights_action.rs | 6 +- .../contributor_insights_status.rs | 6 +- .../contributor_insights_summary.rs | 12 +- .../conversions/create_backup.rs | 8 +- .../create_backup/_create_backup_request.rs | 26 +- .../create_backup/_create_backup_response.rs | 30 +- .../create_global_secondary_index_action.rs | 15 +- .../conversions/create_global_table.rs | 8 +- .../_create_global_table_request.rs | 12 +- .../_create_global_table_response.rs | 14 +- .../conversions/create_replica_action.rs | 19 +- .../create_replication_group_member_action.rs | 19 +- .../conversions/create_table.rs | 8 +- .../create_table/_create_table_request.rs | 38 +- .../create_table/_create_table_response.rs | 30 +- .../conversions/csv_options.rs | 14 +- .../conversions/delete.rs | 21 +- .../conversions/delete_backup.rs | 8 +- .../delete_backup/_delete_backup_request.rs | 20 +- .../delete_backup/_delete_backup_response.rs | 30 +- .../delete_global_secondary_index_action.rs | 19 +- .../conversions/delete_item.rs | 8 +- .../delete_item/_delete_item_request.rs | 30 +- .../delete_item/_delete_item_response.rs | 20 +- .../conversions/delete_replica_action.rs | 19 +- .../delete_replication_group_member_action.rs | 19 +- .../conversions/delete_request.rs | 11 +- .../conversions/delete_resource_policy.rs | 8 +- .../_delete_resource_policy_request.rs | 24 +- .../_delete_resource_policy_response.rs | 18 +- .../conversions/delete_table.rs | 8 +- .../delete_table/_delete_table_request.rs | 20 +- .../delete_table/_delete_table_response.rs | 30 +- .../conversions/describe_backup.rs | 8 +- .../_describe_backup_request.rs | 20 +- .../_describe_backup_response.rs | 30 +- .../describe_continuous_backups.rs | 8 +- .../_describe_continuous_backups_request.rs | 10 +- .../_describe_continuous_backups_response.rs | 14 +- .../describe_contributor_insights.rs | 8 +- .../_describe_contributor_insights_request.rs | 10 +- ..._describe_contributor_insights_response.rs | 18 +- .../conversions/describe_endpoints.rs | 30 +- .../_describe_endpoints_request.rs | 15 +- .../_describe_endpoints_response.rs | 13 +- .../conversions/describe_export.rs | 8 +- .../_describe_export_request.rs | 20 +- .../_describe_export_response.rs | 30 +- .../conversions/describe_global_table.rs | 8 +- .../_describe_global_table_request.rs | 20 +- .../_describe_global_table_response.rs | 14 +- .../describe_global_table_settings.rs | 8 +- ..._describe_global_table_settings_request.rs | 10 +- ...describe_global_table_settings_response.rs | 19 +- .../conversions/describe_import.rs | 8 +- .../_describe_import_request.rs | 20 +- .../_describe_import_response.rs | 21 +- .../describe_kinesis_streaming_destination.rs | 8 +- ...e_kinesis_streaming_destination_request.rs | 10 +- ..._kinesis_streaming_destination_response.rs | 16 +- .../conversions/describe_limits.rs | 8 +- .../_describe_limits_request.rs | 15 +- .../_describe_limits_response.rs | 32 +- .../conversions/describe_table.rs | 8 +- .../describe_table/_describe_table_request.rs | 20 +- .../_describe_table_response.rs | 30 +- .../describe_table_replica_auto_scaling.rs | 8 +- ...ribe_table_replica_auto_scaling_request.rs | 10 +- ...ibe_table_replica_auto_scaling_response.rs | 14 +- .../conversions/describe_time_to_live.rs | 8 +- .../_describe_time_to_live_request.rs | 20 +- .../_describe_time_to_live_response.rs | 14 +- .../conversions/destination_status.rs | 6 +- .../disable_kinesis_streaming_destination.rs | 8 +- ...e_kinesis_streaming_destination_request.rs | 12 +- ..._kinesis_streaming_destination_response.rs | 16 +- .../enable_kinesis_streaming_configuration.rs | 12 +- .../enable_kinesis_streaming_destination.rs | 8 +- ...e_kinesis_streaming_destination_request.rs | 12 +- ..._kinesis_streaming_destination_response.rs | 16 +- .../conversions/endpoint.rs | 23 +- .../conversions/error.rs | 104 +- .../error/backup_in_use_exception.rs | 6 +- .../error/backup_not_found_exception.rs | 6 +- .../conditional_check_failed_exception.rs | 8 +- ...ontinuous_backups_unavailable_exception.rs | 6 +- .../error/duplicate_item_exception.rs | 6 +- .../error/export_conflict_exception.rs | 6 +- .../error/export_not_found_exception.rs | 6 +- .../global_table_already_exists_exception.rs | 6 +- .../error/global_table_not_found_exception.rs | 6 +- ...idempotent_parameter_mismatch_exception.rs | 6 +- .../error/import_conflict_exception.rs | 6 +- .../error/import_not_found_exception.rs | 6 +- .../error/index_not_found_exception.rs | 6 +- .../error/internal_server_error.rs | 6 +- .../error/invalid_endpoint_exception.rs | 6 +- .../error/invalid_export_time_exception.rs | 6 +- .../error/invalid_restore_time_exception.rs | 6 +- ...ollection_size_limit_exceeded_exception.rs | 6 +- .../error/limit_exceeded_exception.rs | 6 +- ..._in_time_recovery_unavailable_exception.rs | 6 +- .../error/policy_not_found_exception.rs | 6 +- ...ovisioned_throughput_exceeded_exception.rs | 6 +- .../error/replica_already_exists_exception.rs | 6 +- .../error/replica_not_found_exception.rs | 6 +- .../error/request_limit_exceeded.rs | 6 +- .../error/resource_in_use_exception.rs | 6 +- .../error/resource_not_found_exception.rs | 6 +- .../error/table_already_exists_exception.rs | 6 +- .../error/table_in_use_exception.rs | 6 +- .../error/table_not_found_exception.rs | 6 +- .../error/transaction_canceled_exception.rs | 8 +- .../error/transaction_conflict_exception.rs | 6 +- .../transaction_in_progress_exception.rs | 6 +- .../conversions/execute_statement.rs | 8 +- .../_execute_statement_request.rs | 16 +- .../_execute_statement_response.rs | 24 +- .../conversions/execute_transaction.rs | 8 +- .../_execute_transaction_request.rs | 14 +- .../_execute_transaction_response.rs | 20 +- .../conversions/expected_attribute_value.rs | 18 +- .../conversions/export_description.rs | 20 +- .../conversions/export_format.rs | 8 +- .../conversions/export_status.rs | 8 +- .../conversions/export_summary.rs | 46 +- .../export_table_to_point_in_time.rs | 8 +- .../_export_table_to_point_in_time_request.rs | 18 +- ..._export_table_to_point_in_time_response.rs | 14 +- .../conversions/export_type.rs | 8 +- .../conversions/export_view_type.rs | 6 +- .../conversions/failure_exception.rs | 20 +- .../com_amazonaws_dynamodb/conversions/get.rs | 15 +- .../conversions/get_item.rs | 8 +- .../conversions/get_item/_get_item_request.rs | 20 +- .../get_item/_get_item_response.rs | 18 +- .../conversions/get_resource_policy.rs | 8 +- .../_get_resource_policy_request.rs | 20 +- .../_get_resource_policy_response.rs | 22 +- .../conversions/global_secondary_index.rs | 15 +- ...bal_secondary_index_auto_scaling_update.rs | 12 +- .../global_secondary_index_description.rs | 22 +- .../global_secondary_index_info.rs | 20 +- .../global_secondary_index_update.rs | 16 +- .../conversions/global_table.rs | 16 +- .../conversions/global_table_description.rs | 16 +- ..._global_secondary_index_settings_update.rs | 11 +- .../conversions/global_table_status.rs | 6 +- .../conversions/import_status.rs | 8 +- .../conversions/import_summary.rs | 78 +- .../conversions/import_table.rs | 8 +- .../import_table/_import_table_request.rs | 14 +- .../import_table/_import_table_response.rs | 21 +- .../conversions/import_table_description.rs | 22 +- .../incremental_export_specification.rs | 37 +- .../conversions/index_status.rs | 8 +- .../conversions/input_compression_type.rs | 6 +- .../conversions/input_format.rs | 8 +- .../conversions/input_format_options.rs | 28 +- .../conversions/item_collection_metrics.rs | 16 +- .../conversions/item_response.rs | 16 +- .../conversions/key_schema_element.rs | 25 +- .../conversions/key_type.rs | 8 +- .../conversions/keys_and_attributes.rs | 17 +- .../kinesis_data_stream_destination.rs | 14 +- .../conversions/list_backups.rs | 8 +- .../list_backups/_list_backups_request.rs | 51 +- .../list_backups/_list_backups_response.rs | 16 +- .../conversions/list_contributor_insights.rs | 8 +- .../_list_contributor_insights_request.rs | 26 +- .../_list_contributor_insights_response.rs | 16 +- .../conversions/list_exports.rs | 8 +- .../list_exports/_list_exports_request.rs | 26 +- .../list_exports/_list_exports_response.rs | 16 +- .../conversions/list_global_tables.rs | 8 +- .../_list_global_tables_request.rs | 28 +- .../_list_global_tables_response.rs | 16 +- .../conversions/list_imports.rs | 8 +- .../list_imports/_list_imports_request.rs | 26 +- .../list_imports/_list_imports_response.rs | 16 +- .../conversions/list_tables.rs | 8 +- .../list_tables/_list_tables_request.rs | 22 +- .../list_tables/_list_tables_response.rs | 14 +- .../conversions/list_tags_of_resource.rs | 8 +- .../_list_tags_of_resource_request.rs | 24 +- .../_list_tags_of_resource_response.rs | 16 +- .../conversions/local_secondary_index.rs | 11 +- .../local_secondary_index_description.rs | 16 +- .../conversions/local_secondary_index_info.rs | 16 +- .../conversions/on_demand_throughput.rs | 20 +- .../on_demand_throughput_override.rs | 16 +- .../conversions/parameterized_statement.rs | 13 +- .../point_in_time_recovery_description.rs | 12 +- .../point_in_time_recovery_specification.rs | 15 +- .../point_in_time_recovery_status.rs | 6 +- .../conversions/projection.rs | 16 +- .../conversions/projection_type.rs | 6 +- .../conversions/provisioned_throughput.rs | 17 +- .../provisioned_throughput_description.rs | 32 +- .../provisioned_throughput_override.rs | 16 +- .../com_amazonaws_dynamodb/conversions/put.rs | 21 +- .../conversions/put_item.rs | 8 +- .../conversions/put_item/_put_item_request.rs | 32 +- .../put_item/_put_item_response.rs | 20 +- .../conversions/put_request.rs | 13 +- .../conversions/put_resource_policy.rs | 8 +- .../_put_resource_policy_request.rs | 36 +- .../_put_resource_policy_response.rs | 18 +- .../conversions/query.rs | 8 +- .../conversions/query/_query_request.rs | 38 +- .../conversions/query/_query_response.rs | 28 +- .../conversions/replica.rs | 18 +- .../replica_auto_scaling_description.rs | 20 +- .../replica_auto_scaling_update.rs | 15 +- .../conversions/replica_description.rs | 22 +- .../replica_global_secondary_index.rs | 13 +- ...econdary_index_auto_scaling_description.rs | 16 +- ...bal_secondary_index_auto_scaling_update.rs | 12 +- ...lica_global_secondary_index_description.rs | 14 +- ...al_secondary_index_settings_description.rs | 15 +- ..._global_secondary_index_settings_update.rs | 11 +- .../replica_settings_description.rs | 23 +- .../conversions/replica_settings_update.rs | 17 +- .../conversions/replica_status.rs | 6 +- .../conversions/replica_update.rs | 44 +- .../conversions/replication_group_update.rs | 16 +- .../conversions/restore_summary.rs | 29 +- .../conversions/restore_table_from_backup.rs | 8 +- .../_restore_table_from_backup_request.rs | 26 +- .../_restore_table_from_backup_response.rs | 30 +- .../restore_table_to_point_in_time.rs | 8 +- ..._restore_table_to_point_in_time_request.rs | 26 +- ...restore_table_to_point_in_time_response.rs | 14 +- .../conversions/return_consumed_capacity.rs | 6 +- .../return_item_collection_metrics.rs | 6 +- .../conversions/return_value.rs | 8 +- ...eturn_values_on_condition_check_failure.rs | 6 +- .../conversions/s3_bucket_source.rs | 27 +- .../conversions/s3_sse_algorithm.rs | 6 +- .../conversions/scalar_attribute_type.rs | 6 +- .../conversions/scan.rs | 8 +- .../conversions/scan/_scan_request.rs | 34 +- .../conversions/scan/_scan_response.rs | 28 +- .../conversions/select.rs | 8 +- .../conversions/source_table_details.rs | 15 +- .../source_table_feature_details.rs | 24 +- .../conversions/sse_description.rs | 52 +- .../conversions/sse_specification.rs | 35 +- .../conversions/sse_status.rs | 8 +- .../conversions/sse_type.rs | 8 +- .../conversions/stream_specification.rs | 32 +- .../conversions/stream_view_type.rs | 6 +- .../table_auto_scaling_description.rs | 16 +- .../conversions/table_class.rs | 8 +- .../conversions/table_class_summary.rs | 31 +- .../conversions/table_creation_parameters.rs | 25 +- .../conversions/table_description.rs | 48 +- .../conversions/table_status.rs | 8 +- .../com_amazonaws_dynamodb/conversions/tag.rs | 27 +- .../conversions/tag_resource.rs | 6 +- .../tag_resource/_tag_resource_request.rs | 12 +- .../conversions/time_to_live_description.rs | 33 +- .../conversions/time_to_live_specification.rs | 21 +- .../conversions/time_to_live_status.rs | 6 +- .../conversions/transact_get_item.rs | 19 +- .../conversions/transact_get_items.rs | 8 +- .../_transact_get_items_request.rs | 14 +- .../_transact_get_items_response.rs | 20 +- .../conversions/transact_write_item.rs | 70 +- .../conversions/transact_write_items.rs | 8 +- .../_transact_write_items_request.rs | 16 +- .../_transact_write_items_response.rs | 22 +- .../conversions/untag_resource.rs | 6 +- .../untag_resource/_untag_resource_request.rs | 10 +- .../conversions/update.rs | 21 +- .../conversions/update_continuous_backups.rs | 8 +- .../_update_continuous_backups_request.rs | 10 +- .../_update_continuous_backups_response.rs | 14 +- .../update_contributor_insights.rs | 8 +- .../_update_contributor_insights_request.rs | 10 +- .../_update_contributor_insights_response.rs | 14 +- .../update_global_secondary_index_action.rs | 13 +- .../conversions/update_global_table.rs | 8 +- .../_update_global_table_request.rs | 12 +- .../_update_global_table_response.rs | 14 +- .../update_global_table_settings.rs | 8 +- .../_update_global_table_settings_request.rs | 22 +- .../_update_global_table_settings_response.rs | 16 +- .../conversions/update_item.rs | 8 +- .../update_item/_update_item_request.rs | 34 +- .../update_item/_update_item_response.rs | 20 +- .../update_kinesis_streaming_configuration.rs | 12 +- .../update_kinesis_streaming_destination.rs | 8 +- ...e_kinesis_streaming_destination_request.rs | 12 +- ..._kinesis_streaming_destination_response.rs | 16 +- .../update_replication_group_member_action.rs | 19 +- .../conversions/update_table.rs | 8 +- .../update_table/_update_table_request.rs | 34 +- .../update_table/_update_table_response.rs | 30 +- .../update_table_replica_auto_scaling.rs | 8 +- ...date_table_replica_auto_scaling_request.rs | 20 +- ...ate_table_replica_auto_scaling_response.rs | 14 +- .../conversions/update_time_to_live.rs | 8 +- .../_update_time_to_live_request.rs | 10 +- .../_update_time_to_live_response.rs | 14 +- .../conversions/write_request.rs | 46 +- .../com_amazonaws_dynamodb/types/error.rs | 200 +- .../src/deps/com_amazonaws_kms/client.rs | 2301 +- .../src/deps/com_amazonaws_kms/conversions.rs | 182 +- .../conversions/algorithm_spec.rs | 8 +- .../conversions/alias_list_entry.rs | 34 +- .../conversions/cancel_key_deletion.rs | 8 +- .../_cancel_key_deletion_request.rs | 20 +- .../_cancel_key_deletion_response.rs | 18 +- .../com_amazonaws_kms/conversions/client.rs | 38 +- .../conversions/connect_custom_key_store.rs | 8 +- .../_connect_custom_key_store_request.rs | 20 +- .../_connect_custom_key_store_response.rs | 16 +- .../conversions/connection_error_code_type.rs | 6 +- .../conversions/connection_state_type.rs | 6 +- .../conversions/create_alias.rs | 6 +- .../create_alias/_create_alias_request.rs | 26 +- .../conversions/create_custom_key_store.rs | 8 +- .../_create_custom_key_store_request.rs | 16 +- .../_create_custom_key_store_response.rs | 18 +- .../conversions/create_grant.rs | 8 +- .../create_grant/_create_grant_request.rs | 16 +- .../create_grant/_create_grant_response.rs | 22 +- .../conversions/create_key.rs | 8 +- .../create_key/_create_key_request.rs | 24 +- .../create_key/_create_key_response.rs | 34 +- .../conversions/custom_key_store_type.rs | 6 +- .../custom_key_stores_list_entry.rs | 18 +- .../conversions/customer_master_key_spec.rs | 6 +- .../conversions/data_key_pair_spec.rs | 8 +- .../conversions/data_key_spec.rs | 8 +- .../com_amazonaws_kms/conversions/decrypt.rs | 8 +- .../conversions/decrypt/_decrypt_request.rs | 20 +- .../conversions/decrypt/_decrypt_response.rs | 47 +- .../conversions/delete_alias.rs | 6 +- .../delete_alias/_delete_alias_request.rs | 20 +- .../conversions/delete_custom_key_store.rs | 8 +- .../_delete_custom_key_store_request.rs | 20 +- .../_delete_custom_key_store_response.rs | 16 +- .../delete_imported_key_material.rs | 6 +- .../_delete_imported_key_material_request.rs | 20 +- .../conversions/derive_shared_secret.rs | 8 +- .../_derive_shared_secret_request.rs | 14 +- .../_derive_shared_secret_response.rs | 16 +- .../conversions/describe_custom_key_stores.rs | 8 +- .../_describe_custom_key_stores_request.rs | 30 +- .../_describe_custom_key_stores_response.rs | 16 +- .../conversions/describe_key.rs | 8 +- .../describe_key/_describe_key_request.rs | 12 +- .../describe_key/_describe_key_response.rs | 30 +- .../conversions/disable_key.rs | 6 +- .../disable_key/_disable_key_request.rs | 22 +- .../conversions/disable_key_rotation.rs | 6 +- .../_disable_key_rotation_request.rs | 20 +- .../disconnect_custom_key_store.rs | 8 +- .../_disconnect_custom_key_store_request.rs | 20 +- .../_disconnect_custom_key_store_response.rs | 15 +- .../conversions/enable_key.rs | 6 +- .../enable_key/_enable_key_request.rs | 22 +- .../conversions/enable_key_rotation.rs | 6 +- .../_enable_key_rotation_request.rs | 24 +- .../com_amazonaws_kms/conversions/encrypt.rs | 8 +- .../conversions/encrypt/_encrypt_request.rs | 18 +- .../conversions/encrypt/_encrypt_response.rs | 43 +- .../conversions/encryption_algorithm_spec.rs | 6 +- .../com_amazonaws_kms/conversions/error.rs | 148 +- .../error/already_exists_exception.rs | 6 +- .../cloud_hsm_cluster_in_use_exception.rs | 6 +- ...cluster_invalid_configuration_exception.rs | 6 +- .../cloud_hsm_cluster_not_active_exception.rs | 6 +- .../cloud_hsm_cluster_not_found_exception.rs | 6 +- ...cloud_hsm_cluster_not_related_exception.rs | 6 +- .../conversions/error/conflict_exception.rs | 6 +- .../custom_key_store_has_cmks_exception.rs | 6 +- ...ustom_key_store_invalid_state_exception.rs | 6 +- .../custom_key_store_name_in_use_exception.rs | 6 +- .../custom_key_store_not_found_exception.rs | 6 +- .../error/dependency_timeout_exception.rs | 6 +- .../conversions/error/disabled_exception.rs | 6 +- .../error/dry_run_operation_exception.rs | 6 +- .../error/expired_import_token_exception.rs | 6 +- .../error/incorrect_key_exception.rs | 6 +- .../error/incorrect_key_material_exception.rs | 6 +- .../error/incorrect_trust_anchor_exception.rs | 6 +- .../error/invalid_alias_name_exception.rs | 6 +- .../error/invalid_arn_exception.rs | 6 +- .../error/invalid_ciphertext_exception.rs | 6 +- .../error/invalid_grant_id_exception.rs | 6 +- .../error/invalid_grant_token_exception.rs | 6 +- .../error/invalid_import_token_exception.rs | 6 +- .../error/invalid_key_usage_exception.rs | 6 +- .../error/invalid_marker_exception.rs | 6 +- .../error/key_unavailable_exception.rs | 6 +- .../error/kms_internal_exception.rs | 6 +- .../error/kms_invalid_mac_exception.rs | 6 +- .../error/kms_invalid_signature_exception.rs | 6 +- .../error/kms_invalid_state_exception.rs | 6 +- .../error/limit_exceeded_exception.rs | 6 +- .../malformed_policy_document_exception.rs | 6 +- .../conversions/error/not_found_exception.rs | 6 +- .../conversions/error/tag_exception.rs | 6 +- .../error/unsupported_operation_exception.rs | 6 +- .../error/xks_key_already_in_use_exception.rs | 6 +- ...xks_key_invalid_configuration_exception.rs | 6 +- .../error/xks_key_not_found_exception.rs | 6 +- ...ect_authentication_credential_exception.rs | 6 +- ...s_proxy_invalid_configuration_exception.rs | 6 +- .../xks_proxy_invalid_response_exception.rs | 6 +- ...xks_proxy_uri_endpoint_in_use_exception.rs | 6 +- .../error/xks_proxy_uri_in_use_exception.rs | 6 +- .../xks_proxy_uri_unreachable_exception.rs | 6 +- ...y_vpc_endpoint_service_in_use_exception.rs | 6 +- ...service_invalid_configuration_exception.rs | 6 +- ...pc_endpoint_service_not_found_exception.rs | 6 +- .../conversions/expiration_model_type.rs | 6 +- .../conversions/generate_data_key.rs | 8 +- .../_generate_data_key_request.rs | 18 +- .../_generate_data_key_response.rs | 30 +- .../conversions/generate_data_key_pair.rs | 8 +- .../_generate_data_key_pair_request.rs | 16 +- .../_generate_data_key_pair_response.rs | 49 +- ...enerate_data_key_pair_without_plaintext.rs | 8 +- ...data_key_pair_without_plaintext_request.rs | 14 +- ...ata_key_pair_without_plaintext_response.rs | 14 +- .../generate_data_key_without_plaintext.rs | 8 +- ...rate_data_key_without_plaintext_request.rs | 19 +- ...ate_data_key_without_plaintext_response.rs | 12 +- .../conversions/generate_mac.rs | 8 +- .../generate_mac/_generate_mac_request.rs | 12 +- .../generate_mac/_generate_mac_response.rs | 37 +- .../conversions/generate_random.rs | 8 +- .../_generate_random_request.rs | 38 +- .../_generate_random_response.rs | 22 +- .../conversions/get_key_policy.rs | 8 +- .../get_key_policy/_get_key_policy_request.rs | 24 +- .../_get_key_policy_response.rs | 22 +- .../conversions/get_key_rotation_status.rs | 8 +- .../_get_key_rotation_status_request.rs | 20 +- .../_get_key_rotation_status_response.rs | 36 +- .../conversions/get_parameters_for_import.rs | 8 +- .../_get_parameters_for_import_request.rs | 32 +- .../_get_parameters_for_import_response.rs | 30 +- .../conversions/get_public_key.rs | 8 +- .../get_public_key/_get_public_key_request.rs | 12 +- .../_get_public_key_response.rs | 30 +- .../conversions/grant_constraints.rs | 16 +- .../conversions/grant_list_entry.rs | 18 +- .../conversions/grant_operation.rs | 8 +- .../conversions/import_key_material.rs | 8 +- .../_import_key_material_request.rs | 49 +- .../_import_key_material_response.rs | 16 +- .../key_agreement_algorithm_spec.rs | 6 +- .../conversions/key_encryption_mechanism.rs | 6 +- .../conversions/key_list_entry.rs | 22 +- .../conversions/key_manager_type.rs | 8 +- .../conversions/key_metadata.rs | 45 +- .../com_amazonaws_kms/conversions/key_spec.rs | 8 +- .../conversions/key_state.rs | 8 +- .../conversions/key_usage_type.rs | 8 +- .../conversions/list_aliases.rs | 8 +- .../list_aliases/_list_aliases_request.rs | 26 +- .../list_aliases/_list_aliases_response.rs | 16 +- .../conversions/list_grants.rs | 8 +- .../list_grants/_list_grants_request.rs | 38 +- .../list_grants/_list_grants_response.rs | 16 +- .../conversions/list_key_policies.rs | 8 +- .../_list_key_policies_request.rs | 28 +- .../_list_key_policies_response.rs | 14 +- .../conversions/list_key_rotations.rs | 8 +- .../_list_key_rotations_request.rs | 28 +- .../_list_key_rotations_response.rs | 16 +- .../conversions/list_keys.rs | 8 +- .../list_keys/_list_keys_request.rs | 24 +- .../list_keys/_list_keys_response.rs | 20 +- .../conversions/list_resource_tags.rs | 8 +- .../_list_resource_tags_request.rs | 28 +- .../_list_resource_tags_response.rs | 16 +- .../conversions/mac_algorithm_spec.rs | 8 +- .../conversions/message_type.rs | 8 +- .../conversions/multi_region_configuration.rs | 18 +- .../conversions/multi_region_key.rs | 22 +- .../conversions/multi_region_key_type.rs | 6 +- .../conversions/origin_type.rs | 8 +- .../conversions/put_key_policy.rs | 6 +- .../put_key_policy/_put_key_policy_request.rs | 36 +- .../conversions/re_encrypt.rs | 8 +- .../re_encrypt/_re_encrypt_request.rs | 22 +- .../re_encrypt/_re_encrypt_response.rs | 20 +- .../conversions/recipient_info.rs | 35 +- .../conversions/replicate_key.rs | 8 +- .../replicate_key/_replicate_key_request.rs | 14 +- .../replicate_key/_replicate_key_response.rs | 18 +- .../conversions/retire_grant.rs | 6 +- .../retire_grant/_retire_grant_request.rs | 30 +- .../conversions/revoke_grant.rs | 6 +- .../revoke_grant/_revoke_grant_request.rs | 30 +- .../conversions/rotate_key_on_demand.rs | 8 +- .../_rotate_key_on_demand_request.rs | 20 +- .../_rotate_key_on_demand_response.rs | 18 +- .../conversions/rotation_type.rs | 8 +- .../conversions/rotations_list_entry.rs | 35 +- .../conversions/schedule_key_deletion.rs | 8 +- .../_schedule_key_deletion_request.rs | 24 +- .../_schedule_key_deletion_response.rs | 41 +- .../com_amazonaws_kms/conversions/sign.rs | 8 +- .../conversions/sign/_sign_request.rs | 16 +- .../conversions/sign/_sign_response.rs | 43 +- .../conversions/signing_algorithm_spec.rs | 6 +- .../deps/com_amazonaws_kms/conversions/tag.rs | 27 +- .../conversions/tag_resource.rs | 6 +- .../tag_resource/_tag_resource_request.rs | 12 +- .../conversions/untag_resource.rs | 6 +- .../untag_resource/_untag_resource_request.rs | 10 +- .../conversions/update_alias.rs | 6 +- .../update_alias/_update_alias_request.rs | 26 +- .../conversions/update_custom_key_store.rs | 8 +- .../_update_custom_key_store_request.rs | 14 +- .../_update_custom_key_store_response.rs | 16 +- .../conversions/update_key_description.rs | 6 +- .../_update_key_description_request.rs | 26 +- .../conversions/update_primary_region.rs | 6 +- .../_update_primary_region_request.rs | 26 +- .../com_amazonaws_kms/conversions/verify.rs | 8 +- .../conversions/verify/_verify_request.rs | 16 +- .../conversions/verify/_verify_response.rs | 43 +- .../conversions/verify_mac.rs | 8 +- .../verify_mac/_verify_mac_request.rs | 14 +- .../verify_mac/_verify_mac_response.rs | 41 +- .../conversions/wrapping_key_spec.rs | 8 +- .../conversions/xks_key_configuration_type.rs | 16 +- ...ks_proxy_authentication_credential_type.rs | 25 +- .../xks_proxy_configuration_type.rs | 12 +- .../xks_proxy_connectivity_type.rs | 6 +- .../src/deps/com_amazonaws_kms/types/error.rs | 290 +- releases/rust/db_esdk/src/digest.rs | 10 +- releases/rust/db_esdk/src/ecdh.rs | 12 +- releases/rust/db_esdk/src/ecdsa.rs | 4 +- .../db_esdk/src/error/sealed_unhandled.rs | 4 +- releases/rust/db_esdk/src/hmac.rs | 41 +- .../db_esdk/src/implementation_from_dafny.rs | 270445 ++++++++------- releases/rust/db_esdk/src/intercept.rs | 3 +- releases/rust/db_esdk/src/kms.rs | 12 +- releases/rust/db_esdk/src/lib.rs | 48 +- releases/rust/db_esdk/src/local_cmc.rs | 12 +- ...batch_execute_statement_input_transform.rs | 8 +- ...execute_statement_input_transform_input.rs | 62 +- ...xecute_statement_input_transform_output.rs | 62 +- .../builders.rs | 57 +- ...atch_execute_statement_output_transform.rs | 8 +- ...xecute_statement_output_transform_input.rs | 126 +- ...ecute_statement_output_transform_output.rs | 62 +- .../builders.rs | 99 +- .../batch_get_item_input_transform.rs | 6 +- .../_batch_get_item_input_transform_input.rs | 62 +- .../_batch_get_item_input_transform_output.rs | 62 +- .../builders.rs | 56 +- .../batch_get_item_output_transform.rs | 6 +- .../_batch_get_item_output_transform_input.rs | 124 +- ..._batch_get_item_output_transform_output.rs | 64 +- .../builders.rs | 97 +- .../batch_write_item_input_transform.rs | 6 +- ..._batch_write_item_input_transform_input.rs | 64 +- ...batch_write_item_input_transform_output.rs | 56 +- .../builders.rs | 58 +- .../batch_write_item_output_transform.rs | 6 +- ...batch_write_item_output_transform_input.rs | 116 +- ...atch_write_item_output_transform_output.rs | 56 +- .../builders.rs | 99 +- .../operation/delete_item_input_transform.rs | 6 +- .../_delete_item_input_transform_input.rs | 59 +- .../_delete_item_input_transform_output.rs | 58 +- .../delete_item_input_transform/builders.rs | 53 +- .../operation/delete_item_output_transform.rs | 6 +- .../_delete_item_output_transform_input.rs | 114 +- .../_delete_item_output_transform_output.rs | 58 +- .../delete_item_output_transform/builders.rs | 89 +- .../execute_statement_input_transform.rs | 6 +- ...execute_statement_input_transform_input.rs | 58 +- ...xecute_statement_input_transform_output.rs | 58 +- .../builders.rs | 58 +- .../execute_statement_output_transform.rs | 6 +- ...xecute_statement_output_transform_input.rs | 122 +- ...ecute_statement_output_transform_output.rs | 60 +- .../builders.rs | 100 +- .../execute_transaction_input_transform.rs | 8 +- ...ecute_transaction_input_transform_input.rs | 62 +- ...cute_transaction_input_transform_output.rs | 62 +- .../builders.rs | 57 +- .../execute_transaction_output_transform.rs | 8 +- ...cute_transaction_output_transform_input.rs | 126 +- ...ute_transaction_output_transform_output.rs | 62 +- .../builders.rs | 99 +- .../src/operation/get_item_input_transform.rs | 5 +- .../_get_item_input_transform_input.rs | 59 +- .../_get_item_input_transform_output.rs | 60 +- .../get_item_input_transform/builders.rs | 56 +- .../operation/get_item_output_transform.rs | 2 +- .../_get_item_output_transform_input.rs | 114 +- .../_get_item_output_transform_output.rs | 60 +- .../get_item_output_transform/builders.rs | 95 +- .../src/operation/put_item_input_transform.rs | 5 +- .../_put_item_input_transform_input.rs | 59 +- .../_put_item_input_transform_output.rs | 60 +- .../put_item_input_transform/builders.rs | 56 +- .../operation/put_item_output_transform.rs | 2 +- .../_put_item_output_transform_input.rs | 114 +- .../_put_item_output_transform_output.rs | 60 +- .../put_item_output_transform/builders.rs | 95 +- .../src/operation/query_input_transform.rs | 5 +- .../_query_input_transform_input.rs | 58 +- .../_query_input_transform_output.rs | 61 +- .../query_input_transform/builders.rs | 55 +- .../src/operation/query_output_transform.rs | 5 +- .../_query_output_transform_input.rs | 112 +- .../_query_output_transform_output.rs | 58 +- .../query_output_transform/builders.rs | 91 +- .../src/operation/resolve_attributes.rs | 7 +- .../_resolve_attributes_input.rs | 163 +- .../_resolve_attributes_output.rs | 135 +- .../operation/resolve_attributes/builders.rs | 117 +- .../src/operation/scan_input_transform.rs | 7 +- .../_scan_input_transform_input.rs | 55 +- .../_scan_input_transform_output.rs | 58 +- .../scan_input_transform/builders.rs | 52 +- .../src/operation/scan_output_transform.rs | 5 +- .../_scan_output_transform_input.rs | 112 +- .../_scan_output_transform_output.rs | 61 +- .../scan_output_transform/builders.rs | 91 +- .../transact_get_items_input_transform.rs | 6 +- ...ransact_get_items_input_transform_input.rs | 60 +- ...ansact_get_items_input_transform_output.rs | 60 +- .../builders.rs | 59 +- .../transact_get_items_output_transform.rs | 8 +- ...ansact_get_items_output_transform_input.rs | 124 +- ...nsact_get_items_output_transform_output.rs | 62 +- .../builders.rs | 99 +- .../transact_write_items_input_transform.rs | 8 +- ...nsact_write_items_input_transform_input.rs | 62 +- ...sact_write_items_input_transform_output.rs | 62 +- .../builders.rs | 57 +- .../transact_write_items_output_transform.rs | 8 +- ...sact_write_items_output_transform_input.rs | 126 +- ...act_write_items_output_transform_output.rs | 62 +- .../builders.rs | 99 +- .../operation/update_item_input_transform.rs | 6 +- .../_update_item_input_transform_input.rs | 59 +- .../_update_item_input_transform_output.rs | 58 +- .../update_item_input_transform/builders.rs | 53 +- .../operation/update_item_output_transform.rs | 6 +- .../_update_item_output_transform_input.rs | 114 +- .../_update_item_output_transform_output.rs | 58 +- .../update_item_output_transform/builders.rs | 89 +- releases/rust/db_esdk/src/oslang.rs | 37 + releases/rust/db_esdk/src/random.rs | 10 +- releases/rust/db_esdk/src/rsa.rs | 2 +- releases/rust/db_esdk/src/sets.rs | 6 +- releases/rust/db_esdk/src/software_externs.rs | 2 +- .../src/standard_library_conversions.rs | 71 +- .../db_esdk/src/standard_library_externs.rs | 16 +- releases/rust/db_esdk/src/storm_tracker.rs | 30 +- releases/rust/db_esdk/src/time.rs | 4 +- releases/rust/db_esdk/src/types.rs | 5 - ...execute_statement_input_transform_input.rs | 58 +- ...xecute_statement_input_transform_output.rs | 58 +- ...xecute_statement_output_transform_input.rs | 124 +- ...ecute_statement_output_transform_output.rs | 58 +- .../_batch_get_item_input_transform_input.rs | 52 +- .../_batch_get_item_input_transform_output.rs | 52 +- .../_batch_get_item_output_transform_input.rs | 114 +- ..._batch_get_item_output_transform_output.rs | 54 +- ..._batch_write_item_input_transform_input.rs | 54 +- ...batch_write_item_input_transform_output.rs | 54 +- ...batch_write_item_output_transform_input.rs | 116 +- ...atch_write_item_output_transform_output.rs | 54 +- .../_delete_item_input_transform_input.rs | 47 +- .../_delete_item_input_transform_output.rs | 48 +- .../_delete_item_output_transform_input.rs | 104 +- .../_delete_item_output_transform_output.rs | 48 +- ...execute_statement_input_transform_input.rs | 56 +- ...xecute_statement_input_transform_output.rs | 56 +- ...xecute_statement_output_transform_input.rs | 122 +- ...ecute_statement_output_transform_output.rs | 58 +- ...ecute_transaction_input_transform_input.rs | 58 +- ...cute_transaction_input_transform_output.rs | 58 +- ...cute_transaction_output_transform_input.rs | 124 +- ...ute_transaction_output_transform_output.rs | 58 +- .../types/_get_item_input_transform_input.rs | 47 +- .../types/_get_item_input_transform_output.rs | 48 +- .../types/_get_item_output_transform_input.rs | 102 +- .../_get_item_output_transform_output.rs | 48 +- .../types/_put_item_input_transform_input.rs | 47 +- .../types/_put_item_input_transform_output.rs | 48 +- .../types/_put_item_output_transform_input.rs | 102 +- .../_put_item_output_transform_output.rs | 48 +- .../src/types/_query_input_transform_input.rs | 44 +- .../types/_query_input_transform_output.rs | 47 +- .../types/_query_output_transform_input.rs | 101 +- .../types/_query_output_transform_output.rs | 47 +- .../src/types/_resolve_attributes_input.rs | 152 +- .../src/types/_resolve_attributes_output.rs | 124 +- .../src/types/_scan_input_transform_input.rs | 44 +- .../src/types/_scan_input_transform_output.rs | 47 +- .../src/types/_scan_output_transform_input.rs | 98 +- .../types/_scan_output_transform_output.rs | 47 +- ...ransact_get_items_input_transform_input.rs | 58 +- ...ansact_get_items_input_transform_output.rs | 58 +- ...ansact_get_items_output_transform_input.rs | 124 +- ...nsact_get_items_output_transform_output.rs | 58 +- ...nsact_write_items_input_transform_input.rs | 58 +- ...sact_write_items_input_transform_output.rs | 58 +- ...sact_write_items_output_transform_input.rs | 124 +- ...act_write_items_output_transform_output.rs | 58 +- .../_update_item_input_transform_input.rs | 47 +- .../_update_item_input_transform_output.rs | 48 +- .../_update_item_output_transform_input.rs | 104 +- .../_update_item_output_transform_output.rs | 48 +- .../dynamo_db_tables_encryption_config.rs | 50 +- releases/rust/db_esdk/src/types/error.rs | 14 +- releases/rust/db_esdk/src/uuid.rs | 16 +- releases/rust/db_esdk/src/validation.rs | 16907 +- 2045 files changed, 213090 insertions(+), 185477 deletions(-) create mode 100644 releases/rust/db_esdk/src/oslang.rs diff --git a/.github/workflows/ci_todos.yml b/.github/workflows/ci_todos.yml index 12efe41d9..63a5622b7 100644 --- a/.github/workflows/ci_todos.yml +++ b/.github/workflows/ci_todos.yml @@ -17,8 +17,8 @@ jobs: shell: bash # TODOs may be committed as long as the same line contains a link to a Github Issue or refers to a CrypTool SIM. run: | - ALL_TODO_COUNT=$( { grep -r "TODO" . --exclude-dir=./TestVectors/runtimes --exclude-dir=./submodules --exclude-dir=./.git --exclude=./.github/workflows/ci_todos.yml || true; } | wc -l) - GOOD_TODO_COUNT=$( { grep -r "TODO.*\(github.com\/.*issues.*\/[1-9][0-9]*\|CrypTool-[1-9][0-9]*\)" . --exclude-dir=./submodules --exclude-dir=./.git --exclude-dir=./TestVectors/runtimes --exclude=./.github/workflows/ci_todos.yml || true; } | wc -l) + ALL_TODO_COUNT=$( { grep -r "TODO" . --exclude-dir=./releases --exclude-dir=./TestVectors/runtimes --exclude-dir=./submodules --exclude-dir=./.git --exclude=./.github/workflows/ci_todos.yml || true; } | wc -l) + GOOD_TODO_COUNT=$( { grep -r "TODO.*\(github.com\/.*issues.*\/[1-9][0-9]*\|CrypTool-[1-9][0-9]*\)" . --exclude-dir=./releases --exclude-dir=./submodules --exclude-dir=./.git --exclude-dir=./TestVectors/runtimes --exclude=./.github/workflows/ci_todos.yml || true; } | wc -l) if [ "$ALL_TODO_COUNT" != "$GOOD_TODO_COUNT" ]; then exit 1; fi diff --git a/DynamoDbEncryption/runtimes/rust/Cargo.toml b/DynamoDbEncryption/runtimes/rust/Cargo.toml index 9c2f41341..cdad092d6 100644 --- a/DynamoDbEncryption/runtimes/rust/Cargo.toml +++ b/DynamoDbEncryption/runtimes/rust/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "aws-db-esdk" -version = "0.2.0" +version = "1.0.0" edition = "2021" rust-version = "1.81.0" keywords = ["cryptography", "security", "dynamodb", "encryption", "client-side"] diff --git a/SUPPORT_POLICY.rst b/SUPPORT_POLICY.rst index dbaf37aa7..9d79dc87c 100644 --- a/SUPPORT_POLICY.rst +++ b/SUPPORT_POLICY.rst @@ -30,4 +30,21 @@ This table describes the current support status of each major version of the AWS - - +Version Support Matrix for Rust +=============================== +This table describes the current support status of each major version of the AWS Encryption SDK for Rust. It also shows the next status each major version will transition to, and the date at which that transition will happen. + +.. list-table:: + :widths: 30 50 50 50 + :header-rows: 1 + + * - Major version + - Current status + - Next status + - Next status date + * - 1.x + - Generally Available + - + - + .. _AWS SDKs and Tools Maintenance Policy: https://docs.aws.amazon.com/sdkref/latest/guide/maint-policy.html#version-life-cycle diff --git a/releases/rust/db_esdk/Cargo.toml b/releases/rust/db_esdk/Cargo.toml index 9dcc9c7dc..2df70f170 100644 --- a/releases/rust/db_esdk/Cargo.toml +++ b/releases/rust/db_esdk/Cargo.toml @@ -1,6 +1,6 @@ [package] name = "aws-db-esdk" -version = "0.2.0" +version = "1.0.0" edition = "2021" rust-version = "1.81.0" keywords = ["cryptography", "security", "dynamodb", "encryption", "client-side"] @@ -16,20 +16,20 @@ readme = "README.md" # See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html [dependencies] -aws-config = "1.5.11" -aws-lc-rs = "1.12.0" -aws-lc-sys = "0.24.0" -aws-sdk-dynamodb = "1.56.0" -aws-sdk-kms = "1.52.0" +aws-config = "1.5.15" +aws-lc-rs = "1.12.2" +aws-lc-sys = "0.25.0" +aws-sdk-dynamodb = "1.62.0" +aws-sdk-kms = "1.57.0" aws-smithy-runtime-api = {version = "1.7.3", features = ["client"] } -aws-smithy-types = "1.2.10" +aws-smithy-types = "1.2.12" chrono = "0.4.39" cpu-time = "1.0.0" -dafny-runtime = "0.1.1" +dafny-runtime = { version = "0.2.0", features = ["sync"] } dashmap = "6.1.0" pem = "3.0.4" -tokio = {version = "1.42.0", features = ["full"] } -uuid = { version = "1.11.0", features = ["v4"] } +tokio = {version = "1.43.0", features = ["full"] } +uuid = { version = "1.12.1", features = ["v4"] } [[example]] name = "main" diff --git a/releases/rust/db_esdk/README.md b/releases/rust/db_esdk/README.md index 1773293b2..fdd9c5c92 100644 --- a/releases/rust/db_esdk/README.md +++ b/releases/rust/db_esdk/README.md @@ -22,7 +22,7 @@ see the [AWS Database Encryption SDK Developer Guide](https://docs.aws.amazon.co ## Examples for AWS Database Encryption SDK in Rust -Please look at the Examples on how to use the AWS Database Encryption SDK in Rust [here](https://github.com/aws/aws-database-encryption-sdk-dynamodb/tree/main/DynamoDbEncryption/runtimes/rust/examples). +Please look at the Examples on how to use the AWS Database Encryption SDK in Rust [here](https://github.com/aws/aws-database-encryption-sdk-dynamodb/tree/main/releases/rust/db_esdk/examples). Please note that some examples MAY require internet access and valid AWS credentials, since calls to KMS are made. diff --git a/releases/rust/db_esdk/examples/basic_get_put_example.rs b/releases/rust/db_esdk/examples/basic_get_put_example.rs index ffbfeb916..c5f91815b 100644 --- a/releases/rust/db_esdk/examples/basic_get_put_example.rs +++ b/releases/rust/db_esdk/examples/basic_get_put_example.rs @@ -5,13 +5,13 @@ use crate::test_utils; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; -use aws_db_esdk::CryptoAction; use aws_db_esdk::material_providers::client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; +use aws_db_esdk::CryptoAction; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; use aws_db_esdk::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig; /* diff --git a/releases/rust/db_esdk/examples/clientsupplier/client_supplier_example.rs b/releases/rust/db_esdk/examples/clientsupplier/client_supplier_example.rs index eb315e761..b8d564966 100644 --- a/releases/rust/db_esdk/examples/clientsupplier/client_supplier_example.rs +++ b/releases/rust/db_esdk/examples/clientsupplier/client_supplier_example.rs @@ -4,11 +4,11 @@ use super::regional_role_client_supplier::RegionalRoleClientSupplier; use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::DiscoveryFilter; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/clientsupplier/regional_role_client_supplier.rs b/releases/rust/db_esdk/examples/clientsupplier/regional_role_client_supplier.rs index 353645640..e1d485321 100644 --- a/releases/rust/db_esdk/examples/clientsupplier/regional_role_client_supplier.rs +++ b/releases/rust/db_esdk/examples/clientsupplier/regional_role_client_supplier.rs @@ -2,10 +2,10 @@ // SPDX-License-Identifier: Apache-2.0 use aws_config::Region; +use aws_db_esdk::com_amazonaws_kms::client::Client as kms_client; use aws_db_esdk::material_providers::operation::get_client::GetClientInput; use aws_db_esdk::material_providers::types::error::Error; use aws_db_esdk::material_providers::types::ClientSupplier; -use aws_db_esdk::com_amazonaws_kms::client::Client as kms_client; /* Example class demonstrating an implementation of a custom client supplier. diff --git a/releases/rust/db_esdk/examples/itemencryptor/item_encrypt_decrypt.rs b/releases/rust/db_esdk/examples/itemencryptor/item_encrypt_decrypt.rs index 92e95a5ca..db96a94ac 100644 --- a/releases/rust/db_esdk/examples/itemencryptor/item_encrypt_decrypt.rs +++ b/releases/rust/db_esdk/examples/itemencryptor/item_encrypt_decrypt.rs @@ -5,12 +5,12 @@ use crate::test_utils; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; -use aws_db_esdk::CryptoAction; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; +use aws_db_esdk::CryptoAction; -use aws_db_esdk::item_encryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig; use aws_db_esdk::item_encryptor::client as enc_client; +use aws_db_esdk::item_encryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig; use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; /* diff --git a/releases/rust/db_esdk/examples/keyring/hierarchical_keyring.rs b/releases/rust/db_esdk/examples/keyring/hierarchical_keyring.rs index 287a8c659..df8142658 100644 --- a/releases/rust/db_esdk/examples/keyring/hierarchical_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/hierarchical_keyring.rs @@ -5,14 +5,14 @@ use super::branch_key_id_supplier::ExampleBranchKeyIdSupplier; use crate::test_utils; use aws_db_esdk::dynamodb::client as dbesdk_client; use aws_db_esdk::dynamodb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig; +use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; use aws_db_esdk::CryptoAction; -use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/keyring/kms_rsa_keyring.rs b/releases/rust/db_esdk/examples/keyring/kms_rsa_keyring.rs index e65ffa829..7ae049175 100644 --- a/releases/rust/db_esdk/examples/keyring/kms_rsa_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/kms_rsa_keyring.rs @@ -3,11 +3,11 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; @@ -15,7 +15,7 @@ use std::fs::File; use std::io::Read; use std::io::Write; use std::path::Path; - + /* This example sets up DynamoDb Encryption for the AWS SDK client using the KMS RSA Keyring. This keyring uses a KMS RSA key pair to diff --git a/releases/rust/db_esdk/examples/keyring/mrk_discovery_multi_keyring.rs b/releases/rust/db_esdk/examples/keyring/mrk_discovery_multi_keyring.rs index 55f895562..689bdd4cb 100644 --- a/releases/rust/db_esdk/examples/keyring/mrk_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/mrk_discovery_multi_keyring.rs @@ -3,11 +3,11 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::DiscoveryFilter; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/keyring/multi_keyring.rs b/releases/rust/db_esdk/examples/keyring/multi_keyring.rs index 2fcfe8cd7..cb0543b1e 100644 --- a/releases/rust/db_esdk/examples/keyring/multi_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/multi_keyring.rs @@ -3,11 +3,11 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::AesWrappingAlg; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/keyring/multi_mrk_keyring.rs b/releases/rust/db_esdk/examples/keyring/multi_mrk_keyring.rs index 115f3c16d..7151ac552 100644 --- a/releases/rust/db_esdk/examples/keyring/multi_mrk_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/multi_mrk_keyring.rs @@ -3,10 +3,10 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/keyring/raw_aes_keyring.rs b/releases/rust/db_esdk/examples/keyring/raw_aes_keyring.rs index 91775090e..fc22e4deb 100644 --- a/releases/rust/db_esdk/examples/keyring/raw_aes_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/raw_aes_keyring.rs @@ -3,11 +3,11 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::AesWrappingAlg; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/keyring/raw_rsa_keyring.rs b/releases/rust/db_esdk/examples/keyring/raw_rsa_keyring.rs index 4c6c6d331..408db258e 100644 --- a/releases/rust/db_esdk/examples/keyring/raw_rsa_keyring.rs +++ b/releases/rust/db_esdk/examples/keyring/raw_rsa_keyring.rs @@ -3,11 +3,11 @@ use crate::test_utils; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; use aws_db_esdk::material_providers::types::PaddingScheme; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/multi_get_put_example.rs b/releases/rust/db_esdk/examples/multi_get_put_example.rs index 02aab30fc..c0acca1c8 100644 --- a/releases/rust/db_esdk/examples/multi_get_put_example.rs +++ b/releases/rust/db_esdk/examples/multi_get_put_example.rs @@ -5,13 +5,13 @@ use crate::test_utils; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; -use aws_db_esdk::CryptoAction; use aws_db_esdk::material_providers::client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; +use aws_db_esdk::CryptoAction; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; -use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::material_providers::types::DbeAlgorithmSuiteId; use aws_db_esdk::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig; /* diff --git a/releases/rust/db_esdk/examples/searchableencryption/basic_searchable_encryption.rs b/releases/rust/db_esdk/examples/searchableencryption/basic_searchable_encryption.rs index d9b8cc47d..ff89bd578 100644 --- a/releases/rust/db_esdk/examples/searchableencryption/basic_searchable_encryption.rs +++ b/releases/rust/db_esdk/examples/searchableencryption/basic_searchable_encryption.rs @@ -5,9 +5,9 @@ use crate::test_utils; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; -use aws_db_esdk::CryptoAction; use aws_db_esdk::material_providers::client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; +use aws_db_esdk::CryptoAction; use aws_db_esdk::dynamodb::types::BeaconKeySource; use aws_db_esdk::dynamodb::types::BeaconVersion; @@ -15,10 +15,10 @@ use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; use aws_db_esdk::dynamodb::types::SearchConfig; use aws_db_esdk::dynamodb::types::SingleKeyStore; use aws_db_esdk::dynamodb::types::StandardBeacon; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; -use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig; /* @@ -52,305 +52,309 @@ use aws_db_esdk::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryp const GSI_NAME: &str = "last4-unit-index"; pub async fn put_and_query_with_beacon(branch_key_id: &str) -> Result<(), crate::BoxError> { - let ddb_table_name = test_utils::UNIT_INSPECTION_TEST_DDB_TABLE_NAME; - let branch_key_wrapping_kms_key_arn = test_utils::TEST_BRANCH_KEY_WRAPPING_KMS_KEY_ARN; - let branch_key_ddb_table_name = test_utils::TEST_BRANCH_KEYSTORE_DDB_TABLE_NAME; - - // 1. Configure Beacons. - // The beacon name must be the name of a table attribute that will be encrypted. - // The `length` parameter dictates how many bits are in the beacon attribute value. - // The following link provides guidance on choosing a beacon length: - // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html - - // The configured DDB table has a GSI on the `aws_dbe_b_inspector_id_last4` AttributeName. - // This field holds the last 4 digits of an inspector ID. - // For our example, this field may range from 0 to 9,999 (10,000 possible values). - // For our example, we assume a full inspector ID is an integer - // ranging from 0 to 99,999,999. We do not assume that the full inspector ID's - // values are uniformly distributed across its range of possible values. - // In many use cases, the prefix of an identifier encodes some information - // about that identifier (e.g. zipcode and SSN prefixes encode geographic - // information), while the suffix does not and is more uniformly distributed. - // We will assume that the inspector ID field matches a similar use case. - // So for this example, we only store and use the last - // 4 digits of the inspector ID, which we assume is uniformly distributed. - // Since the full ID's range is divisible by the range of the last 4 digits, - // then the last 4 digits of the inspector ID are uniformly distributed - // over the range from 0 to 9,999. - // See our documentation for why you should avoid creating beacons over non-uniform distributions - // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/searchable-encryption.html#are-beacons-right-for-me - // A single inspector ID suffix may be assigned to multiple `work_id`s. - // - // This link provides guidance for choosing a beacon length: - // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html - // We follow the guidance in the link above to determine reasonable bounds - // for the length of a beacon on the last 4 digits of an inspector ID: - // - min: log(sqrt(10,000))/log(2) ~= 6.6, round up to 7 - // - max: log((10,000/2))/log(2) ~= 12.3, round down to 12 - // You will somehow need to round results to a nearby integer. - // We choose to round to the nearest integer; you might consider a different rounding approach. - // Rounding up will return fewer expected "false positives" in queries, - // leading to fewer decrypt calls and better performance, - // but it is easier to identify which beacon values encode distinct plaintexts. - // Rounding down will return more expected "false positives" in queries, - // leading to more decrypt calls and worse performance, - // but it is harder to identify which beacon values encode distinct plaintexts. - // We can choose a beacon length between 7 and 12: - // - Closer to 7, we expect more "false positives" to be returned, - // making it harder to identify which beacon values encode distinct plaintexts, - // but leading to more decrypt calls and worse performance - // - Closer to 12, we expect fewer "false positives" returned in queries, - // leading to fewer decrypt calls and better performance, - // but it is easier to identify which beacon values encode distinct plaintexts. - // As an example, we will choose 10. - // - // Values stored in aws_dbe_b_inspector_id_last4 will be 10 bits long (0x000 - 0x3ff) - // There will be 2^10 = 1,024 possible HMAC values. - // With a sufficiently large number of well-distributed inspector IDs, - // for a particular beacon we expect (10,000/1,024) ~= 9.8 4-digit inspector ID suffixes - // sharing that beacon value. - let last4_beacon = StandardBeacon::builder() - .name("inspector_id_last4") - .length(10) - .build()?; - - // The configured DDB table has a GSI on the `aws_dbe_b_unit` AttributeName. - // This field holds a unit serial number. - // For this example, this is a 12-digit integer from 0 to 999,999,999,999 (10^12 possible values). - // We will assume values for this attribute are uniformly distributed across this range. - // A single unit serial number may be assigned to multiple `work_id`s. - // - // This link provides guidance for choosing a beacon length: - // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html - // We follow the guidance in the link above to determine reasonable bounds - // for the length of a beacon on a unit serial number: - // - min: log(sqrt(999,999,999,999))/log(2) ~= 19.9, round up to 20 - // - max: log((999,999,999,999/2))/log(2) ~= 38.9, round up to 39 - // We can choose a beacon length between 20 and 39: - // - Closer to 20, we expect more "false positives" to be returned, - // making it harder to identify which beacon values encode distinct plaintexts, - // but leading to more decrypt calls and worse performance - // - Closer to 39, we expect fewer "false positives" returned in queries, - // leading to fewer decrypt calls and better performance, - // but it is easier to identify which beacon values encode distinct plaintexts. - // As an example, we will choose 30. - // - // Values stored in aws_dbe_b_unit will be 30 bits long (0x00000000 - 0x3fffffff) - // There will be 2^30 = 1,073,741,824 ~= 1.1B possible HMAC values. - // With a sufficiently large number of well-distributed inspector IDs, - // for a particular beacon we expect (10^12/2^30) ~= 931.3 unit serial numbers - // sharing that beacon value. - let unit_beacon = StandardBeacon::builder().name("unit").length(30).build()?; + // The whole thing is wrapped in a future to ensure that everything is Send and Sync + let future = async move { + let ddb_table_name = test_utils::UNIT_INSPECTION_TEST_DDB_TABLE_NAME; + let branch_key_wrapping_kms_key_arn = test_utils::TEST_BRANCH_KEY_WRAPPING_KMS_KEY_ARN; + let branch_key_ddb_table_name = test_utils::TEST_BRANCH_KEYSTORE_DDB_TABLE_NAME; - let standard_beacon_list = vec![last4_beacon, unit_beacon]; + // 1. Configure Beacons. + // The beacon name must be the name of a table attribute that will be encrypted. + // The `length` parameter dictates how many bits are in the beacon attribute value. + // The following link provides guidance on choosing a beacon length: + // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html - // 2. Configure Keystore. - // The keystore is a separate DDB table where the client stores encryption and decryption materials. - // In order to configure beacons on the DDB client, you must configure a keystore. - // - // This example expects that you have already set up a KeyStore with a single branch key. - // See the "Create KeyStore Table Example" and "Create KeyStore Key Example" for how to do this. - // After you create a branch key, you should persist its ID for use in this example. - let sdk_config = aws_config::load_defaults(aws_config::BehaviorVersion::latest()).await; - let key_store_config = KeyStoreConfig::builder() - .kms_client(aws_sdk_kms::Client::new(&sdk_config)) - .ddb_client(aws_sdk_dynamodb::Client::new(&sdk_config)) - .ddb_table_name(branch_key_ddb_table_name) - .logical_key_store_name(branch_key_ddb_table_name) - .kms_configuration(KmsConfiguration::KmsKeyArn( - branch_key_wrapping_kms_key_arn.to_string(), - )) - .build()?; + // The configured DDB table has a GSI on the `aws_dbe_b_inspector_id_last4` AttributeName. + // This field holds the last 4 digits of an inspector ID. + // For our example, this field may range from 0 to 9,999 (10,000 possible values). + // For our example, we assume a full inspector ID is an integer + // ranging from 0 to 99,999,999. We do not assume that the full inspector ID's + // values are uniformly distributed across its range of possible values. + // In many use cases, the prefix of an identifier encodes some information + // about that identifier (e.g. zipcode and SSN prefixes encode geographic + // information), while the suffix does not and is more uniformly distributed. + // We will assume that the inspector ID field matches a similar use case. + // So for this example, we only store and use the last + // 4 digits of the inspector ID, which we assume is uniformly distributed. + // Since the full ID's range is divisible by the range of the last 4 digits, + // then the last 4 digits of the inspector ID are uniformly distributed + // over the range from 0 to 9,999. + // See our documentation for why you should avoid creating beacons over non-uniform distributions + // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/searchable-encryption.html#are-beacons-right-for-me + // A single inspector ID suffix may be assigned to multiple `work_id`s. + // + // This link provides guidance for choosing a beacon length: + // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html + // We follow the guidance in the link above to determine reasonable bounds + // for the length of a beacon on the last 4 digits of an inspector ID: + // - min: log(sqrt(10,000))/log(2) ~= 6.6, round up to 7 + // - max: log((10,000/2))/log(2) ~= 12.3, round down to 12 + // You will somehow need to round results to a nearby integer. + // We choose to round to the nearest integer; you might consider a different rounding approach. + // Rounding up will return fewer expected "false positives" in queries, + // leading to fewer decrypt calls and better performance, + // but it is easier to identify which beacon values encode distinct plaintexts. + // Rounding down will return more expected "false positives" in queries, + // leading to more decrypt calls and worse performance, + // but it is harder to identify which beacon values encode distinct plaintexts. + // We can choose a beacon length between 7 and 12: + // - Closer to 7, we expect more "false positives" to be returned, + // making it harder to identify which beacon values encode distinct plaintexts, + // but leading to more decrypt calls and worse performance + // - Closer to 12, we expect fewer "false positives" returned in queries, + // leading to fewer decrypt calls and better performance, + // but it is easier to identify which beacon values encode distinct plaintexts. + // As an example, we will choose 10. + // + // Values stored in aws_dbe_b_inspector_id_last4 will be 10 bits long (0x000 - 0x3ff) + // There will be 2^10 = 1,024 possible HMAC values. + // With a sufficiently large number of well-distributed inspector IDs, + // for a particular beacon we expect (10,000/1,024) ~= 9.8 4-digit inspector ID suffixes + // sharing that beacon value. + let last4_beacon = StandardBeacon::builder() + .name("inspector_id_last4") + .length(10) + .build()?; - let key_store = keystore_client::Client::from_conf(key_store_config)?; + // The configured DDB table has a GSI on the `aws_dbe_b_unit` AttributeName. + // This field holds a unit serial number. + // For this example, this is a 12-digit integer from 0 to 999,999,999,999 (10^12 possible values). + // We will assume values for this attribute are uniformly distributed across this range. + // A single unit serial number may be assigned to multiple `work_id`s. + // + // This link provides guidance for choosing a beacon length: + // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/choosing-beacon-length.html + // We follow the guidance in the link above to determine reasonable bounds + // for the length of a beacon on a unit serial number: + // - min: log(sqrt(999,999,999,999))/log(2) ~= 19.9, round up to 20 + // - max: log((999,999,999,999/2))/log(2) ~= 38.9, round up to 39 + // We can choose a beacon length between 20 and 39: + // - Closer to 20, we expect more "false positives" to be returned, + // making it harder to identify which beacon values encode distinct plaintexts, + // but leading to more decrypt calls and worse performance + // - Closer to 39, we expect fewer "false positives" returned in queries, + // leading to fewer decrypt calls and better performance, + // but it is easier to identify which beacon values encode distinct plaintexts. + // As an example, we will choose 30. + // + // Values stored in aws_dbe_b_unit will be 30 bits long (0x00000000 - 0x3fffffff) + // There will be 2^30 = 1,073,741,824 ~= 1.1B possible HMAC values. + // With a sufficiently large number of well-distributed inspector IDs, + // for a particular beacon we expect (10^12/2^30) ~= 931.3 unit serial numbers + // sharing that beacon value. + let unit_beacon = StandardBeacon::builder().name("unit").length(30).build()?; - // 3. Create BeaconVersion. - // The BeaconVersion inside the list holds the list of beacons on the table. - // The BeaconVersion also stores information about the keystore. - // BeaconVersion must be provided: - // - keyStore: The keystore configured in step 2. - // - keySource: A configuration for the key source. - // For simple use cases, we can configure a 'singleKeySource' which - // statically configures a single beaconKey. That is the approach this example takes. - // For use cases where you want to use different beacon keys depending on the data - // (for example if your table holds data for multiple tenants, and you want to use - // a different beacon key per tenant), look into configuring a MultiKeyStore: - // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/searchable-encryption-multitenant.html + let standard_beacon_list = vec![last4_beacon, unit_beacon]; - let beacon_version = BeaconVersion::builder() - .standard_beacons(standard_beacon_list) - .version(1) // MUST be 1 - .key_store(key_store.clone()) - .key_source(BeaconKeySource::Single( - SingleKeyStore::builder() - // `keyId` references a beacon key. - // For every branch key we create in the keystore, - // we also create a beacon key. - // This beacon key is not the same as the branch key, - // but is created with the same ID as the branch key. - .key_id(branch_key_id) - .cache_ttl(6000) - .build()?, - )) - .build()?; - let beacon_versions = vec![beacon_version]; + // 2. Configure Keystore. + // The keystore is a separate DDB table where the client stores encryption and decryption materials. + // In order to configure beacons on the DDB client, you must configure a keystore. + // + // This example expects that you have already set up a KeyStore with a single branch key. + // See the "Create KeyStore Table Example" and "Create KeyStore Key Example" for how to do this. + // After you create a branch key, you should persist its ID for use in this example. + let sdk_config = aws_config::load_defaults(aws_config::BehaviorVersion::latest()).await; + let key_store_config = KeyStoreConfig::builder() + .kms_client(aws_sdk_kms::Client::new(&sdk_config)) + .ddb_client(aws_sdk_dynamodb::Client::new(&sdk_config)) + .ddb_table_name(branch_key_ddb_table_name) + .logical_key_store_name(branch_key_ddb_table_name) + .kms_configuration(KmsConfiguration::KmsKeyArn( + branch_key_wrapping_kms_key_arn.to_string(), + )) + .build()?; - // 4. Create a Hierarchical Keyring - // This is a KMS keyring that utilizes the keystore table. - // This config defines how items are encrypted and decrypted. - // NOTE: You should configure this to use the same keystore as your search config. - let provider_config = MaterialProvidersConfig::builder().build()?; - let mat_prov = client::Client::from_conf(provider_config)?; - let kms_keyring = mat_prov - .create_aws_kms_hierarchical_keyring() - .branch_key_id(branch_key_id) - .key_store(key_store) - .ttl_seconds(6000) - .send() - .await?; + let key_store = keystore_client::Client::from_conf(key_store_config)?; - // 5. Configure which attributes are encrypted and/or signed when writing new items. - // For each attribute that may exist on the items we plan to write to our DynamoDbTable, - // we must explicitly configure how they should be treated during item encryption: - // - ENCRYPT_AND_SIGN: The attribute is encrypted and included in the signature - // - SIGN_ONLY: The attribute not encrypted, but is still included in the signature - // - DO_NOTHING: The attribute is not encrypted and not included in the signature - // Any attributes that will be used in beacons must be configured as ENCRYPT_AND_SIGN. - let attribute_actions_on_encrypt = HashMap::from([ - ("work_id".to_string(), CryptoAction::SignOnly), // Our partition attribute must be SIGN_ONLY - ("inspection_date".to_string(), CryptoAction::SignOnly), // Our sort attribute must be SIGN_ONLY - ( - "inspector_id_last4".to_string(), - CryptoAction::EncryptAndSign, - ), // Beaconized attributes must be encrypted - ("unit".to_string(), CryptoAction::EncryptAndSign), // Beaconized attributes must be encrypted - ]); + // 3. Create BeaconVersion. + // The BeaconVersion inside the list holds the list of beacons on the table. + // The BeaconVersion also stores information about the keystore. + // BeaconVersion must be provided: + // - keyStore: The keystore configured in step 2. + // - keySource: A configuration for the key source. + // For simple use cases, we can configure a 'singleKeySource' which + // statically configures a single beaconKey. That is the approach this example takes. + // For use cases where you want to use different beacon keys depending on the data + // (for example if your table holds data for multiple tenants, and you want to use + // a different beacon key per tenant), look into configuring a MultiKeyStore: + // https://docs.aws.amazon.com/database-encryption-sdk/latest/devguide/searchable-encryption-multitenant.html - // 6. Create the DynamoDb Encryption configuration for the table we will be writing to. - // The beaconVersions are added to the search configuration. - let table_config = DynamoDbTableEncryptionConfig::builder() - .logical_table_name(ddb_table_name) - .partition_key_name("work_id") - .sort_key_name("inspection_date") - .attribute_actions_on_encrypt(attribute_actions_on_encrypt) - .keyring(kms_keyring) - .search( - SearchConfig::builder() - .write_version(1) // MUST be 1 - .versions(beacon_versions) - .build()?, - ) - .build()?; + let beacon_version = BeaconVersion::builder() + .standard_beacons(standard_beacon_list) + .version(1) // MUST be 1 + .key_store(key_store.clone()) + .key_source(BeaconKeySource::Single( + SingleKeyStore::builder() + // `keyId` references a beacon key. + // For every branch key we create in the keystore, + // we also create a beacon key. + // This beacon key is not the same as the branch key, + // but is created with the same ID as the branch key. + .key_id(branch_key_id) + .cache_ttl(6000) + .build()?, + )) + .build()?; + let beacon_versions = vec![beacon_version]; - let table_configs = DynamoDbTablesEncryptionConfig::builder() - .table_encryption_configs(HashMap::from([(ddb_table_name.to_string(), table_config)])) - .build()?; + // 4. Create a Hierarchical Keyring + // This is a KMS keyring that utilizes the keystore table. + // This config defines how items are encrypted and decrypted. + // NOTE: You should configure this to use the same keystore as your search config. + let provider_config = MaterialProvidersConfig::builder().build()?; + let mat_prov = client::Client::from_conf(provider_config)?; + let kms_keyring = mat_prov + .create_aws_kms_hierarchical_keyring() + .branch_key_id(branch_key_id) + .key_store(key_store) + .ttl_seconds(6000) + .send() + .await?; - // 7. Create a new AWS SDK DynamoDb client using the TableEncryptionConfigs - let sdk_config = aws_config::load_defaults(aws_config::BehaviorVersion::latest()).await; - let dynamo_config = aws_sdk_dynamodb::config::Builder::from(&sdk_config) - .interceptor(DbEsdkInterceptor::new(table_configs)?) - .build(); - let ddb = aws_sdk_dynamodb::Client::from_conf(dynamo_config); + // 5. Configure which attributes are encrypted and/or signed when writing new items. + // For each attribute that may exist on the items we plan to write to our DynamoDbTable, + // we must explicitly configure how they should be treated during item encryption: + // - ENCRYPT_AND_SIGN: The attribute is encrypted and included in the signature + // - SIGN_ONLY: The attribute not encrypted, but is still included in the signature + // - DO_NOTHING: The attribute is not encrypted and not included in the signature + // Any attributes that will be used in beacons must be configured as ENCRYPT_AND_SIGN. + let attribute_actions_on_encrypt = HashMap::from([ + ("work_id".to_string(), CryptoAction::SignOnly), // Our partition attribute must be SIGN_ONLY + ("inspection_date".to_string(), CryptoAction::SignOnly), // Our sort attribute must be SIGN_ONLY + ( + "inspector_id_last4".to_string(), + CryptoAction::EncryptAndSign, + ), // Beaconized attributes must be encrypted + ("unit".to_string(), CryptoAction::EncryptAndSign), // Beaconized attributes must be encrypted + ]); - // 8. Put an item into our table using the above client. - // Before the item gets sent to DynamoDb, it will be encrypted - // client-side, according to our configuration. - // Since our configuration includes beacons for `inspector_id_last4` and `unit`, - // the client will add two additional attributes to the item. These attributes will have names - // `aws_dbe_b_inspector_id_last4` and `aws_dbe_b_unit`. Their values will be HMACs - // truncated to as many bits as the beacon's `length` parameter; e.g. - // aws_dbe_b_inspector_id_last4 = truncate(HMAC("4321"), 10) - // aws_dbe_b_unit = truncate(HMAC("123456789012"), 30) + // 6. Create the DynamoDb Encryption configuration for the table we will be writing to. + // The beaconVersions are added to the search configuration. + let table_config = DynamoDbTableEncryptionConfig::builder() + .logical_table_name(ddb_table_name) + .partition_key_name("work_id") + .sort_key_name("inspection_date") + .attribute_actions_on_encrypt(attribute_actions_on_encrypt) + .keyring(kms_keyring) + .search( + SearchConfig::builder() + .write_version(1) // MUST be 1 + .versions(beacon_versions) + .build()?, + ) + .build()?; - let item = HashMap::from([ - ( - "work_id".to_string(), - AttributeValue::S("1313ba89-5661-41eb-ba6c-cb1b4cb67b2d".to_string()), - ), - ( - "inspection_date".to_string(), - AttributeValue::S("2023-06-13".to_string()), - ), - ( - "inspector_id_last4".to_string(), - AttributeValue::S("4321".to_string()), - ), - ( - "unit".to_string(), - AttributeValue::S("123456789012".to_string()), - ), - ]); + let table_configs = DynamoDbTablesEncryptionConfig::builder() + .table_encryption_configs(HashMap::from([(ddb_table_name.to_string(), table_config)])) + .build()?; - ddb.put_item() - .table_name(ddb_table_name) - .set_item(Some(item.clone())) - .send() - .await?; + // 7. Create a new AWS SDK DynamoDb client using the TableEncryptionConfigs + let sdk_config = aws_config::load_defaults(aws_config::BehaviorVersion::latest()).await; + let dynamo_config = aws_sdk_dynamodb::config::Builder::from(&sdk_config) + .interceptor(DbEsdkInterceptor::new(table_configs)?) + .build(); + let ddb = aws_sdk_dynamodb::Client::from_conf(dynamo_config); - // 9. Query for the item we just put. - // Note that we are constructing the query as if we were querying on plaintext values. - // However, the DDB encryption client will detect that this attribute name has a beacon configured. - // The client will add the beaconized attribute name and attribute value to the query, - // and transform the query to use the beaconized name and value. - // Internally, the client will query for and receive all items with a matching HMAC value in the beacon field. - // This may include a number of "false positives" with different ciphertext, but the same truncated HMAC. - // e.g. if truncate(HMAC("123456789012"), 30) - // == truncate(HMAC("098765432109"), 30), - // the query will return both items. - // The client will decrypt all returned items to determine which ones have the expected attribute values, - // and only surface items with the correct plaintext to the user. - // This procedure is internal to the client and is abstracted away from the user; - // e.g. the user will only see "123456789012" and never - // "098765432109", though the actual query returned both. - let expression_attributes_names = HashMap::from([ - ("#last4".to_string(), "inspector_id_last4".to_string()), - ("#unit".to_string(), "unit".to_string()), - ]); + // 8. Put an item into our table using the above client. + // Before the item gets sent to DynamoDb, it will be encrypted + // client-side, according to our configuration. + // Since our configuration includes beacons for `inspector_id_last4` and `unit`, + // the client will add two additional attributes to the item. These attributes will have names + // `aws_dbe_b_inspector_id_last4` and `aws_dbe_b_unit`. Their values will be HMACs + // truncated to as many bits as the beacon's `length` parameter; e.g. + // aws_dbe_b_inspector_id_last4 = truncate(HMAC("4321"), 10) + // aws_dbe_b_unit = truncate(HMAC("123456789012"), 30) - let expression_attribute_values = HashMap::from([ - (":last4".to_string(), AttributeValue::S("4321".to_string())), - ( - ":unit".to_string(), - AttributeValue::S("123456789012".to_string()), - ), - ]); + let item = HashMap::from([ + ( + "work_id".to_string(), + AttributeValue::S("1313ba89-5661-41eb-ba6c-cb1b4cb67b2d".to_string()), + ), + ( + "inspection_date".to_string(), + AttributeValue::S("2023-06-13".to_string()), + ), + ( + "inspector_id_last4".to_string(), + AttributeValue::S("4321".to_string()), + ), + ( + "unit".to_string(), + AttributeValue::S("123456789012".to_string()), + ), + ]); - // GSIs do not update instantly - // so if the results come back empty - // we retry after a short sleep - for _i in 0..10 { - let query_response = ddb - .query() + ddb.put_item() .table_name(ddb_table_name) - .index_name(GSI_NAME) - .key_condition_expression("#last4 = :last4 and #unit = :unit") - .set_expression_attribute_names(Some(expression_attributes_names.clone())) - .set_expression_attribute_values(Some(expression_attribute_values.clone())) + .set_item(Some(item.clone())) .send() .await?; - // if no results, sleep and try again - if query_response.items.is_none() || query_response.items.as_ref().unwrap().is_empty() { - std::thread::sleep(std::time::Duration::from_millis(20)); - continue; - } + // 9. Query for the item we just put. + // Note that we are constructing the query as if we were querying on plaintext values. + // However, the DDB encryption client will detect that this attribute name has a beacon configured. + // The client will add the beaconized attribute name and attribute value to the query, + // and transform the query to use the beaconized name and value. + // Internally, the client will query for and receive all items with a matching HMAC value in the beacon field. + // This may include a number of "false positives" with different ciphertext, but the same truncated HMAC. + // e.g. if truncate(HMAC("123456789012"), 30) + // == truncate(HMAC("098765432109"), 30), + // the query will return both items. + // The client will decrypt all returned items to determine which ones have the expected attribute values, + // and only surface items with the correct plaintext to the user. + // This procedure is internal to the client and is abstracted away from the user; + // e.g. the user will only see "123456789012" and never + // "098765432109", though the actual query returned both. + let expression_attributes_names = HashMap::from([ + ("#last4".to_string(), "inspector_id_last4".to_string()), + ("#unit".to_string(), "unit".to_string()), + ]); + + let expression_attribute_values = HashMap::from([ + (":last4".to_string(), AttributeValue::S("4321".to_string())), + ( + ":unit".to_string(), + AttributeValue::S("123456789012".to_string()), + ), + ]); - let attribute_values = query_response.items.unwrap(); - // Validate only 1 item was returned: the item we just put - assert_eq!(attribute_values.len(), 1); - let returned_item = &attribute_values[0]; - // Validate the item has the expected attributes - assert_eq!( - returned_item["inspector_id_last4"], - AttributeValue::S("4321".to_string()) - ); - assert_eq!( - returned_item["unit"], - AttributeValue::S("123456789012".to_string()) - ); - break; - } - println!("basic_searchable_encryption successful."); - Ok(()) + // GSIs do not update instantly + // so if the results come back empty + // we retry after a short sleep + for _i in 0..10 { + let query_response = ddb + .query() + .table_name(ddb_table_name) + .index_name(GSI_NAME) + .key_condition_expression("#last4 = :last4 and #unit = :unit") + .set_expression_attribute_names(Some(expression_attributes_names.clone())) + .set_expression_attribute_values(Some(expression_attribute_values.clone())) + .send() + .await?; + + // if no results, sleep and try again + if query_response.items.is_none() || query_response.items.as_ref().unwrap().is_empty() { + std::thread::sleep(std::time::Duration::from_millis(20)); + continue; + } + + let attribute_values = query_response.items.unwrap(); + // Validate only 1 item was returned: the item we just put + assert_eq!(attribute_values.len(), 1); + let returned_item = &attribute_values[0]; + // Validate the item has the expected attributes + assert_eq!( + returned_item["inspector_id_last4"], + AttributeValue::S("4321".to_string()) + ); + assert_eq!( + returned_item["unit"], + AttributeValue::S("123456789012".to_string()) + ); + break; + } + println!("basic_searchable_encryption successful."); + Ok(()) + }; + future.await } diff --git a/releases/rust/db_esdk/examples/searchableencryption/beacon_styles_searchable_encryption.rs b/releases/rust/db_esdk/examples/searchableencryption/beacon_styles_searchable_encryption.rs index 45701af7b..a287c9ecb 100644 --- a/releases/rust/db_esdk/examples/searchableencryption/beacon_styles_searchable_encryption.rs +++ b/releases/rust/db_esdk/examples/searchableencryption/beacon_styles_searchable_encryption.rs @@ -12,13 +12,13 @@ use aws_db_esdk::dynamodb::types::SearchConfig; use aws_db_esdk::dynamodb::types::SingleKeyStore; use aws_db_esdk::dynamodb::types::StandardBeacon; use aws_db_esdk::dynamodb::types::*; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/searchableencryption/complexexample/beacon_config.rs b/releases/rust/db_esdk/examples/searchableencryption/complexexample/beacon_config.rs index 39adb19be..913004d97 100644 --- a/releases/rust/db_esdk/examples/searchableencryption/complexexample/beacon_config.rs +++ b/releases/rust/db_esdk/examples/searchableencryption/complexexample/beacon_config.rs @@ -12,13 +12,13 @@ use aws_db_esdk::dynamodb::types::SearchConfig; use aws_db_esdk::dynamodb::types::SignedPart; use aws_db_esdk::dynamodb::types::SingleKeyStore; use aws_db_esdk::dynamodb::types::StandardBeacon; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/searchableencryption/compound_beacon_searchable_encryption.rs b/releases/rust/db_esdk/examples/searchableencryption/compound_beacon_searchable_encryption.rs index 9246dcc4e..8b2f2b733 100644 --- a/releases/rust/db_esdk/examples/searchableencryption/compound_beacon_searchable_encryption.rs +++ b/releases/rust/db_esdk/examples/searchableencryption/compound_beacon_searchable_encryption.rs @@ -2,6 +2,7 @@ // SPDX-License-Identifier: Apache-2.0 use crate::test_utils; +use aws_db_esdk::client as transform_client; use aws_db_esdk::dynamodb::types::BeaconKeySource; use aws_db_esdk::dynamodb::types::BeaconVersion; use aws_db_esdk::dynamodb::types::CompoundBeacon; @@ -10,14 +11,13 @@ use aws_db_esdk::dynamodb::types::EncryptedPart; use aws_db_esdk::dynamodb::types::SearchConfig; use aws_db_esdk::dynamodb::types::SingleKeyStore; use aws_db_esdk::dynamodb::types::StandardBeacon; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::client as transform_client; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/examples/searchableencryption/virtual_beacon_searchable_encryption.rs b/releases/rust/db_esdk/examples/searchableencryption/virtual_beacon_searchable_encryption.rs index a324534ce..d558f3a2e 100644 --- a/releases/rust/db_esdk/examples/searchableencryption/virtual_beacon_searchable_encryption.rs +++ b/releases/rust/db_esdk/examples/searchableencryption/virtual_beacon_searchable_encryption.rs @@ -2,6 +2,7 @@ // SPDX-License-Identifier: Apache-2.0 use crate::test_utils; +use aws_db_esdk::client as transform_client; use aws_db_esdk::dynamodb::types::BeaconKeySource; use aws_db_esdk::dynamodb::types::BeaconVersion; use aws_db_esdk::dynamodb::types::DynamoDbTableEncryptionConfig; @@ -12,14 +13,13 @@ use aws_db_esdk::dynamodb::types::StandardBeacon; use aws_db_esdk::dynamodb::types::VirtualField; use aws_db_esdk::dynamodb::types::VirtualPart; use aws_db_esdk::dynamodb::types::VirtualTransform; -use aws_db_esdk::CryptoAction; +use aws_db_esdk::intercept::DbEsdkInterceptor; use aws_db_esdk::key_store::client as keystore_client; use aws_db_esdk::key_store::types::key_store_config::KeyStoreConfig; use aws_db_esdk::key_store::types::KmsConfiguration; use aws_db_esdk::material_providers::client as mpl_client; use aws_db_esdk::material_providers::types::material_providers_config::MaterialProvidersConfig; -use aws_db_esdk::client as transform_client; -use aws_db_esdk::intercept::DbEsdkInterceptor; +use aws_db_esdk::CryptoAction; use aws_db_esdk::DynamoDbTablesEncryptionConfig; use aws_sdk_dynamodb::types::AttributeValue; use std::collections::HashMap; diff --git a/releases/rust/db_esdk/src/aes_gcm.rs b/releases/rust/db_esdk/src/aes_gcm.rs index 8867c539d..b5f12b997 100644 --- a/releases/rust/db_esdk/src/aes_gcm.rs +++ b/releases/rust/db_esdk/src/aes_gcm.rs @@ -10,7 +10,7 @@ use crate::software::amazon::cryptography::primitives::internaldafny::types::Err use crate::software::amazon::cryptography::primitives::internaldafny::types::AES_GCM; use crate::*; use aws_lc_rs::aead::{Aad, LessSafeKey, Nonce, UnboundKey}; -use std::rc::Rc; +use dafny_runtime::Rc; struct DoAESEncryptOutput { cipher_text: Vec, diff --git a/releases/rust/db_esdk/src/aes_kdf_ctr.rs b/releases/rust/db_esdk/src/aes_kdf_ctr.rs index 36f17bbea..8d945da82 100644 --- a/releases/rust/db_esdk/src/aes_kdf_ctr.rs +++ b/releases/rust/db_esdk/src/aes_kdf_ctr.rs @@ -11,8 +11,8 @@ pub mod AesKdfCtr { use crate::software::amazon::cryptography::primitives::internaldafny::types::Error as DafnyError; use crate::*; use aws_lc_rs::cipher::{EncryptingKey, EncryptionContext, UnboundCipherKey, AES_256}; + use dafny_runtime::Rc; use dafny_runtime::Sequence; - use std::rc::Rc; fn error(s: &str) -> Rc { Rc::new(DafnyError::AwsCryptographicPrimitivesError { diff --git a/releases/rust/db_esdk/src/client.rs b/releases/rust/db_esdk/src/client.rs index ec261e0bd..039eaf056 100644 --- a/releases/rust/db_esdk/src/client.rs +++ b/releases/rust/db_esdk/src/client.rs @@ -25,10 +25,12 @@ impl Client { inner.as_ref(), crate::_Wrappers_Compile::Result::Failure { .. } ) { - return Err(crate::conversions::error::from_dafny(inner.as_ref().error().clone())); + return Err(crate::conversions::error::from_dafny( + inner.as_ref().error().clone(), + )); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/client/batch_execute_statement_input_transform.rs b/releases/rust/db_esdk/src/client/batch_execute_statement_input_transform.rs index 44d904ddd..c3ade805e 100644 --- a/releases/rust/db_esdk/src/client/batch_execute_statement_input_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_execute_statement_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchExecuteStatementInputTransformOutput`](crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformError) - pub fn batch_execute_statement_input_transform(&self) -> crate::operation::batch_execute_statement_input_transform::builders::BatchExecuteStatementInputTransformFluentBuilder { + pub fn batch_execute_statement_input_transform(&self) -> crate::operation::batch_execute_statement_input_transform::builders::BatchExecuteStatementInputTransformFluentBuilder{ crate::operation::batch_execute_statement_input_transform::builders::BatchExecuteStatementInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/batch_execute_statement_output_transform.rs b/releases/rust/db_esdk/src/client/batch_execute_statement_output_transform.rs index 9ce9cf059..86825d6b7 100644 --- a/releases/rust/db_esdk/src/client/batch_execute_statement_output_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_execute_statement_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchExecuteStatementOutputTransformOutput`](crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformError) - pub fn batch_execute_statement_output_transform(&self) -> crate::operation::batch_execute_statement_output_transform::builders::BatchExecuteStatementOutputTransformFluentBuilder { + pub fn batch_execute_statement_output_transform(&self) -> crate::operation::batch_execute_statement_output_transform::builders::BatchExecuteStatementOutputTransformFluentBuilder{ crate::operation::batch_execute_statement_output_transform::builders::BatchExecuteStatementOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/batch_get_item_input_transform.rs b/releases/rust/db_esdk/src/client/batch_get_item_input_transform.rs index e3865aaa4..694ae21b4 100644 --- a/releases/rust/db_esdk/src/client/batch_get_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_get_item_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchGetItemInputTransformOutput`](crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformError) - pub fn batch_get_item_input_transform(&self) -> crate::operation::batch_get_item_input_transform::builders::BatchGetItemInputTransformFluentBuilder { + pub fn batch_get_item_input_transform(&self) -> crate::operation::batch_get_item_input_transform::builders::BatchGetItemInputTransformFluentBuilder{ crate::operation::batch_get_item_input_transform::builders::BatchGetItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/batch_get_item_output_transform.rs b/releases/rust/db_esdk/src/client/batch_get_item_output_transform.rs index 732cf1e15..38adeb196 100644 --- a/releases/rust/db_esdk/src/client/batch_get_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_get_item_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchGetItemOutputTransformOutput`](crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformError) - pub fn batch_get_item_output_transform(&self) -> crate::operation::batch_get_item_output_transform::builders::BatchGetItemOutputTransformFluentBuilder { + pub fn batch_get_item_output_transform(&self) -> crate::operation::batch_get_item_output_transform::builders::BatchGetItemOutputTransformFluentBuilder{ crate::operation::batch_get_item_output_transform::builders::BatchGetItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/batch_write_item_input_transform.rs b/releases/rust/db_esdk/src/client/batch_write_item_input_transform.rs index eb575d858..c4c151061 100644 --- a/releases/rust/db_esdk/src/client/batch_write_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_write_item_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchWriteItemInputTransformOutput`](crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformError) - pub fn batch_write_item_input_transform(&self) -> crate::operation::batch_write_item_input_transform::builders::BatchWriteItemInputTransformFluentBuilder { + pub fn batch_write_item_input_transform(&self) -> crate::operation::batch_write_item_input_transform::builders::BatchWriteItemInputTransformFluentBuilder{ crate::operation::batch_write_item_input_transform::builders::BatchWriteItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/batch_write_item_output_transform.rs b/releases/rust/db_esdk/src/client/batch_write_item_output_transform.rs index 3b57660c4..e865af125 100644 --- a/releases/rust/db_esdk/src/client/batch_write_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/batch_write_item_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`BatchWriteItemOutputTransformOutput`](crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformError) - pub fn batch_write_item_output_transform(&self) -> crate::operation::batch_write_item_output_transform::builders::BatchWriteItemOutputTransformFluentBuilder { + pub fn batch_write_item_output_transform(&self) -> crate::operation::batch_write_item_output_transform::builders::BatchWriteItemOutputTransformFluentBuilder{ crate::operation::batch_write_item_output_transform::builders::BatchWriteItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/delete_item_input_transform.rs b/releases/rust/db_esdk/src/client/delete_item_input_transform.rs index d0c711f78..58ae70dde 100644 --- a/releases/rust/db_esdk/src/client/delete_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/delete_item_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`DeleteItemInputTransformOutput`](crate::operation::delete_item_input_transform::DeleteItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::delete_item_input_transform::DeleteItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::delete_item_input_transform::DeleteItemInputTransformError) - pub fn delete_item_input_transform(&self) -> crate::operation::delete_item_input_transform::builders::DeleteItemInputTransformFluentBuilder { + pub fn delete_item_input_transform(&self) -> crate::operation::delete_item_input_transform::builders::DeleteItemInputTransformFluentBuilder{ crate::operation::delete_item_input_transform::builders::DeleteItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/delete_item_output_transform.rs b/releases/rust/db_esdk/src/client/delete_item_output_transform.rs index 14606a01c..1c9722226 100644 --- a/releases/rust/db_esdk/src/client/delete_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/delete_item_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`DeleteItemOutputTransformOutput`](crate::operation::delete_item_output_transform::DeleteItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::delete_item_output_transform::DeleteItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::delete_item_output_transform::DeleteItemOutputTransformError) - pub fn delete_item_output_transform(&self) -> crate::operation::delete_item_output_transform::builders::DeleteItemOutputTransformFluentBuilder { + pub fn delete_item_output_transform(&self) -> crate::operation::delete_item_output_transform::builders::DeleteItemOutputTransformFluentBuilder{ crate::operation::delete_item_output_transform::builders::DeleteItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/execute_statement_input_transform.rs b/releases/rust/db_esdk/src/client/execute_statement_input_transform.rs index 463fba5be..ecbae3c00 100644 --- a/releases/rust/db_esdk/src/client/execute_statement_input_transform.rs +++ b/releases/rust/db_esdk/src/client/execute_statement_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`ExecuteStatementInputTransformOutput`](crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformError) - pub fn execute_statement_input_transform(&self) -> crate::operation::execute_statement_input_transform::builders::ExecuteStatementInputTransformFluentBuilder { + pub fn execute_statement_input_transform(&self) -> crate::operation::execute_statement_input_transform::builders::ExecuteStatementInputTransformFluentBuilder{ crate::operation::execute_statement_input_transform::builders::ExecuteStatementInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/execute_statement_output_transform.rs b/releases/rust/db_esdk/src/client/execute_statement_output_transform.rs index 215364377..fab28ccc1 100644 --- a/releases/rust/db_esdk/src/client/execute_statement_output_transform.rs +++ b/releases/rust/db_esdk/src/client/execute_statement_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`ExecuteStatementOutputTransformOutput`](crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformError) - pub fn execute_statement_output_transform(&self) -> crate::operation::execute_statement_output_transform::builders::ExecuteStatementOutputTransformFluentBuilder { + pub fn execute_statement_output_transform(&self) -> crate::operation::execute_statement_output_transform::builders::ExecuteStatementOutputTransformFluentBuilder{ crate::operation::execute_statement_output_transform::builders::ExecuteStatementOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/execute_transaction_input_transform.rs b/releases/rust/db_esdk/src/client/execute_transaction_input_transform.rs index c278f9d25..5b01f59e5 100644 --- a/releases/rust/db_esdk/src/client/execute_transaction_input_transform.rs +++ b/releases/rust/db_esdk/src/client/execute_transaction_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`ExecuteTransactionInputTransformOutput`](crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformError) - pub fn execute_transaction_input_transform(&self) -> crate::operation::execute_transaction_input_transform::builders::ExecuteTransactionInputTransformFluentBuilder { + pub fn execute_transaction_input_transform(&self) -> crate::operation::execute_transaction_input_transform::builders::ExecuteTransactionInputTransformFluentBuilder{ crate::operation::execute_transaction_input_transform::builders::ExecuteTransactionInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/execute_transaction_output_transform.rs b/releases/rust/db_esdk/src/client/execute_transaction_output_transform.rs index 24ceff914..4ce609026 100644 --- a/releases/rust/db_esdk/src/client/execute_transaction_output_transform.rs +++ b/releases/rust/db_esdk/src/client/execute_transaction_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`ExecuteTransactionOutputTransformOutput`](crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformError) - pub fn execute_transaction_output_transform(&self) -> crate::operation::execute_transaction_output_transform::builders::ExecuteTransactionOutputTransformFluentBuilder { + pub fn execute_transaction_output_transform(&self) -> crate::operation::execute_transaction_output_transform::builders::ExecuteTransactionOutputTransformFluentBuilder{ crate::operation::execute_transaction_output_transform::builders::ExecuteTransactionOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/get_item_input_transform.rs b/releases/rust/db_esdk/src/client/get_item_input_transform.rs index 9dc6c249c..15edb2150 100644 --- a/releases/rust/db_esdk/src/client/get_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/get_item_input_transform.rs @@ -9,7 +9,10 @@ impl crate::client::Client { /// - On success, responds with [`GetItemInputTransformOutput`](crate::operation::get_item_input_transform::GetItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::get_item_input_transform::GetItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_item_input_transform::GetItemInputTransformError) - pub fn get_item_input_transform(&self) -> crate::operation::get_item_input_transform::builders::GetItemInputTransformFluentBuilder { + pub fn get_item_input_transform( + &self, + ) -> crate::operation::get_item_input_transform::builders::GetItemInputTransformFluentBuilder + { crate::operation::get_item_input_transform::builders::GetItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/get_item_output_transform.rs b/releases/rust/db_esdk/src/client/get_item_output_transform.rs index 52a253302..d4db57c8d 100644 --- a/releases/rust/db_esdk/src/client/get_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/get_item_output_transform.rs @@ -10,7 +10,10 @@ impl crate::client::Client { /// - On success, responds with [`GetItemOutputTransformOutput`](crate::operation::get_item_output_transform::GetItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::get_item_output_transform::GetItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_item_output_transform::GetItemOutputTransformError) - pub fn get_item_output_transform(&self) -> crate::operation::get_item_output_transform::builders::GetItemOutputTransformFluentBuilder { + pub fn get_item_output_transform( + &self, + ) -> crate::operation::get_item_output_transform::builders::GetItemOutputTransformFluentBuilder + { crate::operation::get_item_output_transform::builders::GetItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/put_item_input_transform.rs b/releases/rust/db_esdk/src/client/put_item_input_transform.rs index 96ba7eed1..35aa281df 100644 --- a/releases/rust/db_esdk/src/client/put_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/put_item_input_transform.rs @@ -9,7 +9,10 @@ impl crate::client::Client { /// - On success, responds with [`PutItemInputTransformOutput`](crate::operation::put_item_input_transform::PutItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::put_item_input_transform::PutItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::put_item_input_transform::PutItemInputTransformError) - pub fn put_item_input_transform(&self) -> crate::operation::put_item_input_transform::builders::PutItemInputTransformFluentBuilder { + pub fn put_item_input_transform( + &self, + ) -> crate::operation::put_item_input_transform::builders::PutItemInputTransformFluentBuilder + { crate::operation::put_item_input_transform::builders::PutItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/put_item_output_transform.rs b/releases/rust/db_esdk/src/client/put_item_output_transform.rs index 685a48680..7a742cd4d 100644 --- a/releases/rust/db_esdk/src/client/put_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/put_item_output_transform.rs @@ -10,7 +10,10 @@ impl crate::client::Client { /// - On success, responds with [`PutItemOutputTransformOutput`](crate::operation::put_item_output_transform::PutItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::put_item_output_transform::PutItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::put_item_output_transform::PutItemOutputTransformError) - pub fn put_item_output_transform(&self) -> crate::operation::put_item_output_transform::builders::PutItemOutputTransformFluentBuilder { + pub fn put_item_output_transform( + &self, + ) -> crate::operation::put_item_output_transform::builders::PutItemOutputTransformFluentBuilder + { crate::operation::put_item_output_transform::builders::PutItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/query_input_transform.rs b/releases/rust/db_esdk/src/client/query_input_transform.rs index 596dd94c0..7a4b8d55e 100644 --- a/releases/rust/db_esdk/src/client/query_input_transform.rs +++ b/releases/rust/db_esdk/src/client/query_input_transform.rs @@ -9,7 +9,11 @@ impl crate::client::Client { /// - On success, responds with [`QueryInputTransformOutput`](crate::operation::query_input_transform::QueryInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::query_input_transform::QueryInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::query_input_transform::QueryInputTransformError) - pub fn query_input_transform(&self) -> crate::operation::query_input_transform::builders::QueryInputTransformFluentBuilder { - crate::operation::query_input_transform::builders::QueryInputTransformFluentBuilder::new(self.clone()) + pub fn query_input_transform( + &self, + ) -> crate::operation::query_input_transform::builders::QueryInputTransformFluentBuilder { + crate::operation::query_input_transform::builders::QueryInputTransformFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/client/query_output_transform.rs b/releases/rust/db_esdk/src/client/query_output_transform.rs index 4e6a4bd8f..6e2a4fd03 100644 --- a/releases/rust/db_esdk/src/client/query_output_transform.rs +++ b/releases/rust/db_esdk/src/client/query_output_transform.rs @@ -10,7 +10,11 @@ impl crate::client::Client { /// - On success, responds with [`QueryOutputTransformOutput`](crate::operation::query_output_transform::QueryOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::query_output_transform::QueryOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::query_output_transform::QueryOutputTransformError) - pub fn query_output_transform(&self) -> crate::operation::query_output_transform::builders::QueryOutputTransformFluentBuilder { - crate::operation::query_output_transform::builders::QueryOutputTransformFluentBuilder::new(self.clone()) + pub fn query_output_transform( + &self, + ) -> crate::operation::query_output_transform::builders::QueryOutputTransformFluentBuilder { + crate::operation::query_output_transform::builders::QueryOutputTransformFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/client/resolve_attributes.rs b/releases/rust/db_esdk/src/client/resolve_attributes.rs index df04501d5..a605d9a03 100644 --- a/releases/rust/db_esdk/src/client/resolve_attributes.rs +++ b/releases/rust/db_esdk/src/client/resolve_attributes.rs @@ -12,7 +12,11 @@ impl crate::client::Client { /// - [`compound_beacons(Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>)`](crate::operation::resolve_attributes::ResolveAttributesOutput::compound_beacons): (undocumented) /// - [`virtual_fields(Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>)`](crate::operation::resolve_attributes::ResolveAttributesOutput::virtual_fields): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::resolve_attributes::ResolveAttributesError) - pub fn resolve_attributes(&self) -> crate::operation::resolve_attributes::builders::ResolveAttributesFluentBuilder { - crate::operation::resolve_attributes::builders::ResolveAttributesFluentBuilder::new(self.clone()) + pub fn resolve_attributes( + &self, + ) -> crate::operation::resolve_attributes::builders::ResolveAttributesFluentBuilder { + crate::operation::resolve_attributes::builders::ResolveAttributesFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/client/scan_input_transform.rs b/releases/rust/db_esdk/src/client/scan_input_transform.rs index e311b4b31..a288f6a57 100644 --- a/releases/rust/db_esdk/src/client/scan_input_transform.rs +++ b/releases/rust/db_esdk/src/client/scan_input_transform.rs @@ -9,7 +9,11 @@ impl crate::client::Client { /// - On success, responds with [`ScanInputTransformOutput`](crate::operation::scan_input_transform::ScanInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::scan_input_transform::ScanInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::scan_input_transform::ScanInputTransformError) - pub fn scan_input_transform(&self) -> crate::operation::scan_input_transform::builders::ScanInputTransformFluentBuilder { - crate::operation::scan_input_transform::builders::ScanInputTransformFluentBuilder::new(self.clone()) + pub fn scan_input_transform( + &self, + ) -> crate::operation::scan_input_transform::builders::ScanInputTransformFluentBuilder { + crate::operation::scan_input_transform::builders::ScanInputTransformFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/client/scan_output_transform.rs b/releases/rust/db_esdk/src/client/scan_output_transform.rs index 1b77728a7..647cdeb92 100644 --- a/releases/rust/db_esdk/src/client/scan_output_transform.rs +++ b/releases/rust/db_esdk/src/client/scan_output_transform.rs @@ -10,7 +10,11 @@ impl crate::client::Client { /// - On success, responds with [`ScanOutputTransformOutput`](crate::operation::scan_output_transform::ScanOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::scan_output_transform::ScanOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::scan_output_transform::ScanOutputTransformError) - pub fn scan_output_transform(&self) -> crate::operation::scan_output_transform::builders::ScanOutputTransformFluentBuilder { - crate::operation::scan_output_transform::builders::ScanOutputTransformFluentBuilder::new(self.clone()) + pub fn scan_output_transform( + &self, + ) -> crate::operation::scan_output_transform::builders::ScanOutputTransformFluentBuilder { + crate::operation::scan_output_transform::builders::ScanOutputTransformFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/client/transact_get_items_input_transform.rs b/releases/rust/db_esdk/src/client/transact_get_items_input_transform.rs index 69fe51819..bd6b6fa15 100644 --- a/releases/rust/db_esdk/src/client/transact_get_items_input_transform.rs +++ b/releases/rust/db_esdk/src/client/transact_get_items_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`TransactGetItemsInputTransformOutput`](crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformError) - pub fn transact_get_items_input_transform(&self) -> crate::operation::transact_get_items_input_transform::builders::TransactGetItemsInputTransformFluentBuilder { + pub fn transact_get_items_input_transform(&self) -> crate::operation::transact_get_items_input_transform::builders::TransactGetItemsInputTransformFluentBuilder{ crate::operation::transact_get_items_input_transform::builders::TransactGetItemsInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/transact_get_items_output_transform.rs b/releases/rust/db_esdk/src/client/transact_get_items_output_transform.rs index ce7b27d42..d905ce594 100644 --- a/releases/rust/db_esdk/src/client/transact_get_items_output_transform.rs +++ b/releases/rust/db_esdk/src/client/transact_get_items_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`TransactGetItemsOutputTransformOutput`](crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformError) - pub fn transact_get_items_output_transform(&self) -> crate::operation::transact_get_items_output_transform::builders::TransactGetItemsOutputTransformFluentBuilder { + pub fn transact_get_items_output_transform(&self) -> crate::operation::transact_get_items_output_transform::builders::TransactGetItemsOutputTransformFluentBuilder{ crate::operation::transact_get_items_output_transform::builders::TransactGetItemsOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/transact_write_items_input_transform.rs b/releases/rust/db_esdk/src/client/transact_write_items_input_transform.rs index 973714801..40cf964fa 100644 --- a/releases/rust/db_esdk/src/client/transact_write_items_input_transform.rs +++ b/releases/rust/db_esdk/src/client/transact_write_items_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`TransactWriteItemsInputTransformOutput`](crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformError) - pub fn transact_write_items_input_transform(&self) -> crate::operation::transact_write_items_input_transform::builders::TransactWriteItemsInputTransformFluentBuilder { + pub fn transact_write_items_input_transform(&self) -> crate::operation::transact_write_items_input_transform::builders::TransactWriteItemsInputTransformFluentBuilder{ crate::operation::transact_write_items_input_transform::builders::TransactWriteItemsInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/transact_write_items_output_transform.rs b/releases/rust/db_esdk/src/client/transact_write_items_output_transform.rs index b88327405..29395d22c 100644 --- a/releases/rust/db_esdk/src/client/transact_write_items_output_transform.rs +++ b/releases/rust/db_esdk/src/client/transact_write_items_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`TransactWriteItemsOutputTransformOutput`](crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformError) - pub fn transact_write_items_output_transform(&self) -> crate::operation::transact_write_items_output_transform::builders::TransactWriteItemsOutputTransformFluentBuilder { + pub fn transact_write_items_output_transform(&self) -> crate::operation::transact_write_items_output_transform::builders::TransactWriteItemsOutputTransformFluentBuilder{ crate::operation::transact_write_items_output_transform::builders::TransactWriteItemsOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/update_item_input_transform.rs b/releases/rust/db_esdk/src/client/update_item_input_transform.rs index a9515f83d..6c7218691 100644 --- a/releases/rust/db_esdk/src/client/update_item_input_transform.rs +++ b/releases/rust/db_esdk/src/client/update_item_input_transform.rs @@ -9,7 +9,7 @@ impl crate::client::Client { /// - On success, responds with [`UpdateItemInputTransformOutput`](crate::operation::update_item_input_transform::UpdateItemInputTransformOutput) with field(s): /// - [`transformed_input(Option)`](crate::operation::update_item_input_transform::UpdateItemInputTransformOutput::transformed_input): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::update_item_input_transform::UpdateItemInputTransformError) - pub fn update_item_input_transform(&self) -> crate::operation::update_item_input_transform::builders::UpdateItemInputTransformFluentBuilder { + pub fn update_item_input_transform(&self) -> crate::operation::update_item_input_transform::builders::UpdateItemInputTransformFluentBuilder{ crate::operation::update_item_input_transform::builders::UpdateItemInputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/client/update_item_output_transform.rs b/releases/rust/db_esdk/src/client/update_item_output_transform.rs index e1a2a0554..399fbcd96 100644 --- a/releases/rust/db_esdk/src/client/update_item_output_transform.rs +++ b/releases/rust/db_esdk/src/client/update_item_output_transform.rs @@ -10,7 +10,7 @@ impl crate::client::Client { /// - On success, responds with [`UpdateItemOutputTransformOutput`](crate::operation::update_item_output_transform::UpdateItemOutputTransformOutput) with field(s): /// - [`transformed_output(Option)`](crate::operation::update_item_output_transform::UpdateItemOutputTransformOutput::transformed_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::update_item_output_transform::UpdateItemOutputTransformError) - pub fn update_item_output_transform(&self) -> crate::operation::update_item_output_transform::builders::UpdateItemOutputTransformFluentBuilder { + pub fn update_item_output_transform(&self) -> crate::operation::update_item_output_transform::builders::UpdateItemOutputTransformFluentBuilder{ crate::operation::update_item_output_transform::builders::UpdateItemOutputTransformFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/conversions.rs b/releases/rust/db_esdk/src/conversions.rs index dc05808bf..466bec227 100644 --- a/releases/rust/db_esdk/src/conversions.rs +++ b/releases/rust/db_esdk/src/conversions.rs @@ -3,168 +3,168 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod batch_execute_statement_input_transform; - pub mod batch_execute_statement_input_transform_input; +pub mod batch_execute_statement_input_transform_input; - pub mod batch_execute_statement_input_transform_output; +pub mod batch_execute_statement_input_transform_output; - pub mod batch_execute_statement_output_transform; +pub mod batch_execute_statement_output_transform; - pub mod batch_execute_statement_output_transform_input; +pub mod batch_execute_statement_output_transform_input; - pub mod batch_execute_statement_output_transform_output; +pub mod batch_execute_statement_output_transform_output; - pub mod batch_get_item_input_transform; +pub mod batch_get_item_input_transform; - pub mod batch_get_item_input_transform_input; +pub mod batch_get_item_input_transform_input; - pub mod batch_get_item_input_transform_output; +pub mod batch_get_item_input_transform_output; - pub mod batch_get_item_output_transform; +pub mod batch_get_item_output_transform; - pub mod batch_get_item_output_transform_input; +pub mod batch_get_item_output_transform_input; - pub mod batch_get_item_output_transform_output; +pub mod batch_get_item_output_transform_output; - pub mod batch_write_item_input_transform; +pub mod batch_write_item_input_transform; - pub mod batch_write_item_input_transform_input; +pub mod batch_write_item_input_transform_input; - pub mod batch_write_item_input_transform_output; +pub mod batch_write_item_input_transform_output; - pub mod batch_write_item_output_transform; +pub mod batch_write_item_output_transform; - pub mod batch_write_item_output_transform_input; +pub mod batch_write_item_output_transform_input; - pub mod batch_write_item_output_transform_output; +pub mod batch_write_item_output_transform_output; - pub mod client; +pub mod client; - pub mod delete_item_input_transform; +pub mod delete_item_input_transform; - pub mod delete_item_input_transform_input; +pub mod delete_item_input_transform_input; - pub mod delete_item_input_transform_output; +pub mod delete_item_input_transform_output; - pub mod delete_item_output_transform; +pub mod delete_item_output_transform; - pub mod delete_item_output_transform_input; +pub mod delete_item_output_transform_input; - pub mod delete_item_output_transform_output; +pub mod delete_item_output_transform_output; - pub mod error; +pub mod error; - pub mod execute_statement_input_transform; +pub mod execute_statement_input_transform; - pub mod execute_statement_input_transform_input; +pub mod execute_statement_input_transform_input; - pub mod execute_statement_input_transform_output; +pub mod execute_statement_input_transform_output; - pub mod execute_statement_output_transform; +pub mod execute_statement_output_transform; - pub mod execute_statement_output_transform_input; +pub mod execute_statement_output_transform_input; - pub mod execute_statement_output_transform_output; +pub mod execute_statement_output_transform_output; - pub mod execute_transaction_input_transform; +pub mod execute_transaction_input_transform; - pub mod execute_transaction_input_transform_input; +pub mod execute_transaction_input_transform_input; - pub mod execute_transaction_input_transform_output; +pub mod execute_transaction_input_transform_output; - pub mod execute_transaction_output_transform; +pub mod execute_transaction_output_transform; - pub mod execute_transaction_output_transform_input; +pub mod execute_transaction_output_transform_input; - pub mod execute_transaction_output_transform_output; +pub mod execute_transaction_output_transform_output; - pub mod get_item_input_transform; +pub mod get_item_input_transform; - pub mod get_item_input_transform_input; +pub mod get_item_input_transform_input; - pub mod get_item_input_transform_output; +pub mod get_item_input_transform_output; - pub mod get_item_output_transform; +pub mod get_item_output_transform; - pub mod get_item_output_transform_input; +pub mod get_item_output_transform_input; - pub mod get_item_output_transform_output; +pub mod get_item_output_transform_output; - pub mod put_item_input_transform; +pub mod put_item_input_transform; - pub mod put_item_input_transform_input; +pub mod put_item_input_transform_input; - pub mod put_item_input_transform_output; +pub mod put_item_input_transform_output; - pub mod put_item_output_transform; +pub mod put_item_output_transform; - pub mod put_item_output_transform_input; +pub mod put_item_output_transform_input; - pub mod put_item_output_transform_output; +pub mod put_item_output_transform_output; - pub mod query_input_transform; +pub mod query_input_transform; - pub mod query_input_transform_input; +pub mod query_input_transform_input; - pub mod query_input_transform_output; +pub mod query_input_transform_output; - pub mod query_output_transform; +pub mod query_output_transform; - pub mod query_output_transform_input; +pub mod query_output_transform_input; - pub mod query_output_transform_output; +pub mod query_output_transform_output; - pub mod resolve_attributes; +pub mod resolve_attributes; - pub mod resolve_attributes_input; +pub mod resolve_attributes_input; - pub mod resolve_attributes_output; +pub mod resolve_attributes_output; - pub mod scan_input_transform; +pub mod scan_input_transform; - pub mod scan_input_transform_input; +pub mod scan_input_transform_input; - pub mod scan_input_transform_output; +pub mod scan_input_transform_output; - pub mod scan_output_transform; +pub mod scan_output_transform; - pub mod scan_output_transform_input; +pub mod scan_output_transform_input; - pub mod scan_output_transform_output; +pub mod scan_output_transform_output; - pub mod transact_get_items_input_transform; +pub mod transact_get_items_input_transform; - pub mod transact_get_items_input_transform_input; +pub mod transact_get_items_input_transform_input; - pub mod transact_get_items_input_transform_output; +pub mod transact_get_items_input_transform_output; - pub mod transact_get_items_output_transform; +pub mod transact_get_items_output_transform; - pub mod transact_get_items_output_transform_input; +pub mod transact_get_items_output_transform_input; - pub mod transact_get_items_output_transform_output; +pub mod transact_get_items_output_transform_output; - pub mod transact_write_items_input_transform; +pub mod transact_write_items_input_transform; - pub mod transact_write_items_input_transform_input; +pub mod transact_write_items_input_transform_input; - pub mod transact_write_items_input_transform_output; +pub mod transact_write_items_input_transform_output; - pub mod transact_write_items_output_transform; +pub mod transact_write_items_output_transform; - pub mod transact_write_items_output_transform_input; +pub mod transact_write_items_output_transform_input; - pub mod transact_write_items_output_transform_output; +pub mod transact_write_items_output_transform_output; - pub mod update_item_input_transform; +pub mod update_item_input_transform; - pub mod update_item_input_transform_input; +pub mod update_item_input_transform_input; - pub mod update_item_input_transform_output; +pub mod update_item_input_transform_output; - pub mod update_item_output_transform; +pub mod update_item_output_transform; - pub mod update_item_output_transform_input; +pub mod update_item_output_transform_input; - pub mod update_item_output_transform_output; +pub mod update_item_output_transform_output; pub mod dynamo_db_tables_encryption_config; diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform.rs index 8f7228ea7..26b69db2c 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_execute_statement_input_transform_input; +pub mod _batch_execute_statement_input_transform_input; - pub mod _batch_execute_statement_input_transform_output; +pub mod _batch_execute_statement_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_input.rs index 90cb24305..b855c190a 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput, >, -) -> crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformInput { +) -> crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformInput{ crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformInput::builder() .set_sdk_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::from_dafny(dafny_value.sdkInput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_output.rs index 3bd0b5b99..ad8381408 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform/_batch_execute_statement_input_transform_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput, >, -) -> crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput { +) -> crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput{ crate::operation::batch_execute_statement_input_transform::BatchExecuteStatementInputTransformOutput::builder() .set_transformed_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::from_dafny(dafny_value.transformedInput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_input.rs index dd2e4c420..0e34e1740 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchExecuteStatementInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchExecuteStatementInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput, >, ) -> crate::types::BatchExecuteStatementInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_output.rs index 19b91b665..0f140d479 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchExecuteStatementInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchExecuteStatementInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput, >, ) -> crate::types::BatchExecuteStatementInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform.rs index 709024a57..398672736 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_execute_statement_output_transform_input; +pub mod _batch_execute_statement_output_transform_input; - pub mod _batch_execute_statement_output_transform_output; +pub mod _batch_execute_statement_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_input.rs index 77b9c4ffb..af51a2d23 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput, >, -) -> crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformInput { +) -> crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformInput{ crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformInput::builder() .set_sdk_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::from_dafny(dafny_value.sdkOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_output.rs index ed42eabd7..536fcb77f 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform/_batch_execute_statement_output_transform_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput, >, -) -> crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput { +) -> crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput{ crate::operation::batch_execute_statement_output_transform::BatchExecuteStatementOutputTransformOutput::builder() .set_transformed_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::from_dafny(dafny_value.transformedOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_input.rs index 496eca808..3236664da 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchExecuteStatementOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchExecuteStatementOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput, >, ) -> crate::types::BatchExecuteStatementOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_output.rs index 19388032b..68c2f1dee 100644 --- a/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_execute_statement_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchExecuteStatementOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchExecuteStatementOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput, >, ) -> crate::types::BatchExecuteStatementOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform.rs index c79c4e091..82cdb8231 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_get_item_input_transform_input; +pub mod _batch_get_item_input_transform_input; - pub mod _batch_get_item_input_transform_output; +pub mod _batch_get_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_input.rs index 6b2302f31..c46235923 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput::BatchGetItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput::BatchGetItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput, >, ) -> crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_output.rs index a35aba580..5760d2dc7 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform/_batch_get_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput, >, ) -> crate::operation::batch_get_item_input_transform::BatchGetItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_input.rs index cfbe525a5..75ac7687e 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchGetItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchGetItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput::BatchGetItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput, >, ) -> crate::types::BatchGetItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_output.rs index c9573c13e..1064c070d 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchGetItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchGetItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput, >, ) -> crate::types::BatchGetItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform.rs index 2eaa537d2..0ef874df1 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_get_item_output_transform_input; +pub mod _batch_get_item_output_transform_input; - pub mod _batch_get_item_output_transform_output; +pub mod _batch_get_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_input.rs index 6020fe2bc..508660a28 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput, >, ) -> crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_output.rs index 74e15051f..cb47d6f8d 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform/_batch_get_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput, >, ) -> crate::operation::batch_get_item_output_transform::BatchGetItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_input.rs index 19a4bb240..4da0e3951 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchGetItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchGetItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput, >, ) -> crate::types::BatchGetItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_output.rs index 76505702b..5e4fe4f9d 100644 --- a/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_get_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchGetItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchGetItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput, >, ) -> crate::types::BatchGetItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform.rs index a0954efc7..f91608896 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_write_item_input_transform_input; +pub mod _batch_write_item_input_transform_input; - pub mod _batch_write_item_input_transform_output; +pub mod _batch_write_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_input.rs index a341ab2ee..5621a9744 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput, >, ) -> crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_output.rs index f126c4493..8db2078d1 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform/_batch_write_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput, >, ) -> crate::operation::batch_write_item_input_transform::BatchWriteItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_input.rs index 99e464dbd..f156c0ce3 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchWriteItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchWriteItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput, >, ) -> crate::types::BatchWriteItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_output.rs index 85943aa8d..9b81ce4d1 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchWriteItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchWriteItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput, >, ) -> crate::types::BatchWriteItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform.rs index 9dd31eac6..651d0175f 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _batch_write_item_output_transform_input; +pub mod _batch_write_item_output_transform_input; - pub mod _batch_write_item_output_transform_output; +pub mod _batch_write_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_input.rs index 307204c1d..3fa4d9c7d 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput, >, ) -> crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_output.rs index b8b4d1f4f..63449bd4e 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform/_batch_write_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput, >, ) -> crate::operation::batch_write_item_output_transform::BatchWriteItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_input.rs index 9f545059c..a1887e0b7 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchWriteItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchWriteItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput, >, ) -> crate::types::BatchWriteItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_output.rs index 29f5d2635..8930623de 100644 --- a/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/batch_write_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::BatchWriteItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::BatchWriteItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput, >, ) -> crate::types::BatchWriteItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/client.rs b/releases/rust/db_esdk/src/conversions/client.rs index 5f354865d..253cf05cc 100644 --- a/releases/rust/db_esdk/src/conversions/client.rs +++ b/releases/rust/db_esdk/src/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::IDynamoDbEncryptionTransformsClient >, ) -> crate::client::Client { - crate::client::Client { dafny_client: dafny_value } + crate::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/conversions/delete_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/delete_item_input_transform.rs index 549a3f8bf..5b2cebcc0 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _delete_item_input_transform_input; +pub mod _delete_item_input_transform_input; - pub mod _delete_item_input_transform_output; +pub mod _delete_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_input.rs index 741b703ba..32505344f 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::delete_item_input_transform::DeleteItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput::DeleteItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput::DeleteItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput, >, ) -> crate::operation::delete_item_input_transform::DeleteItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_output.rs index c31fd5e3d..e2234c233 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_input_transform/_delete_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::delete_item_input_transform::DeleteItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput::DeleteItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput::DeleteItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput, >, ) -> crate::operation::delete_item_input_transform::DeleteItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/delete_item_input_transform_input.rs index 38f20e438..9a0fcc517 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::DeleteItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::DeleteItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput::DeleteItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput, >, ) -> crate::types::DeleteItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/delete_item_input_transform_output.rs index 496182052..2857a649f 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::DeleteItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::DeleteItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput::DeleteItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput, >, ) -> crate::types::DeleteItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/delete_item_output_transform.rs index cc60d846c..a1198b354 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _delete_item_output_transform_input; +pub mod _delete_item_output_transform_input; - pub mod _delete_item_output_transform_output; +pub mod _delete_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_input.rs index 3052ec61e..4d26eabce 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::delete_item_output_transform::DeleteItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput::DeleteItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput::DeleteItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput, >, ) -> crate::operation::delete_item_output_transform::DeleteItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_output.rs index 67d3288e0..542d7d424 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_output_transform/_delete_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::delete_item_output_transform::DeleteItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput, >, ) -> crate::operation::delete_item_output_transform::DeleteItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/delete_item_output_transform_input.rs index 052ccb167..ebca50567 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::DeleteItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::DeleteItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput::DeleteItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput, >, ) -> crate::types::DeleteItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/delete_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/delete_item_output_transform_output.rs index b287047e5..a869b8d0c 100644 --- a/releases/rust/db_esdk/src/conversions/delete_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/delete_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::DeleteItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::DeleteItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput, >, ) -> crate::types::DeleteItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/dynamo_db_tables_encryption_config/_dynamo_db_tables_encryption_config.rs b/releases/rust/db_esdk/src/conversions/dynamo_db_tables_encryption_config/_dynamo_db_tables_encryption_config.rs index 4e23c0297..3b65be6c1 100644 --- a/releases/rust/db_esdk/src/conversions/dynamo_db_tables_encryption_config/_dynamo_db_tables_encryption_config.rs +++ b/releases/rust/db_esdk/src/conversions/dynamo_db_tables_encryption_config/_dynamo_db_tables_encryption_config.rs @@ -5,26 +5,25 @@ pub fn to_dafny( value: crate::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value)) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig, >, ) -> crate::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig { plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { tableEncryptionConfigs: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.table_encryption_configs.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -44,7 +43,7 @@ pub fn plain_from_dafny( crate::types::dynamo_db_tables_encryption_config::DynamoDbTablesEncryptionConfig::builder() .set_table_encryption_configs(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.tableEncryptionConfigs(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_table_encryption_config::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_table_encryption_config::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/conversions/error.rs b/releases/rust/db_esdk/src/conversions/error.rs index 3f13ebf3a..1598f6480 100644 --- a/releases/rust/db_esdk/src/conversions/error.rs +++ b/releases/rust/db_esdk/src/conversions/error.rs @@ -3,14 +3,18 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error pub fn to_opaque_error(value: String) -> - ::std::rc::Rc + ::dafny_runtime::Rc { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -20,21 +24,21 @@ pub fn to_opaque_error(value: String) -> /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< + ::dafny_runtime::Rc< crate::_Wrappers_Compile::Result< T, - ::std::rc::Rc + ::dafny_runtime::Rc > > { - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::types::error::Error::DynamoDbEncryptionTransformsException { message } => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::DynamoDbEncryptionTransformsException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -67,7 +71,7 @@ crate::types::error::Error::AwsCryptographicMaterialProvidersError { error } => crate::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -88,7 +92,7 @@ crate::types::error::Error::AwsCryptographicMaterialProvidersError { error } => #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error, >, ) -> crate::types::error::Error { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform.rs b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform.rs index 623a27cff..c15a59db5 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _execute_statement_input_transform_input; +pub mod _execute_statement_input_transform_input; - pub mod _execute_statement_input_transform_output; +pub mod _execute_statement_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_input.rs index 62a99001e..3185491d5 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput, >, ) -> crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_output.rs index 38d5e923c..f30e9d091 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform/_execute_statement_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput, >, ) -> crate::operation::execute_statement_input_transform::ExecuteStatementInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_input.rs index 2ddc2bd01..c63c40fb3 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteStatementInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteStatementInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput, >, ) -> crate::types::ExecuteStatementInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_output.rs index 398becff2..8da12c860 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteStatementInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteStatementInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput, >, ) -> crate::types::ExecuteStatementInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform.rs b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform.rs index c164f7c6b..1c5c36ca3 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _execute_statement_output_transform_input; +pub mod _execute_statement_output_transform_input; - pub mod _execute_statement_output_transform_output; +pub mod _execute_statement_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_input.rs index 4f2f8ecf8..dca1f73c9 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput, >, ) -> crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_output.rs index 69144974e..6bbf82d69 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform/_execute_statement_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput, >, ) -> crate::operation::execute_statement_output_transform::ExecuteStatementOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_input.rs index 7f777c273..27da94f79 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteStatementOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteStatementOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput, >, ) -> crate::types::ExecuteStatementOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_output.rs index 5f67fadce..7dd03a4d7 100644 --- a/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_statement_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteStatementOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteStatementOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput, >, ) -> crate::types::ExecuteStatementOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform.rs index c8b73c60d..0a5d2940b 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _execute_transaction_input_transform_input; +pub mod _execute_transaction_input_transform_input; - pub mod _execute_transaction_input_transform_output; +pub mod _execute_transaction_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_input.rs index e125eb4cf..67ef35e15 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput, >, ) -> crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_output.rs index 0c5e14fe2..61dcbabf4 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform/_execute_transaction_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput, >, ) -> crate::operation::execute_transaction_input_transform::ExecuteTransactionInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_input.rs index e0dfbd914..f591cf352 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteTransactionInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteTransactionInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput, >, ) -> crate::types::ExecuteTransactionInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_output.rs index de9435ba9..b5aba2dd8 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteTransactionInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteTransactionInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput, >, ) -> crate::types::ExecuteTransactionInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform.rs index ab3254896..a64c3fccc 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _execute_transaction_output_transform_input; +pub mod _execute_transaction_output_transform_input; - pub mod _execute_transaction_output_transform_output; +pub mod _execute_transaction_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_input.rs index 99f334f79..a1c589d9d 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_input.rs @@ -4,22 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput, >, -) -> crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformInput { +) -> crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformInput +{ crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformInput::builder() .set_sdk_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::from_dafny(dafny_value.sdkOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_output.rs index 89633bee2..84207f0a2 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform/_execute_transaction_output_transform_output.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput, >, -) -> crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput { +) -> crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput +{ crate::operation::execute_transaction_output_transform::ExecuteTransactionOutputTransformOutput::builder() .set_transformed_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::from_dafny(dafny_value.transformedOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_input.rs index e0b55696f..9e5d8f8d7 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteTransactionOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteTransactionOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput, >, ) -> crate::types::ExecuteTransactionOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_output.rs index 03c6fa82c..3b8a18a4a 100644 --- a/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/execute_transaction_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ExecuteTransactionOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ExecuteTransactionOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput, >, ) -> crate::types::ExecuteTransactionOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/get_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/get_item_input_transform.rs index 291c941fc..dc130dec9 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_item_input_transform_input; +pub mod _get_item_input_transform_input; - pub mod _get_item_input_transform_output; +pub mod _get_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_input.rs index 97e4c607d..6812eb0d1 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::get_item_input_transform::GetItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput::GetItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput::GetItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput, >, ) -> crate::operation::get_item_input_transform::GetItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_output.rs index 93d94c2d5..72aae2966 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_input_transform/_get_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::get_item_input_transform::GetItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput::GetItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput::GetItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput, >, ) -> crate::operation::get_item_input_transform::GetItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/get_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/get_item_input_transform_input.rs index 055b2e0ff..d568a8010 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::GetItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::GetItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput::GetItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput, >, ) -> crate::types::GetItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/get_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/get_item_input_transform_output.rs index 3c4c77362..7c04aafb0 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::GetItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::GetItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput::GetItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput, >, ) -> crate::types::GetItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/get_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/get_item_output_transform.rs index 378f3d2a7..95b44ff12 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_item_output_transform_input; +pub mod _get_item_output_transform_input; - pub mod _get_item_output_transform_output; +pub mod _get_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_input.rs index 9425250f2..058087722 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::get_item_output_transform::GetItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput::GetItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput::GetItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput, >, ) -> crate::operation::get_item_output_transform::GetItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_output.rs index 4bd50150e..0230b7e40 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_output_transform/_get_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::get_item_output_transform::GetItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput::GetItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput::GetItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput, >, ) -> crate::operation::get_item_output_transform::GetItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/get_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/get_item_output_transform_input.rs index fd38e6695..48f0acb6d 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::GetItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::GetItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput::GetItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput, >, ) -> crate::types::GetItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/get_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/get_item_output_transform_output.rs index d5795b5d8..baca875b1 100644 --- a/releases/rust/db_esdk/src/conversions/get_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/get_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::GetItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::GetItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput::GetItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput, >, ) -> crate::types::GetItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/put_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/put_item_input_transform.rs index ae7812760..8c1395444 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _put_item_input_transform_input; +pub mod _put_item_input_transform_input; - pub mod _put_item_input_transform_output; +pub mod _put_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_input.rs index d46a9626c..16905fca4 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::put_item_input_transform::PutItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput::PutItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput::PutItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput, >, ) -> crate::operation::put_item_input_transform::PutItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_output.rs index 2de239237..e3a5c20bf 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_input_transform/_put_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::put_item_input_transform::PutItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput::PutItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput::PutItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput, >, ) -> crate::operation::put_item_input_transform::PutItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/put_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/put_item_input_transform_input.rs index 7ee3224b9..017e037e4 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::PutItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::PutItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput::PutItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput, >, ) -> crate::types::PutItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/put_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/put_item_input_transform_output.rs index f6100a1c8..6864b455a 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::PutItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::PutItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput::PutItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput, >, ) -> crate::types::PutItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/put_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/put_item_output_transform.rs index 9f15f5b5f..29af8bf71 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _put_item_output_transform_input; +pub mod _put_item_output_transform_input; - pub mod _put_item_output_transform_output; +pub mod _put_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_input.rs index 2dfa26e7c..863cda6f7 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::put_item_output_transform::PutItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput::PutItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput::PutItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput, >, ) -> crate::operation::put_item_output_transform::PutItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_output.rs index fb151dbf0..8d626775c 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_output_transform/_put_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::put_item_output_transform::PutItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput::PutItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput::PutItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput, >, ) -> crate::operation::put_item_output_transform::PutItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/put_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/put_item_output_transform_input.rs index 5b8fc043d..5237dab88 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::PutItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::PutItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput::PutItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput, >, ) -> crate::types::PutItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/put_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/put_item_output_transform_output.rs index 30d25a9f4..0565c099c 100644 --- a/releases/rust/db_esdk/src/conversions/put_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/put_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::PutItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::PutItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput::PutItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput, >, ) -> crate::types::PutItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/query_input_transform.rs b/releases/rust/db_esdk/src/conversions/query_input_transform.rs index fa4f8194e..28551fd7e 100644 --- a/releases/rust/db_esdk/src/conversions/query_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/query_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _query_input_transform_input; +pub mod _query_input_transform_input; - pub mod _query_input_transform_output; +pub mod _query_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_input.rs index 0c9f508dc..ce5fcfab4 100644 --- a/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_input.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::query_input_transform::QueryInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput::QueryInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput::QueryInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput, >, ) -> crate::operation::query_input_transform::QueryInputTransformInput { crate::operation::query_input_transform::QueryInputTransformInput::builder() - .set_sdk_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny(dafny_value.sdkInput().clone()) - )) + .set_sdk_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny( + dafny_value.sdkInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_output.rs index 1db17c253..102544ba8 100644 --- a/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/query_input_transform/_query_input_transform_output.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::query_input_transform::QueryInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput::QueryInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput::QueryInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput, >, ) -> crate::operation::query_input_transform::QueryInputTransformOutput { crate::operation::query_input_transform::QueryInputTransformOutput::builder() - .set_transformed_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny(dafny_value.transformedInput().clone()) - )) + .set_transformed_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny( + dafny_value.transformedInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/query_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/query_input_transform_input.rs index 18d3653e9..439c74046 100644 --- a/releases/rust/db_esdk/src/conversions/query_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/query_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::QueryInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::QueryInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput::QueryInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput, >, ) -> crate::types::QueryInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/query_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/query_input_transform_output.rs index 109d1f9c5..8688c8ee0 100644 --- a/releases/rust/db_esdk/src/conversions/query_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/query_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::QueryInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::QueryInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput::QueryInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput, >, ) -> crate::types::QueryInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/query_output_transform.rs b/releases/rust/db_esdk/src/conversions/query_output_transform.rs index 4fef09c70..cae88e489 100644 --- a/releases/rust/db_esdk/src/conversions/query_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/query_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _query_output_transform_input; +pub mod _query_output_transform_input; - pub mod _query_output_transform_output; +pub mod _query_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_input.rs index c67dfd5e6..f7cd428bc 100644 --- a/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_input.rs @@ -4,27 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::query_output_transform::QueryOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput::QueryOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput::QueryOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput, >, ) -> crate::operation::query_output_transform::QueryOutputTransformInput { crate::operation::query_output_transform::QueryOutputTransformInput::builder() - .set_sdk_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::from_dafny(dafny_value.sdkOutput().clone()) - )) - .set_original_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny(dafny_value.originalInput().clone()) - )) + .set_sdk_output(Some( + crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::from_dafny( + dafny_value.sdkOutput().clone(), + ), + )) + .set_original_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny( + dafny_value.originalInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_output.rs index b87ee96dc..49d9955f5 100644 --- a/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/query_output_transform/_query_output_transform_output.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::query_output_transform::QueryOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput::QueryOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput::QueryOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput, >, ) -> crate::operation::query_output_transform::QueryOutputTransformOutput { crate::operation::query_output_transform::QueryOutputTransformOutput::builder() - .set_transformed_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::from_dafny(dafny_value.transformedOutput().clone()) - )) + .set_transformed_output(Some( + crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::from_dafny( + dafny_value.transformedOutput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/query_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/query_output_transform_input.rs index 1f8a5ab1e..756ffa155 100644 --- a/releases/rust/db_esdk/src/conversions/query_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/query_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::QueryOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::QueryOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput::QueryOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput, >, ) -> crate::types::QueryOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/query_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/query_output_transform_output.rs index 0e3525a5d..2b0967e20 100644 --- a/releases/rust/db_esdk/src/conversions/query_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/query_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::QueryOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::QueryOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput::QueryOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput, >, ) -> crate::types::QueryOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/resolve_attributes.rs b/releases/rust/db_esdk/src/conversions/resolve_attributes.rs index 67c2846e2..51058eba1 100644 --- a/releases/rust/db_esdk/src/conversions/resolve_attributes.rs +++ b/releases/rust/db_esdk/src/conversions/resolve_attributes.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _resolve_attributes_input; +pub mod _resolve_attributes_input; - pub mod _resolve_attributes_output; +pub mod _resolve_attributes_output; diff --git a/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_input.rs b/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_input.rs index 115aa5932..f310d30c9 100644 --- a/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_input.rs +++ b/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::resolve_attributes::ResolveAttributesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput::ResolveAttributesInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput::ResolveAttributesInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Item: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -18,9 +18,9 @@ pub fn to_dafny( Version: crate::standard_library_conversions::oint_to_dafny(value.version), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput, >, ) -> crate::operation::resolve_attributes::ResolveAttributesInput { @@ -28,7 +28,7 @@ pub fn from_dafny( .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Item(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_output.rs b/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_output.rs index 1a96ae415..64bba0423 100644 --- a/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_output.rs +++ b/releases/rust/db_esdk/src/conversions/resolve_attributes/_resolve_attributes_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::resolve_attributes::ResolveAttributesOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput::ResolveAttributesOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput::ResolveAttributesOutput { VirtualFields: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.virtual_fields.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&v), @@ -20,9 +20,9 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput, >, ) -> crate::operation::resolve_attributes::ResolveAttributesOutput { diff --git a/releases/rust/db_esdk/src/conversions/resolve_attributes_input.rs b/releases/rust/db_esdk/src/conversions/resolve_attributes_input.rs index 4cb22b7bf..c7224d643 100644 --- a/releases/rust/db_esdk/src/conversions/resolve_attributes_input.rs +++ b/releases/rust/db_esdk/src/conversions/resolve_attributes_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ResolveAttributesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ResolveAttributesInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput::ResolveAttributesInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Item: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.item.clone().unwrap(), @@ -29,20 +29,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput, >, ) -> crate::types::ResolveAttributesInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Item(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -71,7 +71,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/resolve_attributes_output.rs b/releases/rust/db_esdk/src/conversions/resolve_attributes_output.rs index b2361c634..f73f2af9f 100644 --- a/releases/rust/db_esdk/src/conversions/resolve_attributes_output.rs +++ b/releases/rust/db_esdk/src/conversions/resolve_attributes_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ResolveAttributesOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ResolveAttributesOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput::ResolveAttributesOutput { VirtualFields: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.virtual_fields.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -31,20 +31,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput, >, ) -> crate::types::ResolveAttributesOutput { @@ -75,7 +75,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/scan_input_transform.rs b/releases/rust/db_esdk/src/conversions/scan_input_transform.rs index 3522c4761..708c1b056 100644 --- a/releases/rust/db_esdk/src/conversions/scan_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/scan_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _scan_input_transform_input; +pub mod _scan_input_transform_input; - pub mod _scan_input_transform_output; +pub mod _scan_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_input.rs index 832d3a502..f5bfd4081 100644 --- a/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_input.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::scan_input_transform::ScanInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput::ScanInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput::ScanInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput, >, ) -> crate::operation::scan_input_transform::ScanInputTransformInput { crate::operation::scan_input_transform::ScanInputTransformInput::builder() - .set_sdk_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny(dafny_value.sdkInput().clone()) - )) + .set_sdk_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny( + dafny_value.sdkInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_output.rs index cea32e028..4296eb289 100644 --- a/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/scan_input_transform/_scan_input_transform_output.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::scan_input_transform::ScanInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput::ScanInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput::ScanInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput, >, ) -> crate::operation::scan_input_transform::ScanInputTransformOutput { crate::operation::scan_input_transform::ScanInputTransformOutput::builder() - .set_transformed_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny(dafny_value.transformedInput().clone()) - )) + .set_transformed_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny( + dafny_value.transformedInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/scan_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/scan_input_transform_input.rs index 16241314b..3f1d837da 100644 --- a/releases/rust/db_esdk/src/conversions/scan_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/scan_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ScanInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ScanInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput::ScanInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput, >, ) -> crate::types::ScanInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/scan_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/scan_input_transform_output.rs index ecc5ff025..e48e6b9bd 100644 --- a/releases/rust/db_esdk/src/conversions/scan_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/scan_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ScanInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ScanInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput::ScanInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput, >, ) -> crate::types::ScanInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/scan_output_transform.rs b/releases/rust/db_esdk/src/conversions/scan_output_transform.rs index c28b8aa5c..5d6025a5c 100644 --- a/releases/rust/db_esdk/src/conversions/scan_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/scan_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _scan_output_transform_input; +pub mod _scan_output_transform_input; - pub mod _scan_output_transform_output; +pub mod _scan_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_input.rs index ff3cfc2c5..e1b2346d5 100644 --- a/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_input.rs @@ -4,27 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::scan_output_transform::ScanOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput::ScanOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput::ScanOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput, >, ) -> crate::operation::scan_output_transform::ScanOutputTransformInput { crate::operation::scan_output_transform::ScanOutputTransformInput::builder() - .set_sdk_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::from_dafny(dafny_value.sdkOutput().clone()) - )) - .set_original_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny(dafny_value.originalInput().clone()) - )) + .set_sdk_output(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::from_dafny( + dafny_value.sdkOutput().clone(), + ), + )) + .set_original_input(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny( + dafny_value.originalInput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_output.rs index 85e3e99a6..5b8008000 100644 --- a/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/scan_output_transform/_scan_output_transform_output.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::scan_output_transform::ScanOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput::ScanOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput::ScanOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput, >, ) -> crate::operation::scan_output_transform::ScanOutputTransformOutput { crate::operation::scan_output_transform::ScanOutputTransformOutput::builder() - .set_transformed_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::from_dafny(dafny_value.transformedOutput().clone()) - )) + .set_transformed_output(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::from_dafny( + dafny_value.transformedOutput().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/conversions/scan_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/scan_output_transform_input.rs index 60c37fe70..d85cb24ea 100644 --- a/releases/rust/db_esdk/src/conversions/scan_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/scan_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ScanOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ScanOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput::ScanOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput, >, ) -> crate::types::ScanOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/scan_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/scan_output_transform_output.rs index fd5281304..6b11f23f6 100644 --- a/releases/rust/db_esdk/src/conversions/scan_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/scan_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::ScanOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::ScanOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput::ScanOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput, >, ) -> crate::types::ScanOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform.rs index e0adeea75..ed9ab1929 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _transact_get_items_input_transform_input; +pub mod _transact_get_items_input_transform_input; - pub mod _transact_get_items_input_transform_output; +pub mod _transact_get_items_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_input.rs index 635f4747f..e4b89f8ef 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput, >, ) -> crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_output.rs index a043e758f..dbf247b77 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform/_transact_get_items_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput, >, ) -> crate::operation::transact_get_items_input_transform::TransactGetItemsInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_input.rs index 5f2dce84b..afa1c8022 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactGetItemsInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactGetItemsInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput, >, ) -> crate::types::TransactGetItemsInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_output.rs index 599816f60..e5f6ef64e 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactGetItemsInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactGetItemsInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput, >, ) -> crate::types::TransactGetItemsInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform.rs index 5e29eb4bf..70590496b 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _transact_get_items_output_transform_input; +pub mod _transact_get_items_output_transform_input; - pub mod _transact_get_items_output_transform_output; +pub mod _transact_get_items_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_input.rs index 79332cff9..480af5ccd 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput, >, ) -> crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_output.rs index 33f034b8f..486b7d1a9 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform/_transact_get_items_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput, >, ) -> crate::operation::transact_get_items_output_transform::TransactGetItemsOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_input.rs index 7f33846c9..890291cf9 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactGetItemsOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactGetItemsOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput, >, ) -> crate::types::TransactGetItemsOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_output.rs index 54436d43f..68ee30360 100644 --- a/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_get_items_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactGetItemsOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactGetItemsOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput, >, ) -> crate::types::TransactGetItemsOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform.rs index d22463100..8853cdc2d 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _transact_write_items_input_transform_input; +pub mod _transact_write_items_input_transform_input; - pub mod _transact_write_items_input_transform_output; +pub mod _transact_write_items_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_input.rs index 3c1d3d0af..95a8b0fb7 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput, >, ) -> crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_output.rs index d8d5afe1b..64765c07e 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform/_transact_write_items_input_transform_output.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput, >, -) -> crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput { +) -> crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput +{ crate::operation::transact_write_items_input_transform::TransactWriteItemsInputTransformOutput::builder() .set_transformed_input(Some( crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::from_dafny(dafny_value.transformedInput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_input.rs index e42e801cc..4686f1e33 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactWriteItemsInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactWriteItemsInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput, >, ) -> crate::types::TransactWriteItemsInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_output.rs index d4205e019..9e704c0f7 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactWriteItemsInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactWriteItemsInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput, >, ) -> crate::types::TransactWriteItemsInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform.rs index 0db34027b..9f46f5734 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _transact_write_items_output_transform_input; +pub mod _transact_write_items_output_transform_input; - pub mod _transact_write_items_output_transform_output; +pub mod _transact_write_items_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_input.rs index 2029c3dcb..0dfd74f04 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_input.rs @@ -4,22 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput, >, -) -> crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformInput { +) -> crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformInput +{ crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformInput::builder() .set_sdk_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::from_dafny(dafny_value.sdkOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_output.rs index 9a4144825..b60253d0b 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform/_transact_write_items_output_transform_output.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput, >, -) -> crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput { +) -> crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput +{ crate::operation::transact_write_items_output_transform::TransactWriteItemsOutputTransformOutput::builder() .set_transformed_output(Some( crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::from_dafny(dafny_value.transformedOutput().clone()) )) diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_input.rs index fea6a14f0..430a91ddb 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactWriteItemsOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactWriteItemsOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput, >, ) -> crate::types::TransactWriteItemsOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_output.rs index 8bd6ee8e8..1f9028763 100644 --- a/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/transact_write_items_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::TransactWriteItemsOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::TransactWriteItemsOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput, >, ) -> crate::types::TransactWriteItemsOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/update_item_input_transform.rs b/releases/rust/db_esdk/src/conversions/update_item_input_transform.rs index 3848df152..9c2aed1b5 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_input_transform.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_input_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _update_item_input_transform_input; +pub mod _update_item_input_transform_input; - pub mod _update_item_input_transform_output; +pub mod _update_item_input_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_input.rs index b5962eed3..674987235 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::update_item_input_transform::UpdateItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput::UpdateItemInputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput::UpdateItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput, >, ) -> crate::operation::update_item_input_transform::UpdateItemInputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_output.rs index 1cacdfbfd..97aa65fd0 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_input_transform/_update_item_input_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::update_item_input_transform::UpdateItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput::UpdateItemInputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput::UpdateItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput, >, ) -> crate::operation::update_item_input_transform::UpdateItemInputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/update_item_input_transform_input.rs b/releases/rust/db_esdk/src/conversions/update_item_input_transform_input.rs index a2816d63d..0d81aec97 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_input_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_input_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::UpdateItemInputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::UpdateItemInputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput::UpdateItemInputTransformInput { sdkInput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::to_dafny(&value.sdk_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput, >, ) -> crate::types::UpdateItemInputTransformInput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/update_item_input_transform_output.rs b/releases/rust/db_esdk/src/conversions/update_item_input_transform_output.rs index a54833223..0d79fc245 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_input_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_input_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::UpdateItemInputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::UpdateItemInputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput::UpdateItemInputTransformOutput { transformedInput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::to_dafny(&value.transformed_input.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput, >, ) -> crate::types::UpdateItemInputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/update_item_output_transform.rs b/releases/rust/db_esdk/src/conversions/update_item_output_transform.rs index 768506d50..b804a82dd 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_output_transform.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_output_transform.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _update_item_output_transform_input; +pub mod _update_item_output_transform_input; - pub mod _update_item_output_transform_output; +pub mod _update_item_output_transform_output; diff --git a/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_input.rs index 0782ba2a3..4dfc0163e 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::update_item_output_transform::UpdateItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput::UpdateItemOutputTransformInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput::UpdateItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , originalInput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::to_dafny(&value.original_input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput, >, ) -> crate::operation::update_item_output_transform::UpdateItemOutputTransformInput { diff --git a/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_output.rs index 6ce66cb24..b569d8ea1 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_output_transform/_update_item_output_transform_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::operation::update_item_output_transform::UpdateItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput, >, ) -> crate::operation::update_item_output_transform::UpdateItemOutputTransformOutput { diff --git a/releases/rust/db_esdk/src/conversions/update_item_output_transform_input.rs b/releases/rust/db_esdk/src/conversions/update_item_output_transform_input.rs index cc1e2445c..c3cd619ce 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_output_transform_input.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_output_transform_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::UpdateItemOutputTransformInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::UpdateItemOutputTransformInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput::UpdateItemOutputTransformInput { sdkOutput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_response::to_dafny(&value.sdk_output.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput, >, ) -> crate::types::UpdateItemOutputTransformInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/conversions/update_item_output_transform_output.rs b/releases/rust/db_esdk/src/conversions/update_item_output_transform_output.rs index 728d7a134..09b1cc785 100644 --- a/releases/rust/db_esdk/src/conversions/update_item_output_transform_output.rs +++ b/releases/rust/db_esdk/src/conversions/update_item_output_transform_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::types::UpdateItemOutputTransformOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::types::UpdateItemOutputTransformOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput { transformedOutput: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_response::to_dafny(&value.transformed_output.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput, >, ) -> crate::types::UpdateItemOutputTransformOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/dafny_libraries.rs b/releases/rust/db_esdk/src/dafny_libraries.rs index 4afd94ac5..7781dc322 100644 --- a/releases/rust/db_esdk/src/dafny_libraries.rs +++ b/releases/rust/db_esdk/src/dafny_libraries.rs @@ -73,9 +73,9 @@ pub mod DafnyLibraries { } impl - ::dafny_runtime::UpcastObject for MutableMap + ::dafny_runtime::UpcastObject for MutableMap { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); + ::dafny_runtime::UpcastObjectFn!(dafny_runtime::DynAny); } pub mod FileIO { diff --git a/releases/rust/db_esdk/src/ddb.rs b/releases/rust/db_esdk/src/ddb.rs index 2032916b5..fe250f86d 100644 --- a/releases/rust/db_esdk/src/ddb.rs +++ b/releases/rust/db_esdk/src/ddb.rs @@ -17,10 +17,10 @@ static DAFNY_TOKIO_RUNTIME: LazyLock = LazyLock::new(|| #[allow(non_snake_case)] impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::_default { - pub fn DDBClientForRegion(region: &::dafny_runtime::Sequence<::dafny_runtime::DafnyCharUTF16>) -> ::std::rc::Rc< + pub fn DDBClientForRegion(region: &::dafny_runtime::Sequence<::dafny_runtime::DafnyCharUTF16>) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< ::dafny_runtime::Object, - ::std::rc::Rc + ::dafny_runtime::Rc > >{ let region = @@ -44,15 +44,15 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: let inner = aws_sdk_dynamodb::Client::new(&shared_config); let client = crate::deps::com_amazonaws_dynamodb::client::Client { inner }; let dafny_client = ::dafny_runtime::upcast_object()(::dafny_runtime::object::new(client)); - std::rc::Rc::new(crate::r#_Wrappers_Compile::Result::Success { + dafny_runtime::Rc::new(crate::r#_Wrappers_Compile::Result::Success { value: dafny_client, }) } - pub fn DynamoDBClient() -> ::std::rc::Rc< + pub fn DynamoDBClient() -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< ::dafny_runtime::Object, - ::std::rc::Rc + ::dafny_runtime::Rc > >{ let shared_config = match tokio::runtime::Handle::try_current() { @@ -68,7 +68,7 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: let inner = aws_sdk_dynamodb::Client::new(&shared_config); let client = crate::deps::com_amazonaws_dynamodb::client::Client { inner }; let dafny_client = ::dafny_runtime::upcast_object()(::dafny_runtime::object::new(client)); - std::rc::Rc::new(crate::r#_Wrappers_Compile::Result::Success { + dafny_runtime::Rc::new(crate::r#_Wrappers_Compile::Result::Success { value: dafny_client, }) } diff --git a/releases/rust/db_esdk/src/deps.rs b/releases/rust/db_esdk/src/deps.rs index a289fd36d..7a6768e9a 100644 --- a/releases/rust/db_esdk/src/deps.rs +++ b/releases/rust/db_esdk/src/deps.rs @@ -3,16 +3,16 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod aws_cryptography_dbEncryptionSdk_dynamoDb; - pub mod aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor; +pub mod aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor; - pub mod aws_cryptography_dbEncryptionSdk_structuredEncryption; +pub mod aws_cryptography_dbEncryptionSdk_structuredEncryption; - pub mod aws_cryptography_keyStore; +pub mod aws_cryptography_keyStore; - pub mod aws_cryptography_materialProviders; +pub mod aws_cryptography_materialProviders; - pub mod aws_cryptography_primitives; +pub mod aws_cryptography_primitives; - pub mod com_amazonaws_dynamodb; +pub mod com_amazonaws_dynamodb; - pub mod com_amazonaws_kms; +pub mod com_amazonaws_kms; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client.rs index b90004f8a..0058914fd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client.rs @@ -14,7 +14,8 @@ impl Client { #[track_caller] pub fn from_conf( input: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig, - ) -> Result { + ) -> Result + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbEncryptionConfig(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::wrap_validation_err)?; let inner = @@ -28,7 +29,7 @@ impl Client { return Err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::error::from_dafny(inner.as_ref().error().clone())); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/create_dynamo_db_encryption_branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/create_dynamo_db_encryption_branch_key_id_supplier.rs index 3833aa9a7..ce1365812 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/create_dynamo_db_encryption_branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/create_dynamo_db_encryption_branch_key_id_supplier.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client { /// - On success, responds with [`CreateDynamoDbEncryptionBranchKeyIdSupplierOutput`](crate::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput) with field(s): /// - [`branch_key_id_supplier(Option)`](crate::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::branch_key_id_supplier): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierError) - pub fn create_dynamo_db_encryption_branch_key_id_supplier(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder { + pub fn create_dynamo_db_encryption_branch_key_id_supplier(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/get_encrypted_data_key_description.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/get_encrypted_data_key_description.rs index 2d4e2be3d..67e814d38 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/get_encrypted_data_key_description.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/client/get_encrypted_data_key_description.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client { /// - On success, responds with [`GetEncryptedDataKeyDescriptionOutput`](crate::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput) with field(s): /// - [`encrypted_data_key_description_output(Option<::std::vec::Vec>)`](crate::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput::encrypted_data_key_description_output): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionError) - pub fn get_encrypted_data_key_description(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionFluentBuilder { + pub fn get_encrypted_data_key_description(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions.rs index a535c65cf..4b010f314 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions.rs @@ -3,96 +3,96 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod as_set; - pub mod beacon_key_source; +pub mod beacon_key_source; - pub mod beacon_style; +pub mod beacon_style; - pub mod beacon_version; +pub mod beacon_version; - pub mod client; +pub mod client; - pub mod compound_beacon; +pub mod compound_beacon; - pub mod constructor; +pub mod constructor; - pub mod constructor_part; +pub mod constructor_part; - pub mod create_dynamo_db_encryption_branch_key_id_supplier; +pub mod create_dynamo_db_encryption_branch_key_id_supplier; - pub mod create_dynamo_db_encryption_branch_key_id_supplier_input; +pub mod create_dynamo_db_encryption_branch_key_id_supplier_input; - pub mod create_dynamo_db_encryption_branch_key_id_supplier_output; +pub mod create_dynamo_db_encryption_branch_key_id_supplier_output; - pub mod dynamo_db_key_branch_key_id_supplier; +pub mod dynamo_db_key_branch_key_id_supplier; - pub mod dynamo_db_table_encryption_config; +pub mod dynamo_db_table_encryption_config; - pub mod dynamo_db_tables_encryption_config; +pub mod dynamo_db_tables_encryption_config; - pub mod encrypted_data_key_description; +pub mod encrypted_data_key_description; - pub mod encrypted_part; +pub mod encrypted_part; - pub mod error; +pub mod error; - pub mod get_branch_key_id_from_ddb_key; +pub mod get_branch_key_id_from_ddb_key; - pub mod get_branch_key_id_from_ddb_key_input; +pub mod get_branch_key_id_from_ddb_key_input; - pub mod get_branch_key_id_from_ddb_key_output; +pub mod get_branch_key_id_from_ddb_key_output; - pub mod get_encrypted_data_key_description; +pub mod get_encrypted_data_key_description; - pub mod get_encrypted_data_key_description_input; +pub mod get_encrypted_data_key_description_input; - pub mod get_encrypted_data_key_description_output; +pub mod get_encrypted_data_key_description_output; - pub mod get_encrypted_data_key_description_union; +pub mod get_encrypted_data_key_description_union; - pub mod get_prefix; +pub mod get_prefix; - pub mod get_segment; +pub mod get_segment; - pub mod get_segments; +pub mod get_segments; - pub mod get_substring; +pub mod get_substring; - pub mod get_suffix; +pub mod get_suffix; - pub mod insert; +pub mod insert; - pub mod legacy_dynamo_db_encryptor; +pub mod legacy_dynamo_db_encryptor; - pub mod legacy_override; +pub mod legacy_override; - pub mod legacy_policy; +pub mod legacy_policy; - pub mod lower; +pub mod lower; - pub mod multi_key_store; +pub mod multi_key_store; - pub mod part_only; +pub mod part_only; - pub mod plaintext_override; +pub mod plaintext_override; - pub mod search_config; +pub mod search_config; - pub mod shared; +pub mod shared; - pub mod shared_set; +pub mod shared_set; - pub mod signed_part; +pub mod signed_part; - pub mod single_key_store; +pub mod single_key_store; - pub mod standard_beacon; +pub mod standard_beacon; - pub mod upper; +pub mod upper; - pub mod virtual_field; +pub mod virtual_field; - pub mod virtual_part; +pub mod virtual_part; - pub mod virtual_transform; +pub mod virtual_transform; pub mod dynamo_db_encryption_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/as_set.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/as_set.rs index 334b935ba..d6603e872 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/as_set.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/as_set.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::AsSet, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::AsSet { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::AsSet +{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::AsSet::AsSet { } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::AsSet, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_key_source.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_key_source.rs index 6c1785084..9716e891f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_key_source.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_key_source.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconKeySource, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single(x) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconKeySource::single { single: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::single_key_store::to_dafny(&x.clone()) @@ -24,11 +24,11 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource:: #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconKeySource, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconKeySource::single { single: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::single_key_store::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_style.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_style.rs index 988a27363..ef39c068c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_style.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_style.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconStyle, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly(x) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconStyle::partOnly { partOnly: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::part_only::to_dafny(&x.clone()) @@ -34,11 +34,11 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shar #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconStyle, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconStyle::partOnly { partOnly: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::part_only::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_version.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_version.rs index 952dd9e55..9491e016e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_version.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/beacon_version.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersion, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersion { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersion{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersion::BeaconVersion { version: value.version.clone().unwrap(), keyStore: crate::deps::aws_cryptography_keyStore::conversions::client::to_dafny(&value.key_store.clone().unwrap()) @@ -25,7 +25,7 @@ pub fn to_dafny_plain( , ) , - compoundBeacons: ::std::rc::Rc::new(match &value.compound_beacons { + compoundBeacons: ::dafny_runtime::Rc::new(match &value.compound_beacons { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::compound_beacon::to_dafny(&e.clone()) @@ -35,7 +35,7 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - virtualFields: ::std::rc::Rc::new(match &value.virtual_fields { + virtualFields: ::dafny_runtime::Rc::new(match &value.virtual_fields { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_field::to_dafny(&e.clone()) @@ -45,7 +45,7 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - encryptedParts: ::std::rc::Rc::new(match &value.encrypted_parts { + encryptedParts: ::dafny_runtime::Rc::new(match &value.encrypted_parts { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::to_dafny(&e.clone()) @@ -55,7 +55,7 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - signedParts: ::std::rc::Rc::new(match &value.signed_parts { + signedParts: ::dafny_runtime::Rc::new(match &value.signed_parts { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::to_dafny(&e.clone()) @@ -71,20 +71,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersion, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion { @@ -104,7 +104,7 @@ pub fn plain_from_dafny( .set_key_source(Some( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::beacon_key_source::from_dafny(dafny_value.keySource().clone()) )) .set_standard_beacons(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.standardBeacons(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::standard_beacon::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::standard_beacon::from_dafny(e.clone()) , ) )) @@ -112,7 +112,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::compound_beacon::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::compound_beacon::from_dafny(e.clone()) , ) ), @@ -123,7 +123,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_field::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_field::from_dafny(e.clone()) , ) ), @@ -134,7 +134,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::from_dafny(e.clone()) , ) ), @@ -145,7 +145,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::from_dafny(e.clone()) , ) ), @@ -159,10 +159,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/client.rs index 121a55c52..0534df468 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbEncryptionClient >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client { - crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/compound_beacon.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/compound_beacon.rs index 698950aa9..2d848e338 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/compound_beacon.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/compound_beacon.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CompoundBeacon, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CompoundBeacon { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CompoundBeacon{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CompoundBeacon::CompoundBeacon { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), split: crate::standard_library_conversions::ostring_to_dafny(&value.split) .Extract(), - encrypted: ::std::rc::Rc::new(match &value.encrypted { + encrypted: ::dafny_runtime::Rc::new(match &value.encrypted { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::to_dafny(&e.clone()) @@ -27,7 +27,7 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - signed: ::std::rc::Rc::new(match &value.signed { + signed: ::dafny_runtime::Rc::new(match &value.signed { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::to_dafny(&e.clone()) @@ -37,7 +37,7 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - constructors: ::std::rc::Rc::new(match &value.constructors { + constructors: ::dafny_runtime::Rc::new(match &value.constructors { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor::to_dafny(&e.clone()) @@ -53,20 +53,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CompoundBeacon, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon { @@ -86,7 +86,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_part::from_dafny(e.clone()) , ) ), @@ -97,7 +97,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::signed_part::from_dafny(e.clone()) , ) ), @@ -108,7 +108,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor::from_dafny(e.clone()) , ) ), @@ -122,10 +122,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor.rs index da92186fb..bc4ce2b9f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor::Constructor { parts: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.parts.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor_part::to_dafny(&e.clone()) @@ -26,20 +26,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor { @@ -54,7 +54,7 @@ pub fn plain_from_dafny( crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Constructor::Constructor {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor::builder() .set_parts(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.parts(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::constructor_part::from_dafny(e.clone()) , ) )) @@ -65,10 +65,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor_part.rs index e859d1c72..30f9051d9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/constructor_part.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPart, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPart { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPart{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPart::ConstructorPart { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), required: value.required.clone().unwrap(), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPart, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier.rs index 5d4bbccc2..a33fe4131 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_dynamo_db_encryption_branch_key_id_supplier_input; +pub mod _create_dynamo_db_encryption_branch_key_id_supplier_input; - pub mod _create_dynamo_db_encryption_branch_key_id_supplier_output; +pub mod _create_dynamo_db_encryption_branch_key_id_supplier_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs index fa98e4348..1141b0f66 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { ddbKeyBranchKeyIdSupplier: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_key_branch_key_id_supplier::to_dafny(&value.ddb_key_branch_key_id_supplier.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::builder() .set_ddb_key_branch_key_id_supplier(Some( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_key_branch_key_id_supplier::from_dafny(dafny_value.ddbKeyBranchKeyIdSupplier().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs index c6c0a5aef..25b83d5f1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { branchKeyIdSupplier: crate::deps::aws_cryptography_materialProviders::conversions::branch_key_id_supplier::to_dafny(&value.branch_key_id_supplier.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::builder() .set_branch_key_id_supplier(Some( crate::deps::aws_cryptography_materialProviders::conversions::branch_key_id_supplier::from_dafny(dafny_value.branchKeyIdSupplier().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_input.rs index 153ce7654..65ae03853 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { ddbKeyBranchKeyIdSupplier: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_key_branch_key_id_supplier::to_dafny(&value.ddb_key_branch_key_id_supplier.clone().unwrap()) , @@ -23,30 +23,30 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput::builder() @@ -59,10 +59,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_output.rs index e64d0c60c..6100c954a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/create_dynamo_db_encryption_branch_key_id_supplier_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { branchKeyIdSupplier: crate::deps::aws_cryptography_materialProviders::conversions::branch_key_id_supplier::to_dafny(&value.branch_key_id_supplier.clone().unwrap()) , @@ -23,30 +23,30 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::builder() @@ -59,10 +59,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_encryption_config/_dynamo_db_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_encryption_config/_dynamo_db_encryption_config.rs index 154503b86..758be3800 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_encryption_config/_dynamo_db_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_encryption_config/_dynamo_db_encryption_config.rs @@ -5,26 +5,25 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value)) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig{ plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig::DynamoDbEncryptionConfig { } @@ -33,7 +32,7 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig::builder() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_key_branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_key_branch_key_id_supplier.rs index 2e89a83fb..412977b9a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_key_branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_key_branch_key_id_supplier.rs @@ -6,20 +6,20 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplier, -> { - let wrap = DynamoDbKeyBranchKeyIdSupplierWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = DynamoDbKeyBranchKeyIdSupplierWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct DynamoDbKeyBranchKeyIdSupplierWrapper { obj: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef, } -impl ::dafny_runtime::UpcastObject for DynamoDbKeyBranchKeyIdSupplierWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> + for DynamoDbKeyBranchKeyIdSupplierWrapper +{ + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -27,12 +27,12 @@ pub fn from_dafny( dafny_value: ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplier, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef{ let wrap = IDynamoDbKeyBranchKeyIdSupplierDafnyWrapper { obj: dafny_value.clone(), }; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)) } } @@ -48,16 +48,16 @@ impl crate::software::amazon::cryptography::dbencryptionsdk::dynamodb::internald { fn r#_GetBranchKeyIdFromDdbKey_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_branch_key_id_from_ddb_key::_get_branch_key_id_from_ddb_key_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().get_branch_key_id_from_ddb_key(inner_input); + let inner_result = self.obj.inner.lock().unwrap().get_branch_key_id_from_ddb_key(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_branch_key_id_from_ddb_key::_get_branch_key_id_from_ddb_key_output::to_dafny(x.clone()), @@ -66,7 +66,7 @@ impl crate::software::amazon::cryptography::dbencryptionsdk::dynamodb::internald error: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_table_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_table_encryption_config.rs index d7eeed293..a85804b93 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_table_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_table_encryption_config.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig { logicalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.logical_table_name) .Extract(), partitionKeyName: crate::standard_library_conversions::ostring_to_dafny(&value.partition_key_name) .Extract(), sortKeyName: crate::standard_library_conversions::ostring_to_dafny(&value.sort_key_name), - search: ::std::rc::Rc::new(match &value.search { + search: ::dafny_runtime::Rc::new(match &value.search { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::search_config::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -28,7 +28,7 @@ pub fn to_dafny_plain( |v| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::to_dafny(v.clone()), ) , - allowedUnsignedAttributes: ::std::rc::Rc::new(match &value.allowed_unsigned_attributes { + allowedUnsignedAttributes: ::dafny_runtime::Rc::new(match &value.allowed_unsigned_attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -38,27 +38,27 @@ pub fn to_dafny_plain( }) , allowedUnsignedAttributePrefix: crate::standard_library_conversions::ostring_to_dafny(&value.allowed_unsigned_attribute_prefix), - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - keyring: ::std::rc::Rc::new(match &value.keyring { + keyring: ::dafny_runtime::Rc::new(match &value.keyring { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - cmm: ::std::rc::Rc::new(match &value.cmm { + cmm: ::dafny_runtime::Rc::new(match &value.cmm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - legacyOverride: ::std::rc::Rc::new(match &value.legacy_override { + legacyOverride: ::dafny_runtime::Rc::new(match &value.legacy_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::legacy_override::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - plaintextOverride: ::std::rc::Rc::new(match &value.plaintext_override { + plaintextOverride: ::dafny_runtime::Rc::new(match &value.plaintext_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::plaintext_override::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -69,20 +69,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig { @@ -107,7 +107,7 @@ pub fn plain_from_dafny( ) .set_attribute_actions_on_encrypt(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.attributeActionsOnEncrypt(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_allowed_unsigned_attributes(match (*dafny_value.allowedUnsignedAttributes()).as_ref() { @@ -160,10 +160,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_tables_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_tables_encryption_config.rs index f9186ab30..78399c338 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_tables_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/dynamo_db_tables_encryption_config.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { tableEncryptionConfigs: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.table_encryption_configs.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig { @@ -56,7 +56,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig::builder() .set_table_encryption_configs(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.tableEncryptionConfigs(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_table_encryption_config::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::dynamo_db_table_encryption_config::from_dafny(v.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_data_key_description.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_data_key_description.rs index db8550fb6..1bbd14579 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_data_key_description.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_data_key_description.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription::EncryptedDataKeyDescription { keyProviderId: crate::standard_library_conversions::ostring_to_dafny(&value.key_provider_id) .Extract(), keyProviderInfo: crate::standard_library_conversions::ostring_to_dafny(&value.key_provider_info), @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription { @@ -63,10 +63,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_part.rs index 2a383570b..50d8036b6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/encrypted_part.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedPart, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedPart { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedPart{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedPart::EncryptedPart { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), prefix: crate::standard_library_conversions::ostring_to_dafny(&value.prefix) .Extract(), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedPart, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/error.rs index 319e3361e..c7b88faed 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/error.rs @@ -2,15 +2,21 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -20,21 +26,23 @@ pub fn to_opaque_error(value: String) -> /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< + ::dafny_runtime::Rc< crate::_Wrappers_Compile::Result< T, - ::std::rc::Rc + ::dafny_runtime::Rc > > { - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::DynamoDbEncryptionException { message } => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::DynamoDbEncryptionException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -67,7 +75,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::Key crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -88,7 +96,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::Key #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key.rs index 718409619..a87aa1d06 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_branch_key_id_from_ddb_key_input; +pub mod _get_branch_key_id_from_ddb_key_input; - pub mod _get_branch_key_id_from_ddb_key_output; +pub mod _get_branch_key_id_from_ddb_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs index 92652b24e..e40d3c5c2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput { ddbKey: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.ddb_key.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(&v.clone()) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput::builder() .set_ddb_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.ddbKey(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs index 743ca5a47..492939d03 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput::builder() .set_branch_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyId()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_input.rs index 2b2142b7d..95f64f49d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput { ddbKey: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.ddb_key.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyInput, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput { @@ -56,7 +56,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput::builder() .set_ddb_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.ddbKey(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_output.rs index a3be05953..ba26f8838 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_branch_key_id_from_ddb_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id) .Extract(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetBranchKeyIdFromDdbKeyOutput, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description.rs index 3587e1f0b..af0a00a91 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_encrypted_data_key_description_input; +pub mod _get_encrypted_data_key_description_input; - pub mod _get_encrypted_data_key_description_output; +pub mod _get_encrypted_data_key_description_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs index dc70c0440..2ca1c6cd0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput { input: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_encrypted_data_key_description_union::to_dafny(&value.input.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput::builder() .set_input(Some( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_encrypted_data_key_description_union::from_dafny(dafny_value.input().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs index 895e496ab..9af77880f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { EncryptedDataKeyDescriptionOutput: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_data_key_description_output.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::to_dafny(&e.clone()) , @@ -15,15 +15,15 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput::builder() .set_encrypted_data_key_description_output(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.EncryptedDataKeyDescriptionOutput(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_input.rs index 6a077f12b..25de2e19c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput { input: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_encrypted_data_key_description_union::to_dafny(&value.input.clone().unwrap()) , @@ -23,30 +23,30 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput::builder() @@ -59,10 +59,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_output.rs index 1bd02aef6..49c4b3405 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { EncryptedDataKeyDescriptionOutput: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_data_key_description_output.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::to_dafny(&e.clone()) @@ -26,35 +26,35 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput::builder() .set_encrypted_data_key_description_output(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.EncryptedDataKeyDescriptionOutput(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::encrypted_data_key_description::from_dafny(e.clone()) , ) )) @@ -65,10 +65,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_union.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_union.rs index 76bd85da5..591b6865f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_union.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_encrypted_data_key_description_union.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(x) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion::header { header: crate::standard_library_conversions::blob_to_dafny(&x), @@ -27,11 +27,11 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataK #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion{ + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion::header { header: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(crate::standard_library_conversions::blob_from_dafny(x.clone())), @@ -39,7 +39,7 @@ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafn item: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item(::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&x, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_prefix.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_prefix.rs index f6638ea97..3518b3c5e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_prefix.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_prefix.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetPrefix, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetPrefix { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetPrefix{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetPrefix::GetPrefix { length: value.length.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetPrefix, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segment.rs index df4851843..6f38f7144 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segment.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegment, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegment { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegment{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegment::GetSegment { split: crate::standard_library_conversions::ostring_to_dafny(&value.split) .Extract(), index: value.index.clone().unwrap(), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegment, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segments.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segments.rs index c70ed313a..dd6a948e7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segments.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_segments.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegments, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegments { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegments{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegments::GetSegments { split: crate::standard_library_conversions::ostring_to_dafny(&value.split) .Extract(), low: value.low.clone().unwrap(), @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSegments, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments { @@ -61,10 +61,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_substring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_substring.rs index ce3bdc111..650804dc5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_substring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_substring.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSubstring, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSubstring { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSubstring{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSubstring::GetSubstring { low: value.low.clone().unwrap(), high: value.high.clone().unwrap(), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSubstring, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_suffix.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_suffix.rs index df75faba0..58c2b6e04 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_suffix.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/get_suffix.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSuffix, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSuffix { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSuffix{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSuffix::GetSuffix { length: value.length.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetSuffix, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/insert.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/insert.rs index 3f5edc58a..8149b50ee 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/insert.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/insert.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Insert, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Insert { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Insert +{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Insert::Insert { literal: crate::standard_library_conversions::ostring_to_dafny(&value.literal) .Extract(), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Insert, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_dynamo_db_encryptor.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_dynamo_db_encryptor.rs index c32e43481..3e9fa2348 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_dynamo_db_encryptor.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_dynamo_db_encryptor.rs @@ -6,20 +6,18 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ILegacyDynamoDbEncryptor, -> { - let wrap = LegacyDynamoDbEncryptorWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = LegacyDynamoDbEncryptorWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct LegacyDynamoDbEncryptorWrapper { obj: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef, } -impl ::dafny_runtime::UpcastObject for LegacyDynamoDbEncryptorWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for LegacyDynamoDbEncryptorWrapper { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -27,12 +25,12 @@ pub fn from_dafny( dafny_value: ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ILegacyDynamoDbEncryptor, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef{ let wrap = ILegacyDynamoDbEncryptorDafnyWrapper { obj: dafny_value.clone(), }; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_override.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_override.rs index 9f8901bc6..8b70904b0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_override.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_override.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride::LegacyOverride { policy: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::legacy_policy::to_dafny(value.policy.clone().unwrap()), encryptor: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::legacy_dynamo_db_encryptor::to_dafny(&value.encryptor.clone().unwrap()) @@ -23,7 +23,7 @@ pub fn to_dafny_plain( |v| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::to_dafny(v.clone()), ) , - defaultAttributeFlag: ::std::rc::Rc::new(match &value.default_attribute_flag { + defaultAttributeFlag: ::dafny_runtime::Rc::new(match &value.default_attribute_flag { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -34,20 +34,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride { @@ -66,7 +66,7 @@ pub fn plain_from_dafny( )) .set_attribute_actions_on_encrypt(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.attributeActionsOnEncrypt(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_default_attribute_flag(match &**dafny_value.defaultAttributeFlag() { @@ -83,10 +83,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_policy.rs index e6a156be1..9dc4cdc85 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/legacy_policy.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy::ForceLegacyEncryptAllowLegacyDecrypt => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy::ForbidLegacyEncryptAllowLegacyDecrypt => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy::ForbidLegacyEncryptForbidLegacyDecrypt => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/lower.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/lower.rs index 83f159cfd..92f091d72 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/lower.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/lower.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Lower, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Lower { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Lower +{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Lower::Lower { } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Lower, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/multi_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/multi_key_store.rs index 070c00a87..500dc536b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/multi_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/multi_key_store.rs @@ -4,44 +4,45 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::MultiKeyStore, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::MultiKeyStore { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::MultiKeyStore{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::MultiKeyStore::MultiKeyStore { keyFieldName: crate::standard_library_conversions::ostring_to_dafny(&value.key_field_name) .Extract(), cacheTTL: value.cache_ttl.clone().unwrap(), - cache: ::std::rc::Rc::new(match &value.cache { + cache: ::dafny_runtime::Rc::new(match &value.cache { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , + partitionId: crate::standard_library_conversions::ostring_to_dafny(&value.partition_id), } } #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::MultiKeyStore, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore { @@ -63,6 +64,7 @@ pub fn plain_from_dafny( _ => None, } ) + .set_partition_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.partitionId().clone())) .build() .unwrap() } @@ -70,10 +72,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/part_only.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/part_only.rs index 96162b530..8b05c32e1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/part_only.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/part_only.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PartOnly, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PartOnly { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PartOnly{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PartOnly::PartOnly { } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PartOnly, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/plaintext_override.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/plaintext_override.rs index 925b1488c..5ff6562a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/plaintext_override.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/plaintext_override.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride::ForcePlaintextWriteAllowPlaintextRead => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride::ForbidPlaintextWriteAllowPlaintextRead => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride::ForbidPlaintextWriteForbidPlaintextRead => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/search_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/search_config.rs index a0a73a6d4..cc2455c1d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/search_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/search_config.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig::SearchConfig { versions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.versions.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::beacon_version::to_dafny(&e.clone()) @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig { @@ -55,7 +55,7 @@ pub fn plain_from_dafny( crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SearchConfig::SearchConfig {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig::builder() .set_versions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.versions(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::beacon_version::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::beacon_version::from_dafny(e.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared.rs index a063f741a..1f435e1ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Shared, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Shared { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Shared +{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Shared::Shared { other: crate::standard_library_conversions::ostring_to_dafny(&value.other) .Extract(), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Shared, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared_set.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared_set.rs index d599f35d7..57a47f8dd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared_set.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/shared_set.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SharedSet, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SharedSet { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SharedSet{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SharedSet::SharedSet { other: crate::standard_library_conversions::ostring_to_dafny(&value.other) .Extract(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SharedSet, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/signed_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/signed_part.rs index 21d67901e..1456f8bb4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/signed_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/signed_part.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SignedPart, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SignedPart { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SignedPart{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SignedPart::SignedPart { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), prefix: crate::standard_library_conversions::ostring_to_dafny(&value.prefix) .Extract(), @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SignedPart, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart { @@ -61,10 +61,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/single_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/single_key_store.rs index 023dac908..115ba38c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/single_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/single_key_store.rs @@ -4,39 +4,45 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SingleKeyStore, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SingleKeyStore { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SingleKeyStore{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SingleKeyStore::SingleKeyStore { keyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), cacheTTL: value.cache_ttl.clone().unwrap(), + cache: ::dafny_runtime::Rc::new(match &value.cache { + Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&x.clone()) }, + None => crate::_Wrappers_Compile::Option::None { } +}) +, + partitionId: crate::standard_library_conversions::ostring_to_dafny(&value.partition_id), } } #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::SingleKeyStore, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore { @@ -52,6 +58,13 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.keyId()) )) .set_cache_ttl(Some( dafny_value.cacheTTL() .clone() )) + .set_cache(match (*dafny_value.cache()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => + Some(crate::deps::aws_cryptography_materialProviders::conversions::cache_type::from_dafny(value.clone())), + _ => None, +} +) + .set_partition_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.partitionId().clone())) .build() .unwrap() } @@ -59,10 +72,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/standard_beacon.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/standard_beacon.rs index 6c9c80e61..c4bf885c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/standard_beacon.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/standard_beacon.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeacon, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeacon { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeacon{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeacon::StandardBeacon { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), length: value.length.clone().unwrap(), loc: crate::standard_library_conversions::ostring_to_dafny(&value.loc), - style: ::std::rc::Rc::new(match &value.style { + style: ::dafny_runtime::Rc::new(match &value.style { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::beacon_style::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -29,20 +29,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeacon, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon { @@ -72,10 +72,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/upper.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/upper.rs index 7248c609b..0b09214fc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/upper.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/upper.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Upper, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Upper { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Upper +{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Upper::Upper { } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Upper, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_field.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_field.rs index 7eae0d8e1..9d20fcc35 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_field.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_field.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualField, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualField { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualField{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualField::VirtualField { name: crate::standard_library_conversions::ostring_to_dafny(&value.name) .Extract(), parts: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.parts.clone().unwrap(), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualField, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField { @@ -56,7 +56,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField::builder() .set_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.name()) )) .set_parts(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.parts(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_part::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_part::from_dafny(e.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_part.rs index efc1c01c9..2a2b2e5b9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_part.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPart, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPart { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPart{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPart::VirtualPart { loc: crate::standard_library_conversions::ostring_to_dafny(&value.loc) .Extract(), - trans: ::std::rc::Rc::new(match &value.trans { + trans: ::dafny_runtime::Rc::new(match &value.trans { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_transform::to_dafny(&e.clone()) @@ -32,20 +32,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPart, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart { @@ -64,7 +64,7 @@ pub fn plain_from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_transform::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::virtual_transform::from_dafny(e.clone()) , ) ), @@ -78,10 +78,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_transform.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_transform.rs index a3d69f970..9986ffff1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_transform.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/conversions/virtual_transform.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualTransform, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper(x) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualTransform::upper { upper: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::upper::to_dafny(&x.clone()) @@ -54,11 +54,11 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform: #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualTransform, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualTransform::upper { upper: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::upper::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier.rs index 386bf8508..49f8d2973 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier.rs @@ -17,12 +17,12 @@ impl CreateDynamoDbEncryptionBranchKeyIdSupplier { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_for_DynamoDbEncryption_CreateDynamoDbEncryptionBranchKeyIdSupplier(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::create_dynamo_db_encryption_branch_key_id_supplier::_create_dynamo_db_encryption_branch_key_id_supplier_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateDynamoDbEncryptionBranchKeyIdSupplier(&inner_input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::create_dynamo_db_encryption_branch_key_id_supplier::_create_dynamo_db_encryption_branch_key_id_supplier_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateDynamoDbEncryptionBranchKeyIdSupplier(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs index b76009113..7fc25840b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs @@ -10,13 +10,13 @@ pub ddb_key_branch_key_id_supplier: ::std::option::Option &::std::option::Option { - &self.ddb_key_branch_key_id_supplier -} + pub fn ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.ddb_key_branch_key_id_supplier + } } impl CreateDynamoDbEncryptionBranchKeyIdSupplierInput { /// Creates a new builder-style object to manufacture [`CreateDynamoDbEncryptionBranchKeyIdSupplierInput`](crate::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { } impl CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn ddb_key_branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.ddb_key_branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn set_ddb_key_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.ddb_key_branch_key_id_supplier = input; - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.ddb_key_branch_key_id_supplier -} + pub fn ddb_key_branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ddb_key_branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn set_ddb_key_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.ddb_key_branch_key_id_supplier = input; + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.ddb_key_branch_key_id_supplier + } /// Consumes the builder and constructs a [`CreateDynamoDbEncryptionBranchKeyIdSupplierInput`](crate::operation::operation::CreateDynamoDbEncryptionBranchKeyIdSupplierInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { ddb_key_branch_key_id_supplier: self.ddb_key_branch_key_id_supplier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs index d3af0c49d..0a8f3664f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs @@ -10,13 +10,13 @@ pub branch_key_id_supplier: ::std::option::Option &::std::option::Option { - &self.branch_key_id_supplier -} + pub fn branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } } impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { /// Creates a new builder-style object to manufacture [`CreateDynamoDbEncryptionBranchKeyIdSupplierOutput`](crate::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { } impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { /// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn set_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.branch_key_id_supplier = input; - self -} -/// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} + pub fn branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Branch Key Supplier for use with the Hierarchical Keyring. + pub fn set_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.branch_key_id_supplier = input; + self + } + /// The Branch Key Supplier for use with the Hierarchical Keyring. + pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } /// Consumes the builder and constructs a [`CreateDynamoDbEncryptionBranchKeyIdSupplierOutput`](crate::operation::operation::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { branch_key_id_supplier: self.branch_key_id_supplier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/builders.rs index c4061d101..874c8eb9c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/create_dynamo_db_encryption_branch_key_id_supplier/builders.rs @@ -13,7 +13,7 @@ impl CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ let mut fluent_builder = client.create_dynamo_db_encryption_branch_key_id_supplier(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder { } impl CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder { /// Creates a new `CreateDynamoDbEncryptionBranchKeyIdSupplier`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateDynamoDbEncryptionBranchKeyIdSupplier as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,30 @@ impl CreateDynamoDbEncryptionBranchKeyIdSupplierFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplier::send(&self.client, input).await } /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn ddb_key_branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ddb_key_branch_key_id_supplier(input.into()); - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn set_ddb_key_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ddb_key_branch_key_id_supplier(input); - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option { - self.inner.get_ddb_key_branch_key_id_supplier() -} + pub fn ddb_key_branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ddb_key_branch_key_id_supplier(input.into()); + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn set_ddb_key_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_ddb_key_branch_key_id_supplier(input); + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option{ + self.inner.get_ddb_key_branch_key_id_supplier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key.rs index fa9f7cd50..def1d262f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key.rs @@ -17,10 +17,14 @@ impl GetBranchKeyIdFromDdbKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_for_DynamoDbKeyBranchKeyIdSupplier_GetBranchKeyIdFromDdbKey(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::wrap_validation_err)?; - dynamo_db_key_branch_key_id_supplier.inner.borrow_mut().get_branch_key_id_from_ddb_key(input) + dynamo_db_key_branch_key_id_supplier + .inner + .lock() + .unwrap() + .get_branch_key_id_from_ddb_key(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs index a0b25b61e..acc0f5497 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_input.rs @@ -6,17 +6,23 @@ /// Inputs for getting the Branch Key that should be used for wrapping and unwrapping data keys. pub struct GetBranchKeyIdFromDdbKeyInput { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub ddb_key: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub ddb_key: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl GetBranchKeyIdFromDdbKeyInput { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn ddb_key(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.ddb_key -} + pub fn ddb_key( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.ddb_key + } } impl GetBranchKeyIdFromDdbKeyInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdFromDdbKeyInput`](crate::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInputBuilder::default() } } @@ -27,30 +33,52 @@ impl GetBranchKeyIdFromDdbKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyIdFromDdbKeyInputBuilder { - pub(crate) ddb_key: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) ddb_key: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl GetBranchKeyIdFromDdbKeyInputBuilder { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn ddb_key(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.ddb_key = ::std::option::Option::Some(input.into()); - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn set_ddb_key(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.ddb_key = input; - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn get_ddb_key(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.ddb_key -} + pub fn ddb_key( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.ddb_key = ::std::option::Option::Some(input.into()); + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn set_ddb_key( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.ddb_key = input; + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn get_ddb_key( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.ddb_key + } /// Consumes the builder and constructs a [`GetBranchKeyIdFromDdbKeyInput`](crate::operation::operation::GetBranchKeyIdFromDdbKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput { ddb_key: self.ddb_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs index 8d17d801e..72ad8ea70 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/_get_branch_key_id_from_ddb_key_output.rs @@ -6,17 +6,17 @@ /// Outputs for getting the Branch Key that should be used for wrapping and unwrapping data keys. pub struct GetBranchKeyIdFromDdbKeyOutput { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub branch_key_id: ::std::option::Option<::std::string::String>, + pub branch_key_id: ::std::option::Option<::std::string::String>, } impl GetBranchKeyIdFromDdbKeyOutput { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } } impl GetBranchKeyIdFromDdbKeyOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdFromDdbKeyOutput`](crate::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetBranchKeyIdFromDdbKeyOutputBuilder { } impl GetBranchKeyIdFromDdbKeyOutputBuilder { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } /// Consumes the builder and constructs a [`GetBranchKeyIdFromDdbKeyOutput`](crate::operation::operation::GetBranchKeyIdFromDdbKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput { branch_key_id: self.branch_key_id, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/builders.rs index 4af0753ec..95e2dfcf7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_branch_key_id_from_ddb_key/builders.rs @@ -13,8 +13,9 @@ impl GetBranchKeyIdFromDdbKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { - let mut fluent_builder = dynamo_db_key_branch_key_id_supplier.get_branch_key_id_from_ddb_key(); + >{ + let mut fluent_builder = + dynamo_db_key_branch_key_id_supplier.get_branch_key_id_from_ddb_key(); fluent_builder.inner = self; fluent_builder.send().await } @@ -29,14 +30,16 @@ pub struct GetBranchKeyIdFromDdbKeyFluentBuilder { } impl GetBranchKeyIdFromDdbKeyFluentBuilder { /// Creates a new `GetBranchKeyIdFromDdbKey`. - pub(crate) fn new(dynamo_db_key_branch_key_id_supplier: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef) -> Self { + pub(crate) fn new( + dynamo_db_key_branch_key_id_supplier: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef, + ) -> Self { Self { dynamo_db_key_branch_key_id_supplier, inner: ::std::default::Default::default(), } } /// Access the GetBranchKeyIdFromDdbKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::builders::GetBranchKeyIdFromDdbKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +48,7 @@ impl GetBranchKeyIdFromDdbKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +59,44 @@ impl GetBranchKeyIdFromDdbKeyFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKey::send(&self.dynamo_db_key_branch_key_id_supplier, input).await } /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn ddb_key(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.ddb_key(input.into()); - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn set_ddb_key(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.set_ddb_key(input); - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn get_ddb_key(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - self.inner.get_ddb_key() -} + pub fn ddb_key( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.ddb_key(input.into()); + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn set_ddb_key( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.set_ddb_key(input); + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn get_ddb_key( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + self.inner.get_ddb_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description.rs index f0b8e0f64..cc914ac08 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description.rs @@ -17,12 +17,12 @@ impl GetEncryptedDataKeyDescription { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_for_DynamoDbEncryption_GetEncryptedDataKeyDescription(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_encrypted_data_key_description::_get_encrypted_data_key_description_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).GetEncryptedDataKeyDescription(&inner_input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::get_encrypted_data_key_description::_get_encrypted_data_key_description_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .GetEncryptedDataKeyDescription(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs index f26909f5f..ef8be3674 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_input.rs @@ -10,13 +10,13 @@ pub input: ::std::option::Option &::std::option::Option { - &self.input -} + pub fn input(&self) -> &::std::option::Option{ + &self.input + } } impl GetEncryptedDataKeyDescriptionInput { /// Creates a new builder-style object to manufacture [`GetEncryptedDataKeyDescriptionInput`](crate::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetEncryptedDataKeyDescriptionInputBuilder { } impl GetEncryptedDataKeyDescriptionInputBuilder { #[allow(missing_docs)] -pub fn input(mut self, input: impl ::std::convert::Into) -> Self { - self.input = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_input(mut self, input: ::std::option::Option) -> Self { - self.input = input; - self -} -#[allow(missing_docs)] -pub fn get_input(&self) -> &::std::option::Option { - &self.input -} + pub fn input( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.input = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_input( + mut self, + input: ::std::option::Option, + ) -> Self { + self.input = input; + self + } + #[allow(missing_docs)] + pub fn get_input(&self) -> &::std::option::Option{ + &self.input + } /// Consumes the builder and constructs a [`GetEncryptedDataKeyDescriptionInput`](crate::operation::operation::GetEncryptedDataKeyDescriptionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput { input: self.input, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs index 71cc028ff..c48a12ecd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/_get_encrypted_data_key_description_output.rs @@ -10,13 +10,13 @@ pub encrypted_data_key_description_output: ::std::option::Option<::std::vec::Vec } impl GetEncryptedDataKeyDescriptionOutput { /// A list of encrypted data key description. -pub fn encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_key_description_output -} + pub fn encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec>{ + &self.encrypted_data_key_description_output + } } impl GetEncryptedDataKeyDescriptionOutput { /// Creates a new builder-style object to manufacture [`GetEncryptedDataKeyDescriptionOutput`](crate::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetEncryptedDataKeyDescriptionOutputBuilder { } impl GetEncryptedDataKeyDescriptionOutputBuilder { /// A list of encrypted data key description. -pub fn encrypted_data_key_description_output(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_key_description_output = ::std::option::Option::Some(input.into()); - self -} -/// A list of encrypted data key description. -pub fn set_encrypted_data_key_description_output(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_key_description_output = input; - self -} -/// A list of encrypted data key description. -pub fn get_encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_key_description_output -} + pub fn encrypted_data_key_description_output( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.encrypted_data_key_description_output = ::std::option::Option::Some(input.into()); + self + } + /// A list of encrypted data key description. + pub fn set_encrypted_data_key_description_output( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.encrypted_data_key_description_output = input; + self + } + /// A list of encrypted data key description. + pub fn get_encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec>{ + &self.encrypted_data_key_description_output + } /// Consumes the builder and constructs a [`GetEncryptedDataKeyDescriptionOutput`](crate::operation::operation::GetEncryptedDataKeyDescriptionOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput { encrypted_data_key_description_output: self.encrypted_data_key_description_output, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/builders.rs index 797d37913..c7602636a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/operation/get_encrypted_data_key_description/builders.rs @@ -13,7 +13,7 @@ impl GetEncryptedDataKeyDescriptionInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ let mut fluent_builder = client.get_encrypted_data_key_description(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct GetEncryptedDataKeyDescriptionFluentBuilder { } impl GetEncryptedDataKeyDescriptionFluentBuilder { /// Creates a new `GetEncryptedDataKeyDescription`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the GetEncryptedDataKeyDescription as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::builders::GetEncryptedDataKeyDescriptionInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl GetEncryptedDataKeyDescriptionFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,30 @@ impl GetEncryptedDataKeyDescriptionFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescription::send(&self.client, input).await } #[allow(missing_docs)] -pub fn input(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.input(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_input(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_input(input); - self -} -#[allow(missing_docs)] -pub fn get_input(&self) -> &::std::option::Option { - self.inner.get_input() -} + pub fn input( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.input(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_input( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_input(input); + self + } + #[allow(missing_docs)] + pub fn get_input(&self) -> &::std::option::Option{ + self.inner.get_input() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_as_set.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_as_set.rs index 22334b99f..65b9c8b20 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_as_set.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_as_set.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// Attribute must be a Set. Beacon value will also be a Set. -pub struct AsSet { - -} -impl AsSet { - -} +pub struct AsSet {} +impl AsSet {} impl AsSet { /// Creates a new builder-style object to manufacture [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::AsSetBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::AsSetBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::AsSetBuilder::default() } } @@ -22,11 +19,8 @@ impl AsSet { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct AsSetBuilder { - -} +pub struct AsSetBuilder {} impl AsSetBuilder { - /// Consumes the builder and constructs a [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet). pub fn build( self, @@ -34,8 +28,8 @@ impl AsSetBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_key_source.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_key_source.rs index 9fa95ada8..9a2a62ffa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_key_source.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_key_source.rs @@ -6,9 +6,9 @@ #[allow(missing_docs)] pub enum BeaconKeySource { #[allow(missing_docs)] -Single(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore), -#[allow(missing_docs)] -Multi(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore), + Single(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore), + #[allow(missing_docs)] + Multi(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,41 @@ Multi(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeySto } impl BeaconKeySource { /// Tries to convert the enum instance into [`Single`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_single(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_single( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Multi`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_multi(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi(val) = &self { + } + /// Tries to convert the enum instance into [`Multi`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_multi( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`Single`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Single). -pub fn is_single(&self) -> ::std::primitive::bool { - self.as_single().is_ok() -} -/// Returns true if this is a [`Multi`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi). -pub fn is_multi(&self) -> ::std::primitive::bool { - self.as_multi().is_ok() -} + pub fn is_single(&self) -> ::std::primitive::bool { + self.as_single().is_ok() + } + /// Returns true if this is a [`Multi`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource::Multi). + pub fn is_multi(&self) -> ::std::primitive::bool { + self.as_multi().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_style.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_style.rs index 72ce4a656..cd6d4a64c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_style.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_style.rs @@ -6,13 +6,13 @@ #[allow(missing_docs)] pub enum BeaconStyle { #[allow(missing_docs)] -PartOnly(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly), -#[allow(missing_docs)] -Shared(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared), -#[allow(missing_docs)] -AsSet(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet), -#[allow(missing_docs)] -SharedSet(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet), + PartOnly(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly), + #[allow(missing_docs)] + Shared(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared), + #[allow(missing_docs)] + AsSet(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet), + #[allow(missing_docs)] + SharedSet(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -25,57 +25,83 @@ SharedSet(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedS } impl BeaconStyle { /// Tries to convert the enum instance into [`PartOnly`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_part_only(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_part_only( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_shared(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_as_set(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_shared( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_shared_set(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet(val) = &self { + /// Tries to convert the enum instance into [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_as_set( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::AsSet, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } + } + /// Tries to convert the enum instance into [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_shared_set( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`PartOnly`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::PartOnly). -pub fn is_part_only(&self) -> ::std::primitive::bool { - self.as_part_only().is_ok() -} -/// Returns true if this is a [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared). -pub fn is_shared(&self) -> ::std::primitive::bool { - self.as_shared().is_ok() -} -/// Returns true if this is a [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet). -pub fn is_as_set(&self) -> ::std::primitive::bool { - self.as_as_set().is_ok() -} -/// Returns true if this is a [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet). -pub fn is_shared_set(&self) -> ::std::primitive::bool { - self.as_shared_set().is_ok() -} + pub fn is_part_only(&self) -> ::std::primitive::bool { + self.as_part_only().is_ok() + } + /// Returns true if this is a [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::Shared). + pub fn is_shared(&self) -> ::std::primitive::bool { + self.as_shared().is_ok() + } + /// Returns true if this is a [`AsSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::AsSet). + pub fn is_as_set(&self) -> ::std::primitive::bool { + self.as_as_set().is_ok() + } + /// Returns true if this is a [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle::SharedSet). + pub fn is_shared_set(&self) -> ::std::primitive::bool { + self.as_shared_set().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_version.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_version.rs index 268c3f5d4..5526cb18c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_version.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_beacon_version.rs @@ -6,59 +6,115 @@ /// The configuration for a particular version of searchable encryption. Currently the only supported version is '1'. pub struct BeaconVersion { /// The Compound Beacons to be written with items. -pub compound_beacons: ::std::option::Option<::std::vec::Vec>, -/// The list of Encrypted Parts that may be included in any compound beacon. -pub encrypted_parts: ::std::option::Option<::std::vec::Vec>, -/// The configuration for what beacon key(s) to use. -pub key_source: ::std::option::Option, -/// The Key Store that contains the Beacon Keys to use with searchable encryption. -pub key_store: ::std::option::Option, -/// The list of Signed Parts that may be included in any compound beacon. -pub signed_parts: ::std::option::Option<::std::vec::Vec>, -/// The Standard Beacons to be written with items. -pub standard_beacons: ::std::option::Option<::std::vec::Vec>, -/// The version of searchable encryption configured. This must be '1'. -pub version: ::std::option::Option<::std::primitive::i32>, -/// The Virtual Fields to be calculated, supporting other searchable enryption configurations. -pub virtual_fields: ::std::option::Option<::std::vec::Vec>, + pub compound_beacons: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + >, + /// The list of Encrypted Parts that may be included in any compound beacon. + pub encrypted_parts: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + /// The configuration for what beacon key(s) to use. + pub key_source: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + >, + /// The Key Store that contains the Beacon Keys to use with searchable encryption. + pub key_store: ::std::option::Option, + /// The list of Signed Parts that may be included in any compound beacon. + pub signed_parts: ::std::option::Option< + ::std::vec::Vec, + >, + /// The Standard Beacons to be written with items. + pub standard_beacons: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + >, + /// The version of searchable encryption configured. This must be '1'. + pub version: ::std::option::Option<::std::primitive::i32>, + /// The Virtual Fields to be calculated, supporting other searchable enryption configurations. + pub virtual_fields: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + >, } impl BeaconVersion { /// The Compound Beacons to be written with items. -pub fn compound_beacons(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.compound_beacons -} -/// The list of Encrypted Parts that may be included in any compound beacon. -pub fn encrypted_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_parts -} -/// The configuration for what beacon key(s) to use. -pub fn key_source(&self) -> &::std::option::Option { - &self.key_source -} -/// The Key Store that contains the Beacon Keys to use with searchable encryption. -pub fn key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// The list of Signed Parts that may be included in any compound beacon. -pub fn signed_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.signed_parts -} -/// The Standard Beacons to be written with items. -pub fn standard_beacons(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.standard_beacons -} -/// The version of searchable encryption configured. This must be '1'. -pub fn version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.version -} -/// The Virtual Fields to be calculated, supporting other searchable enryption configurations. -pub fn virtual_fields(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.virtual_fields -} + pub fn compound_beacons( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + > { + &self.compound_beacons + } + /// The list of Encrypted Parts that may be included in any compound beacon. + pub fn encrypted_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + > { + &self.encrypted_parts + } + /// The configuration for what beacon key(s) to use. + pub fn key_source( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + > { + &self.key_source + } + /// The Key Store that contains the Beacon Keys to use with searchable encryption. + pub fn key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// The list of Signed Parts that may be included in any compound beacon. + pub fn signed_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.signed_parts + } + /// The Standard Beacons to be written with items. + pub fn standard_beacons( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + > { + &self.standard_beacons + } + /// The version of searchable encryption configured. This must be '1'. + pub fn version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.version + } + /// The Virtual Fields to be calculated, supporting other searchable enryption configurations. + pub fn virtual_fields( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + > { + &self.virtual_fields + } } impl BeaconVersion { /// Creates a new builder-style object to manufacture [`BeaconVersion`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::BeaconVersionBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::BeaconVersionBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::BeaconVersionBuilder::default() } } @@ -69,128 +125,269 @@ impl BeaconVersion { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct BeaconVersionBuilder { - pub(crate) compound_beacons: ::std::option::Option<::std::vec::Vec>, -pub(crate) encrypted_parts: ::std::option::Option<::std::vec::Vec>, -pub(crate) key_source: ::std::option::Option, -pub(crate) key_store: ::std::option::Option, -pub(crate) signed_parts: ::std::option::Option<::std::vec::Vec>, -pub(crate) standard_beacons: ::std::option::Option<::std::vec::Vec>, -pub(crate) version: ::std::option::Option<::std::primitive::i32>, -pub(crate) virtual_fields: ::std::option::Option<::std::vec::Vec>, + pub(crate) compound_beacons: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + >, + pub(crate) encrypted_parts: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + pub(crate) key_source: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + >, + pub(crate) key_store: + ::std::option::Option, + pub(crate) signed_parts: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) standard_beacons: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + >, + pub(crate) version: ::std::option::Option<::std::primitive::i32>, + pub(crate) virtual_fields: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + >, } impl BeaconVersionBuilder { /// The Compound Beacons to be written with items. -pub fn compound_beacons(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.compound_beacons = ::std::option::Option::Some(input.into()); - self -} -/// The Compound Beacons to be written with items. -pub fn set_compound_beacons(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.compound_beacons = input; - self -} -/// The Compound Beacons to be written with items. -pub fn get_compound_beacons(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.compound_beacons -} -/// The list of Encrypted Parts that may be included in any compound beacon. -pub fn encrypted_parts(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_parts = ::std::option::Option::Some(input.into()); - self -} -/// The list of Encrypted Parts that may be included in any compound beacon. -pub fn set_encrypted_parts(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_parts = input; - self -} -/// The list of Encrypted Parts that may be included in any compound beacon. -pub fn get_encrypted_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_parts -} -/// The configuration for what beacon key(s) to use. -pub fn key_source(mut self, input: impl ::std::convert::Into) -> Self { - self.key_source = ::std::option::Option::Some(input.into()); - self -} -/// The configuration for what beacon key(s) to use. -pub fn set_key_source(mut self, input: ::std::option::Option) -> Self { - self.key_source = input; - self -} -/// The configuration for what beacon key(s) to use. -pub fn get_key_source(&self) -> &::std::option::Option { - &self.key_source -} -/// The Key Store that contains the Beacon Keys to use with searchable encryption. -pub fn key_store(mut self, input: impl ::std::convert::Into) -> Self { - self.key_store = ::std::option::Option::Some(input.into()); - self -} -/// The Key Store that contains the Beacon Keys to use with searchable encryption. -pub fn set_key_store(mut self, input: ::std::option::Option) -> Self { - self.key_store = input; - self -} -/// The Key Store that contains the Beacon Keys to use with searchable encryption. -pub fn get_key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// The list of Signed Parts that may be included in any compound beacon. -pub fn signed_parts(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.signed_parts = ::std::option::Option::Some(input.into()); - self -} -/// The list of Signed Parts that may be included in any compound beacon. -pub fn set_signed_parts(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.signed_parts = input; - self -} -/// The list of Signed Parts that may be included in any compound beacon. -pub fn get_signed_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.signed_parts -} -/// The Standard Beacons to be written with items. -pub fn standard_beacons(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.standard_beacons = ::std::option::Option::Some(input.into()); - self -} -/// The Standard Beacons to be written with items. -pub fn set_standard_beacons(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.standard_beacons = input; - self -} -/// The Standard Beacons to be written with items. -pub fn get_standard_beacons(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.standard_beacons -} -/// The version of searchable encryption configured. This must be '1'. -pub fn version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.version = ::std::option::Option::Some(input.into()); - self -} -/// The version of searchable encryption configured. This must be '1'. -pub fn set_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.version = input; - self -} -/// The version of searchable encryption configured. This must be '1'. -pub fn get_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.version -} -/// The Virtual Fields to be calculated, supporting other searchable enryption configurations. -pub fn virtual_fields(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.virtual_fields = ::std::option::Option::Some(input.into()); - self -} -/// The Virtual Fields to be calculated, supporting other searchable enryption configurations. -pub fn set_virtual_fields(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.virtual_fields = input; - self -} -/// The Virtual Fields to be calculated, supporting other searchable enryption configurations. -pub fn get_virtual_fields(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.virtual_fields -} + pub fn compound_beacons( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + >, + ) -> Self { + self.compound_beacons = ::std::option::Option::Some(input.into()); + self + } + /// The Compound Beacons to be written with items. + pub fn set_compound_beacons( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + >, + ) -> Self { + self.compound_beacons = input; + self + } + /// The Compound Beacons to be written with items. + pub fn get_compound_beacons( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, + >, + > { + &self.compound_beacons + } + /// The list of Encrypted Parts that may be included in any compound beacon. + pub fn encrypted_parts( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + ) -> Self { + self.encrypted_parts = ::std::option::Option::Some(input.into()); + self + } + /// The list of Encrypted Parts that may be included in any compound beacon. + pub fn set_encrypted_parts( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + ) -> Self { + self.encrypted_parts = input; + self + } + /// The list of Encrypted Parts that may be included in any compound beacon. + pub fn get_encrypted_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + > { + &self.encrypted_parts + } + /// The configuration for what beacon key(s) to use. + pub fn key_source( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + >, + ) -> Self { + self.key_source = ::std::option::Option::Some(input.into()); + self + } + /// The configuration for what beacon key(s) to use. + pub fn set_key_source( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + >, + ) -> Self { + self.key_source = input; + self + } + /// The configuration for what beacon key(s) to use. + pub fn get_key_source( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconKeySource, + > { + &self.key_source + } + /// The Key Store that contains the Beacon Keys to use with searchable encryption. + pub fn key_store( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.key_store = ::std::option::Option::Some(input.into()); + self + } + /// The Key Store that contains the Beacon Keys to use with searchable encryption. + pub fn set_key_store( + mut self, + input: ::std::option::Option, + ) -> Self { + self.key_store = input; + self + } + /// The Key Store that contains the Beacon Keys to use with searchable encryption. + pub fn get_key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// The list of Signed Parts that may be included in any compound beacon. + pub fn signed_parts( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, + >, + >, + ) -> Self { + self.signed_parts = ::std::option::Option::Some(input.into()); + self + } + /// The list of Signed Parts that may be included in any compound beacon. + pub fn set_signed_parts( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, + >, + >, + ) -> Self { + self.signed_parts = input; + self + } + /// The list of Signed Parts that may be included in any compound beacon. + pub fn get_signed_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.signed_parts + } + /// The Standard Beacons to be written with items. + pub fn standard_beacons( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + >, + ) -> Self { + self.standard_beacons = ::std::option::Option::Some(input.into()); + self + } + /// The Standard Beacons to be written with items. + pub fn set_standard_beacons( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + >, + ) -> Self { + self.standard_beacons = input; + self + } + /// The Standard Beacons to be written with items. + pub fn get_standard_beacons( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon, + >, + > { + &self.standard_beacons + } + /// The version of searchable encryption configured. This must be '1'. + pub fn version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.version = ::std::option::Option::Some(input.into()); + self + } + /// The version of searchable encryption configured. This must be '1'. + pub fn set_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.version = input; + self + } + /// The version of searchable encryption configured. This must be '1'. + pub fn get_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.version + } + /// The Virtual Fields to be calculated, supporting other searchable enryption configurations. + pub fn virtual_fields( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + >, + ) -> Self { + self.virtual_fields = ::std::option::Option::Some(input.into()); + self + } + /// The Virtual Fields to be calculated, supporting other searchable enryption configurations. + pub fn set_virtual_fields( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + >, + ) -> Self { + self.virtual_fields = input; + self + } + /// The Virtual Fields to be calculated, supporting other searchable enryption configurations. + pub fn get_virtual_fields( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField, + >, + > { + &self.virtual_fields + } /// Consumes the builder and constructs a [`BeaconVersion`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion). pub fn build( self, @@ -198,15 +395,17 @@ pub fn get_virtual_fields(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion { - compound_beacons: self.compound_beacons, -encrypted_parts: self.encrypted_parts, -key_source: self.key_source, -key_store: self.key_store, -signed_parts: self.signed_parts, -standard_beacons: self.standard_beacons, -version: self.version, -virtual_fields: self.virtual_fields, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion { + compound_beacons: self.compound_beacons, + encrypted_parts: self.encrypted_parts, + key_source: self.key_source, + key_store: self.key_store, + signed_parts: self.signed_parts, + standard_beacons: self.standard_beacons, + version: self.version, + virtual_fields: self.virtual_fields, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_compound_beacon.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_compound_beacon.rs index bdc88a87b..693f9b961 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_compound_beacon.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_compound_beacon.rs @@ -6,41 +6,63 @@ /// The configuration for a Compound Beacon. pub struct CompoundBeacon { /// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. -pub constructors: ::std::option::Option<::std::vec::Vec>, -/// The list of Encrypted Parts that may be included in the compound beacon. -pub encrypted: ::std::option::Option<::std::vec::Vec>, -/// The name of the Compound Beacon. -pub name: ::std::option::Option<::std::string::String>, -/// The list of Signed Parts that may be included in the compound beacon. -pub signed: ::std::option::Option<::std::vec::Vec>, -/// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. -pub split: ::std::option::Option<::std::string::String>, + pub constructors: ::std::option::Option< + ::std::vec::Vec, + >, + /// The list of Encrypted Parts that may be included in the compound beacon. + pub encrypted: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + /// The name of the Compound Beacon. + pub name: ::std::option::Option<::std::string::String>, + /// The list of Signed Parts that may be included in the compound beacon. + pub signed: ::std::option::Option< + ::std::vec::Vec, + >, + /// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. + pub split: ::std::option::Option<::std::string::String>, } impl CompoundBeacon { /// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. -pub fn constructors(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.constructors -} -/// The list of Encrypted Parts that may be included in the compound beacon. -pub fn encrypted(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted -} -/// The name of the Compound Beacon. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The list of Signed Parts that may be included in the compound beacon. -pub fn signed(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.signed -} -/// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. -pub fn split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn constructors( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.constructors + } + /// The list of Encrypted Parts that may be included in the compound beacon. + pub fn encrypted( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + > { + &self.encrypted + } + /// The name of the Compound Beacon. + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The list of Signed Parts that may be included in the compound beacon. + pub fn signed( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.signed + } + /// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. + pub fn split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } } impl CompoundBeacon { /// Creates a new builder-style object to manufacture [`CompoundBeacon`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CompoundBeaconBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CompoundBeaconBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CompoundBeaconBuilder::default() } } @@ -51,83 +73,147 @@ impl CompoundBeacon { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CompoundBeaconBuilder { - pub(crate) constructors: ::std::option::Option<::std::vec::Vec>, -pub(crate) encrypted: ::std::option::Option<::std::vec::Vec>, -pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) signed: ::std::option::Option<::std::vec::Vec>, -pub(crate) split: ::std::option::Option<::std::string::String>, + pub(crate) constructors: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encrypted: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + pub(crate) name: ::std::option::Option<::std::string::String>, + pub(crate) signed: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) split: ::std::option::Option<::std::string::String>, } impl CompoundBeaconBuilder { /// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. -pub fn constructors(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.constructors = ::std::option::Option::Some(input.into()); - self -} -/// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. -pub fn set_constructors(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.constructors = input; - self -} -/// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. -pub fn get_constructors(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.constructors -} -/// The list of Encrypted Parts that may be included in the compound beacon. -pub fn encrypted(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted = ::std::option::Option::Some(input.into()); - self -} -/// The list of Encrypted Parts that may be included in the compound beacon. -pub fn set_encrypted(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted = input; - self -} -/// The list of Encrypted Parts that may be included in the compound beacon. -pub fn get_encrypted(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted -} -/// The name of the Compound Beacon. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the Compound Beacon. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name of the Compound Beacon. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The list of Signed Parts that may be included in the compound beacon. -pub fn signed(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.signed = ::std::option::Option::Some(input.into()); - self -} -/// The list of Signed Parts that may be included in the compound beacon. -pub fn set_signed(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.signed = input; - self -} -/// The list of Signed Parts that may be included in the compound beacon. -pub fn get_signed(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.signed -} -/// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. -pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.split = ::std::option::Option::Some(input.into()); - self -} -/// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. -pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.split = input; - self -} -/// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. -pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn constructors( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor, + >, + >, + ) -> Self { + self.constructors = ::std::option::Option::Some(input.into()); + self + } + /// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. + pub fn set_constructors( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor, + >, + >, + ) -> Self { + self.constructors = input; + self + } + /// The ordered list of constructors that may be used to create the Compound Beacon. Each constructor is checked, in order, to see if it can construct the beacon. The first constructor that can construct the beacon is used. If no constructor can construct the beacon, the Compound Beacon is not written to the item. + pub fn get_constructors( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.constructors + } + /// The list of Encrypted Parts that may be included in the compound beacon. + pub fn encrypted( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + ) -> Self { + self.encrypted = ::std::option::Option::Some(input.into()); + self + } + /// The list of Encrypted Parts that may be included in the compound beacon. + pub fn set_encrypted( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + >, + ) -> Self { + self.encrypted = input; + self + } + /// The list of Encrypted Parts that may be included in the compound beacon. + pub fn get_encrypted( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, + >, + > { + &self.encrypted + } + /// The name of the Compound Beacon. + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the Compound Beacon. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name of the Compound Beacon. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The list of Signed Parts that may be included in the compound beacon. + pub fn signed( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, + >, + >, + ) -> Self { + self.signed = ::std::option::Option::Some(input.into()); + self + } + /// The list of Signed Parts that may be included in the compound beacon. + pub fn set_signed( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, + >, + >, + ) -> Self { + self.signed = input; + self + } + /// The list of Signed Parts that may be included in the compound beacon. + pub fn get_signed( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.signed + } + /// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. + pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.split = ::std::option::Option::Some(input.into()); + self + } + /// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. + pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.split = input; + self + } + /// The characters used to split parts of a compound beacon. The split character should be a character that does not appear in any Signed Part or Prefix used by the Compound Beacon. + pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } /// Consumes the builder and constructs a [`CompoundBeacon`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon). pub fn build( self, @@ -135,12 +221,14 @@ pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon { - constructors: self.constructors, -encrypted: self.encrypted, -name: self.name, -signed: self.signed, -split: self.split, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CompoundBeacon { + constructors: self.constructors, + encrypted: self.encrypted, + name: self.name, + signed: self.signed, + split: self.split, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor.rs index 5fbec8a45..1badefaa9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor.rs @@ -6,17 +6,29 @@ /// The configuration for a particular Compound Beacon construction. pub struct Constructor { /// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. -pub parts: ::std::option::Option<::std::vec::Vec>, + pub parts: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + >, } impl Constructor { /// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. -pub fn parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.parts -} + pub fn parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + > { + &self.parts + } } impl Constructor { /// Creates a new builder-style object to manufacture [`Constructor`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorBuilder::default() } } @@ -27,23 +39,47 @@ impl Constructor { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ConstructorBuilder { - pub(crate) parts: ::std::option::Option<::std::vec::Vec>, + pub(crate) parts: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + >, } impl ConstructorBuilder { /// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. -pub fn parts(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.parts = ::std::option::Option::Some(input.into()); - self -} -/// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. -pub fn set_parts(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.parts = input; - self -} -/// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. -pub fn get_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.parts -} + pub fn parts( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + >, + ) -> Self { + self.parts = ::std::option::Option::Some(input.into()); + self + } + /// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. + pub fn set_parts( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + >, + ) -> Self { + self.parts = input; + self + } + /// The ordered list of parts for a particular Compound Beacon construction. If the item contains all required Parts, a Compound beacon will be written using each Part that exists on the item, in the order specified. + pub fn get_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, + >, + > { + &self.parts + } /// Consumes the builder and constructs a [`Constructor`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor). pub fn build( self, @@ -51,8 +87,10 @@ pub fn get_parts(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor { - parts: self.parts, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Constructor { + parts: self.parts, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor_part.rs index 4fd4fae82..6bc3db97c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_constructor_part.rs @@ -6,23 +6,23 @@ /// A part of a Compound Becaon Construction. pub struct ConstructorPart { /// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. -pub name: ::std::option::Option<::std::string::String>, -/// Whether this Encrypted Part or Signed Part is required for this construction to succeed. -pub required: ::std::option::Option<::std::primitive::bool>, + pub name: ::std::option::Option<::std::string::String>, + /// Whether this Encrypted Part or Signed Part is required for this construction to succeed. + pub required: ::std::option::Option<::std::primitive::bool>, } impl ConstructorPart { /// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// Whether this Encrypted Part or Signed Part is required for this construction to succeed. -pub fn required(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.required -} + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// Whether this Encrypted Part or Signed Part is required for this construction to succeed. + pub fn required(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.required + } } impl ConstructorPart { /// Creates a new builder-style object to manufacture [`ConstructorPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorPartBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorPartBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::ConstructorPartBuilder::default() } } @@ -34,37 +34,37 @@ impl ConstructorPart { )] pub struct ConstructorPartBuilder { pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) required: ::std::option::Option<::std::primitive::bool>, + pub(crate) required: ::std::option::Option<::std::primitive::bool>, } impl ConstructorPartBuilder { /// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// Whether this Encrypted Part or Signed Part is required for this construction to succeed. -pub fn required(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { - self.required = ::std::option::Option::Some(input.into()); - self -} -/// Whether this Encrypted Part or Signed Part is required for this construction to succeed. -pub fn set_required(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { - self.required = input; - self -} -/// Whether this Encrypted Part or Signed Part is required for this construction to succeed. -pub fn get_required(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.required -} + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name of the Encrypted Part or Signed Part for which this constructor part gets a value. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// Whether this Encrypted Part or Signed Part is required for this construction to succeed. + pub fn required(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { + self.required = ::std::option::Option::Some(input.into()); + self + } + /// Whether this Encrypted Part or Signed Part is required for this construction to succeed. + pub fn set_required(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { + self.required = input; + self + } + /// Whether this Encrypted Part or Signed Part is required for this construction to succeed. + pub fn get_required(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.required + } /// Consumes the builder and constructs a [`ConstructorPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart). pub fn build( self, @@ -72,9 +72,11 @@ pub fn get_required(&self) -> &::std::option::Option<::std::primitive::bool> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart { - name: self.name, -required: self.required, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::ConstructorPart { + name: self.name, + required: self.required, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs index def5fd6dc..391c9b4b9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_input.rs @@ -10,13 +10,13 @@ pub ddb_key_branch_key_id_supplier: ::std::option::Option &::std::option::Option { - &self.ddb_key_branch_key_id_supplier -} + pub fn ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.ddb_key_branch_key_id_supplier + } } impl CreateDynamoDbEncryptionBranchKeyIdSupplierInput { /// Creates a new builder-style object to manufacture [`CreateDynamoDbEncryptionBranchKeyIdSupplierInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { } impl CreateDynamoDbEncryptionBranchKeyIdSupplierInputBuilder { /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn ddb_key_branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.ddb_key_branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn set_ddb_key_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.ddb_key_branch_key_id_supplier = input; - self -} -/// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. -pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.ddb_key_branch_key_id_supplier -} + pub fn ddb_key_branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ddb_key_branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn set_ddb_key_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.ddb_key_branch_key_id_supplier = input; + self + } + /// An implementation of the DynamoDbKeyBranchKeyIdSupplier interface, which determines what Branch Key to use for data key wrapping/unwrapping based on the DynamoDB item being written/read. + pub fn get_ddb_key_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.ddb_key_branch_key_id_supplier + } /// Consumes the builder and constructs a [`CreateDynamoDbEncryptionBranchKeyIdSupplierInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { ddb_key_branch_key_id_supplier: self.ddb_key_branch_key_id_supplier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs index ed995b237..64d23c265 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_create_dynamo_db_encryption_branch_key_id_supplier_output.rs @@ -10,13 +10,13 @@ pub branch_key_id_supplier: ::std::option::Option &::std::option::Option { - &self.branch_key_id_supplier -} + pub fn branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } } impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { /// Creates a new builder-style object to manufacture [`CreateDynamoDbEncryptionBranchKeyIdSupplierOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { } impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutputBuilder { /// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn set_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.branch_key_id_supplier = input; - self -} -/// The Branch Key Supplier for use with the Hierarchical Keyring. -pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} + pub fn branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Branch Key Supplier for use with the Hierarchical Keyring. + pub fn set_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.branch_key_id_supplier = input; + self + } + /// The Branch Key Supplier for use with the Hierarchical Keyring. + pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } /// Consumes the builder and constructs a [`CreateDynamoDbEncryptionBranchKeyIdSupplierOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { branch_key_id_supplier: self.branch_key_id_supplier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_table_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_table_encryption_config.rs index 830b05a44..7687d6fa5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_table_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_table_encryption_config.rs @@ -32,57 +32,88 @@ pub sort_key_name: ::std::option::Option<::std::string::String>, } impl DynamoDbTableEncryptionConfig { /// An ID for the algorithm suite to use during encryption and decryption. -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn allowed_unsigned_attribute_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.allowed_unsigned_attribute_prefix -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn allowed_unsigned_attributes(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.allowed_unsigned_attributes -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn legacy_override(&self) -> &::std::option::Option { - &self.legacy_override -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn logical_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_table_name -} -/// The name of the partition key on this table. -pub fn partition_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_key_name -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn plaintext_override(&self) -> &::std::option::Option { - &self.plaintext_override -} -/// The configuration for searchable encryption. -pub fn search(&self) -> &::std::option::Option { - &self.search -} -/// If this table contains a sort key, the name of the sort key on this table. -pub fn sort_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.sort_key_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn allowed_unsigned_attribute_prefix( + &self, + ) -> &::std::option::Option<::std::string::String> { + &self.allowed_unsigned_attribute_prefix + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn allowed_unsigned_attributes( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.allowed_unsigned_attributes + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn legacy_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + > { + &self.legacy_override + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn logical_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_table_name + } + /// The name of the partition key on this table. + pub fn partition_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_key_name + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn plaintext_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + > { + &self.plaintext_override + } + /// The configuration for searchable encryption. + pub fn search( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, + > { + &self.search + } + /// If this table contains a sort key, the name of the sort key on this table. + pub fn sort_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.sort_key_name + } } impl DynamoDbTableEncryptionConfig { /// Creates a new builder-style object to manufacture [`DynamoDbTableEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTableEncryptionConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTableEncryptionConfigBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTableEncryptionConfigBuilder::default() } } @@ -108,180 +139,303 @@ pub(crate) sort_key_name: ::std::option::Option<::std::string::String>, } impl DynamoDbTableEncryptionConfigBuilder { /// An ID for the algorithm suite to use during encryption and decryption. -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -/// An ID for the algorithm suite to use during encryption and decryption. -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -/// An ID for the algorithm suite to use during encryption and decryption. -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn allowed_unsigned_attribute_prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.allowed_unsigned_attribute_prefix = ::std::option::Option::Some(input.into()); - self -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn set_allowed_unsigned_attribute_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.allowed_unsigned_attribute_prefix = input; - self -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn get_allowed_unsigned_attribute_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.allowed_unsigned_attribute_prefix -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn allowed_unsigned_attributes(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.allowed_unsigned_attributes = ::std::option::Option::Some(input.into()); - self -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn set_allowed_unsigned_attributes(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.allowed_unsigned_attributes = input; - self -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn get_allowed_unsigned_attributes(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.allowed_unsigned_attributes -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn attribute_actions_on_encrypt(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); - self -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn set_attribute_actions_on_encrypt(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = input; - self -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn get_attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn legacy_override(mut self, input: impl ::std::convert::Into) -> Self { - self.legacy_override = ::std::option::Option::Some(input.into()); - self -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn set_legacy_override(mut self, input: ::std::option::Option) -> Self { - self.legacy_override = input; - self -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn get_legacy_override(&self) -> &::std::option::Option { - &self.legacy_override -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn logical_table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.logical_table_name = ::std::option::Option::Some(input.into()); - self -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn set_logical_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.logical_table_name = input; - self -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn get_logical_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_table_name -} -/// The name of the partition key on this table. -pub fn partition_key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.partition_key_name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the partition key on this table. -pub fn set_partition_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.partition_key_name = input; - self -} -/// The name of the partition key on this table. -pub fn get_partition_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_key_name -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn plaintext_override(mut self, input: impl ::std::convert::Into) -> Self { - self.plaintext_override = ::std::option::Option::Some(input.into()); - self -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn set_plaintext_override(mut self, input: ::std::option::Option) -> Self { - self.plaintext_override = input; - self -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn get_plaintext_override(&self) -> &::std::option::Option { - &self.plaintext_override -} -/// The configuration for searchable encryption. -pub fn search(mut self, input: impl ::std::convert::Into) -> Self { - self.search = ::std::option::Option::Some(input.into()); - self -} -/// The configuration for searchable encryption. -pub fn set_search(mut self, input: ::std::option::Option) -> Self { - self.search = input; - self -} -/// The configuration for searchable encryption. -pub fn get_search(&self) -> &::std::option::Option { - &self.search -} -/// If this table contains a sort key, the name of the sort key on this table. -pub fn sort_key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.sort_key_name = ::std::option::Option::Some(input.into()); - self -} -/// If this table contains a sort key, the name of the sort key on this table. -pub fn set_sort_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.sort_key_name = input; - self -} -/// If this table contains a sort key, the name of the sort key on this table. -pub fn get_sort_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.sort_key_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + /// An ID for the algorithm suite to use during encryption and decryption. + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + /// An ID for the algorithm suite to use during encryption and decryption. + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn allowed_unsigned_attribute_prefix( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.allowed_unsigned_attribute_prefix = ::std::option::Option::Some(input.into()); + self + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn set_allowed_unsigned_attribute_prefix( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.allowed_unsigned_attribute_prefix = input; + self + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn get_allowed_unsigned_attribute_prefix( + &self, + ) -> &::std::option::Option<::std::string::String> { + &self.allowed_unsigned_attribute_prefix + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn allowed_unsigned_attributes( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.allowed_unsigned_attributes = ::std::option::Option::Some(input.into()); + self + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn set_allowed_unsigned_attributes( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.allowed_unsigned_attributes = input; + self + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn get_allowed_unsigned_attributes( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.allowed_unsigned_attributes + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn attribute_actions_on_encrypt( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); + self + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn set_attribute_actions_on_encrypt( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = input; + self + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn get_attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn legacy_override( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + >, + ) -> Self { + self.legacy_override = ::std::option::Option::Some(input.into()); + self + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn set_legacy_override( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + >, + ) -> Self { + self.legacy_override = input; + self + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn get_legacy_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + > { + &self.legacy_override + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn logical_table_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.logical_table_name = ::std::option::Option::Some(input.into()); + self + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn set_logical_table_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.logical_table_name = input; + self + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn get_logical_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_table_name + } + /// The name of the partition key on this table. + pub fn partition_key_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.partition_key_name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the partition key on this table. + pub fn set_partition_key_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.partition_key_name = input; + self + } + /// The name of the partition key on this table. + pub fn get_partition_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_key_name + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn plaintext_override( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + >, + ) -> Self { + self.plaintext_override = ::std::option::Option::Some(input.into()); + self + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn set_plaintext_override( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + >, + ) -> Self { + self.plaintext_override = input; + self + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn get_plaintext_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + > { + &self.plaintext_override + } + /// The configuration for searchable encryption. + pub fn search( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, + >, + ) -> Self { + self.search = ::std::option::Option::Some(input.into()); + self + } + /// The configuration for searchable encryption. + pub fn set_search( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, + >, + ) -> Self { + self.search = input; + self + } + /// The configuration for searchable encryption. + pub fn get_search( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, + > { + &self.search + } + /// If this table contains a sort key, the name of the sort key on this table. + pub fn sort_key_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.sort_key_name = ::std::option::Option::Some(input.into()); + self + } + /// If this table contains a sort key, the name of the sort key on this table. + pub fn set_sort_key_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.sort_key_name = input; + self + } + /// If this table contains a sort key, the name of the sort key on this table. + pub fn get_sort_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.sort_key_name + } /// Consumes the builder and constructs a [`DynamoDbTableEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig { algorithm_suite_id: self.algorithm_suite_id, allowed_unsigned_attribute_prefix: self.allowed_unsigned_attribute_prefix, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_tables_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_tables_encryption_config.rs index c59b8058a..7dfe44dac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_tables_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_dynamo_db_tables_encryption_config.rs @@ -10,13 +10,13 @@ pub table_encryption_configs: ::std::option::Option<::std::collections::HashMap< } impl DynamoDbTablesEncryptionConfig { /// A map of DynamoDB table name to its configuration for client-side encryption. -pub fn table_encryption_configs(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>> { - &self.table_encryption_configs -} + pub fn table_encryption_configs(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>{ + &self.table_encryption_configs + } } impl DynamoDbTablesEncryptionConfig { /// Creates a new builder-style object to manufacture [`DynamoDbTablesEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTablesEncryptionConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTablesEncryptionConfigBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::DynamoDbTablesEncryptionConfigBuilder::default() } } @@ -31,26 +31,32 @@ pub struct DynamoDbTablesEncryptionConfigBuilder { } impl DynamoDbTablesEncryptionConfigBuilder { /// A map of DynamoDB table name to its configuration for client-side encryption. -pub fn table_encryption_configs(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>) -> Self { - self.table_encryption_configs = ::std::option::Option::Some(input.into()); - self -} -/// A map of DynamoDB table name to its configuration for client-side encryption. -pub fn set_table_encryption_configs(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>) -> Self { - self.table_encryption_configs = input; - self -} -/// A map of DynamoDB table name to its configuration for client-side encryption. -pub fn get_table_encryption_configs(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>> { - &self.table_encryption_configs -} + pub fn table_encryption_configs( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>, + ) -> Self { + self.table_encryption_configs = ::std::option::Option::Some(input.into()); + self + } + /// A map of DynamoDB table name to its configuration for client-side encryption. + pub fn set_table_encryption_configs( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>, + ) -> Self { + self.table_encryption_configs = input; + self + } + /// A map of DynamoDB table name to its configuration for client-side encryption. + pub fn get_table_encryption_configs(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTableEncryptionConfig>>{ + &self.table_encryption_configs + } /// Consumes the builder and constructs a [`DynamoDbTablesEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbTablesEncryptionConfig { table_encryption_configs: self.table_encryption_configs, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_data_key_description.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_data_key_description.rs index 34258e11d..e0911603e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_data_key_description.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_data_key_description.rs @@ -6,35 +6,35 @@ #[allow(missing_docs)] pub struct EncryptedDataKeyDescription { /// Branch key id of the encrypted data key. -pub branch_key_id: ::std::option::Option<::std::string::String>, -/// Branch key version of the encrypted data key. -pub branch_key_version: ::std::option::Option<::std::string::String>, -/// Key provider id of the encrypted data key. -pub key_provider_id: ::std::option::Option<::std::string::String>, -/// Key provider information of the encrypted data key. -pub key_provider_info: ::std::option::Option<::std::string::String>, + pub branch_key_id: ::std::option::Option<::std::string::String>, + /// Branch key version of the encrypted data key. + pub branch_key_version: ::std::option::Option<::std::string::String>, + /// Key provider id of the encrypted data key. + pub key_provider_id: ::std::option::Option<::std::string::String>, + /// Key provider information of the encrypted data key. + pub key_provider_info: ::std::option::Option<::std::string::String>, } impl EncryptedDataKeyDescription { /// Branch key id of the encrypted data key. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// Branch key version of the encrypted data key. -pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} -/// Key provider id of the encrypted data key. -pub fn key_provider_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_id -} -/// Key provider information of the encrypted data key. -pub fn key_provider_info(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_info -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// Branch key version of the encrypted data key. + pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } + /// Key provider id of the encrypted data key. + pub fn key_provider_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_id + } + /// Key provider information of the encrypted data key. + pub fn key_provider_info(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_info + } } impl EncryptedDataKeyDescription { /// Creates a new builder-style object to manufacture [`EncryptedDataKeyDescription`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedDataKeyDescriptionBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedDataKeyDescriptionBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedDataKeyDescriptionBuilder::default() } } @@ -46,67 +46,91 @@ impl EncryptedDataKeyDescription { )] pub struct EncryptedDataKeyDescriptionBuilder { pub(crate) branch_key_id: ::std::option::Option<::std::string::String>, -pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, -pub(crate) key_provider_id: ::std::option::Option<::std::string::String>, -pub(crate) key_provider_info: ::std::option::Option<::std::string::String>, + pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, + pub(crate) key_provider_id: ::std::option::Option<::std::string::String>, + pub(crate) key_provider_info: ::std::option::Option<::std::string::String>, } impl EncryptedDataKeyDescriptionBuilder { /// Branch key id of the encrypted data key. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// Branch key id of the encrypted data key. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// Branch key id of the encrypted data key. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// Branch key version of the encrypted data key. -pub fn branch_key_version(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_version = ::std::option::Option::Some(input.into()); - self -} -/// Branch key version of the encrypted data key. -pub fn set_branch_key_version(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_version = input; - self -} -/// Branch key version of the encrypted data key. -pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} -/// Key provider id of the encrypted data key. -pub fn key_provider_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_provider_id = ::std::option::Option::Some(input.into()); - self -} -/// Key provider id of the encrypted data key. -pub fn set_key_provider_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_provider_id = input; - self -} -/// Key provider id of the encrypted data key. -pub fn get_key_provider_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_id -} -/// Key provider information of the encrypted data key. -pub fn key_provider_info(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_provider_info = ::std::option::Option::Some(input.into()); - self -} -/// Key provider information of the encrypted data key. -pub fn set_key_provider_info(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_provider_info = input; - self -} -/// Key provider information of the encrypted data key. -pub fn get_key_provider_info(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_info -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// Branch key id of the encrypted data key. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// Branch key id of the encrypted data key. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// Branch key version of the encrypted data key. + pub fn branch_key_version( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_version = ::std::option::Option::Some(input.into()); + self + } + /// Branch key version of the encrypted data key. + pub fn set_branch_key_version( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_version = input; + self + } + /// Branch key version of the encrypted data key. + pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } + /// Key provider id of the encrypted data key. + pub fn key_provider_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_provider_id = ::std::option::Option::Some(input.into()); + self + } + /// Key provider id of the encrypted data key. + pub fn set_key_provider_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_provider_id = input; + self + } + /// Key provider id of the encrypted data key. + pub fn get_key_provider_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_id + } + /// Key provider information of the encrypted data key. + pub fn key_provider_info( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_provider_info = ::std::option::Option::Some(input.into()); + self + } + /// Key provider information of the encrypted data key. + pub fn set_key_provider_info( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_provider_info = input; + self + } + /// Key provider information of the encrypted data key. + pub fn get_key_provider_info(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_info + } /// Consumes the builder and constructs a [`EncryptedDataKeyDescription`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_part.rs index 409462f55..ef636897a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_encrypted_part.rs @@ -6,23 +6,25 @@ /// A part of a Compound Beacon that contains a beacon over encrypted data. pub struct EncryptedPart { /// The name of the Standard Beacon, whose value this Part will hold. -pub name: ::std::option::Option<::std::string::String>, -/// The prefix that is written with this Encrypted Part. -pub prefix: ::std::option::Option<::std::string::String>, + pub name: ::std::option::Option<::std::string::String>, + /// The prefix that is written with this Encrypted Part. + pub prefix: ::std::option::Option<::std::string::String>, } impl EncryptedPart { /// The name of the Standard Beacon, whose value this Part will hold. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The prefix that is written with this Encrypted Part. -pub fn prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.prefix -} + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The prefix that is written with this Encrypted Part. + pub fn prefix(&self) -> &::std::option::Option<::std::string::String> { + &self.prefix + } } impl EncryptedPart { /// Creates a new builder-style object to manufacture [`EncryptedPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedPartBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedPartBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::EncryptedPartBuilder::default() } } @@ -34,37 +36,37 @@ impl EncryptedPart { )] pub struct EncryptedPartBuilder { pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) prefix: ::std::option::Option<::std::string::String>, + pub(crate) prefix: ::std::option::Option<::std::string::String>, } impl EncryptedPartBuilder { /// The name of the Standard Beacon, whose value this Part will hold. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the Standard Beacon, whose value this Part will hold. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name of the Standard Beacon, whose value this Part will hold. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The prefix that is written with this Encrypted Part. -pub fn prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.prefix = ::std::option::Option::Some(input.into()); - self -} -/// The prefix that is written with this Encrypted Part. -pub fn set_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.prefix = input; - self -} -/// The prefix that is written with this Encrypted Part. -pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.prefix -} + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the Standard Beacon, whose value this Part will hold. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name of the Standard Beacon, whose value this Part will hold. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The prefix that is written with this Encrypted Part. + pub fn prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.prefix = ::std::option::Option::Some(input.into()); + self + } + /// The prefix that is written with this Encrypted Part. + pub fn set_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.prefix = input; + self + } + /// The prefix that is written with this Encrypted Part. + pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { + &self.prefix + } /// Consumes the builder and constructs a [`EncryptedPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart). pub fn build( self, @@ -72,9 +74,11 @@ pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart { - name: self.name, -prefix: self.prefix, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedPart { + name: self.name, + prefix: self.prefix, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_input.rs index 895b64aec..f9ccf172e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_input.rs @@ -6,17 +6,23 @@ /// Inputs for getting the Branch Key that should be used for wrapping and unwrapping data keys. pub struct GetBranchKeyIdFromDdbKeyInput { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub ddb_key: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub ddb_key: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl GetBranchKeyIdFromDdbKeyInput { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn ddb_key(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.ddb_key -} + pub fn ddb_key( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.ddb_key + } } impl GetBranchKeyIdFromDdbKeyInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdFromDdbKeyInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyInputBuilder::default() } } @@ -27,30 +33,52 @@ impl GetBranchKeyIdFromDdbKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyIdFromDdbKeyInputBuilder { - pub(crate) ddb_key: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) ddb_key: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl GetBranchKeyIdFromDdbKeyInputBuilder { /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn ddb_key(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.ddb_key = ::std::option::Option::Some(input.into()); - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn set_ddb_key(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.ddb_key = input; - self -} -/// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. -pub fn get_ddb_key(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.ddb_key -} + pub fn ddb_key( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.ddb_key = ::std::option::Option::Some(input.into()); + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn set_ddb_key( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.ddb_key = input; + self + } + /// The partition and sort (if it exists) attributes on the item being read or written, along with the values of any attributes configured as SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT. + pub fn get_ddb_key( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.ddb_key + } /// Consumes the builder and constructs a [`GetBranchKeyIdFromDdbKeyInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput { ddb_key: self.ddb_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_output.rs index e9e5ee13b..b7024ada3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_branch_key_id_from_ddb_key_output.rs @@ -6,17 +6,17 @@ /// Outputs for getting the Branch Key that should be used for wrapping and unwrapping data keys. pub struct GetBranchKeyIdFromDdbKeyOutput { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub branch_key_id: ::std::option::Option<::std::string::String>, + pub branch_key_id: ::std::option::Option<::std::string::String>, } impl GetBranchKeyIdFromDdbKeyOutput { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } } impl GetBranchKeyIdFromDdbKeyOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdFromDdbKeyOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetBranchKeyIdFromDdbKeyOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetBranchKeyIdFromDdbKeyOutputBuilder { } impl GetBranchKeyIdFromDdbKeyOutputBuilder { /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The ID of the Branch Key that should be used to wrap and unwrap data keys for this item. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } /// Consumes the builder and constructs a [`GetBranchKeyIdFromDdbKeyOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput { branch_key_id: self.branch_key_id, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_input.rs index 92e32f7c2..91e978e10 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_input.rs @@ -10,13 +10,13 @@ pub input: ::std::option::Option &::std::option::Option { - &self.input -} + pub fn input(&self) -> &::std::option::Option{ + &self.input + } } impl GetEncryptedDataKeyDescriptionInput { /// Creates a new builder-style object to manufacture [`GetEncryptedDataKeyDescriptionInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetEncryptedDataKeyDescriptionInputBuilder { } impl GetEncryptedDataKeyDescriptionInputBuilder { #[allow(missing_docs)] -pub fn input(mut self, input: impl ::std::convert::Into) -> Self { - self.input = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_input(mut self, input: ::std::option::Option) -> Self { - self.input = input; - self -} -#[allow(missing_docs)] -pub fn get_input(&self) -> &::std::option::Option { - &self.input -} + pub fn input( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.input = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_input( + mut self, + input: ::std::option::Option, + ) -> Self { + self.input = input; + self + } + #[allow(missing_docs)] + pub fn get_input(&self) -> &::std::option::Option{ + &self.input + } /// Consumes the builder and constructs a [`GetEncryptedDataKeyDescriptionInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput { input: self.input, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_output.rs index 0ebba4c14..5ee45c4fe 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_output.rs @@ -10,13 +10,13 @@ pub encrypted_data_key_description_output: ::std::option::Option<::std::vec::Vec } impl GetEncryptedDataKeyDescriptionOutput { /// A list of encrypted data key description. -pub fn encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_key_description_output -} + pub fn encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec>{ + &self.encrypted_data_key_description_output + } } impl GetEncryptedDataKeyDescriptionOutput { /// Creates a new builder-style object to manufacture [`GetEncryptedDataKeyDescriptionOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetEncryptedDataKeyDescriptionOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetEncryptedDataKeyDescriptionOutputBuilder { } impl GetEncryptedDataKeyDescriptionOutputBuilder { /// A list of encrypted data key description. -pub fn encrypted_data_key_description_output(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_key_description_output = ::std::option::Option::Some(input.into()); - self -} -/// A list of encrypted data key description. -pub fn set_encrypted_data_key_description_output(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_key_description_output = input; - self -} -/// A list of encrypted data key description. -pub fn get_encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_key_description_output -} + pub fn encrypted_data_key_description_output( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.encrypted_data_key_description_output = ::std::option::Option::Some(input.into()); + self + } + /// A list of encrypted data key description. + pub fn set_encrypted_data_key_description_output( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.encrypted_data_key_description_output = input; + self + } + /// A list of encrypted data key description. + pub fn get_encrypted_data_key_description_output(&self) -> &::std::option::Option<::std::vec::Vec>{ + &self.encrypted_data_key_description_output + } /// Consumes the builder and constructs a [`GetEncryptedDataKeyDescriptionOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput { encrypted_data_key_description_output: self.encrypted_data_key_description_output, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_union.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_union.rs index a8e17fa5f..34030c8c0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_union.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_encrypted_data_key_description_union.rs @@ -6,9 +6,11 @@ #[allow(missing_docs)] pub enum GetEncryptedDataKeyDescriptionUnion { /// A binary header value. -Header(::aws_smithy_types::Blob), -/// A DynamoDB item. -Item(::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>), + Header(::aws_smithy_types::Blob), + /// A DynamoDB item. + Item( + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + ), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +23,39 @@ Item(::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types: } impl GetEncryptedDataKeyDescriptionUnion { /// Tries to convert the enum instance into [`Header`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header), extracting the inner [`::aws_smithy_types::Blob`](::aws_smithy_types::Blob). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_header(&self) -> ::std::result::Result<&::aws_smithy_types::Blob, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_header(&self) -> ::std::result::Result<&::aws_smithy_types::Blob, &Self> { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Item`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item), extracting the inner [`::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>`](::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_item(&self) -> ::std::result::Result<&::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item(val) = &self { + } + /// Tries to convert the enum instance into [`Item`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item), extracting the inner [`::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>`](::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_item( + &self, + ) -> ::std::result::Result< + &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`Header`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header). -pub fn is_header(&self) -> ::std::primitive::bool { - self.as_header().is_ok() -} -/// Returns true if this is a [`Item`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item). -pub fn is_item(&self) -> ::std::primitive::bool { - self.as_item().is_ok() -} + pub fn is_header(&self) -> ::std::primitive::bool { + self.as_header().is_ok() + } + /// Returns true if this is a [`Item`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item). + pub fn is_item(&self) -> ::std::primitive::bool { + self.as_item().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_prefix.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_prefix.rs index d1cd1b5e7..4c9539235 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_prefix.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_prefix.rs @@ -6,17 +6,19 @@ /// The Virtual Part Transformation that gets the prefix of a string. pub struct GetPrefix { /// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GetPrefix { /// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GetPrefix { /// Creates a new builder-style object to manufacture [`GetPrefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetPrefixBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetPrefixBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetPrefixBuilder::default() } } @@ -31,19 +33,19 @@ pub struct GetPrefixBuilder { } impl GetPrefixBuilder { /// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -/// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -/// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + /// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + /// If positive, the number of characters to return from the front. If negative, the absolute number of characters to exclude from the end. e.g. GetPrefix(-1) returns all but the last character. + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GetPrefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix { - length: self.length, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix { + length: self.length, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segment.rs index 67389e35e..b25b1d190 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segment.rs @@ -6,23 +6,25 @@ /// The Virtual Part Transformation that splits a string and gets a particular segment of that split. pub struct GetSegment { /// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. -pub index: ::std::option::Option<::std::primitive::i32>, -/// The characters to split on. -pub split: ::std::option::Option<::std::string::String>, + pub index: ::std::option::Option<::std::primitive::i32>, + /// The characters to split on. + pub split: ::std::option::Option<::std::string::String>, } impl GetSegment { /// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. -pub fn index(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.index -} -/// The characters to split on. -pub fn split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn index(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.index + } + /// The characters to split on. + pub fn split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } } impl GetSegment { /// Creates a new builder-style object to manufacture [`GetSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentBuilder::default() } } @@ -34,37 +36,37 @@ impl GetSegment { )] pub struct GetSegmentBuilder { pub(crate) index: ::std::option::Option<::std::primitive::i32>, -pub(crate) split: ::std::option::Option<::std::string::String>, + pub(crate) split: ::std::option::Option<::std::string::String>, } impl GetSegmentBuilder { /// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. -pub fn index(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.index = ::std::option::Option::Some(input.into()); - self -} -/// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. -pub fn set_index(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.index = input; - self -} -/// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. -pub fn get_index(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.index -} -/// The characters to split on. -pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.split = ::std::option::Option::Some(input.into()); - self -} -/// The characters to split on. -pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.split = input; - self -} -/// The characters to split on. -pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn index(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.index = ::std::option::Option::Some(input.into()); + self + } + /// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. + pub fn set_index(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.index = input; + self + } + /// The index of the split string result to return. 0 represents the segment before the first split character. -1 respresents the segment after the last split character. + pub fn get_index(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.index + } + /// The characters to split on. + pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.split = ::std::option::Option::Some(input.into()); + self + } + /// The characters to split on. + pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.split = input; + self + } + /// The characters to split on. + pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } /// Consumes the builder and constructs a [`GetSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment). pub fn build( self, @@ -72,9 +74,11 @@ pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment { - index: self.index, -split: self.split, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment { + index: self.index, + split: self.split, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segments.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segments.rs index 08a88b6c4..4022109ef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segments.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_segments.rs @@ -6,29 +6,31 @@ /// The Virtual Part Transformation that splits a string and gets a range of segments of that split. pub struct GetSegments { /// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. -pub high: ::std::option::Option<::std::primitive::i32>, -/// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. -pub low: ::std::option::Option<::std::primitive::i32>, -/// The characters to split on. -pub split: ::std::option::Option<::std::string::String>, + pub high: ::std::option::Option<::std::primitive::i32>, + /// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. + pub low: ::std::option::Option<::std::primitive::i32>, + /// The characters to split on. + pub split: ::std::option::Option<::std::string::String>, } impl GetSegments { /// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. -pub fn high(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.high -} -/// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. -pub fn low(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.low -} -/// The characters to split on. -pub fn split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn high(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.high + } + /// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. + pub fn low(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.low + } + /// The characters to split on. + pub fn split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } } impl GetSegments { /// Creates a new builder-style object to manufacture [`GetSegments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentsBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentsBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSegmentsBuilder::default() } } @@ -40,52 +42,52 @@ impl GetSegments { )] pub struct GetSegmentsBuilder { pub(crate) high: ::std::option::Option<::std::primitive::i32>, -pub(crate) low: ::std::option::Option<::std::primitive::i32>, -pub(crate) split: ::std::option::Option<::std::string::String>, + pub(crate) low: ::std::option::Option<::std::primitive::i32>, + pub(crate) split: ::std::option::Option<::std::string::String>, } impl GetSegmentsBuilder { /// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. -pub fn high(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.high = ::std::option::Option::Some(input.into()); - self -} -/// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. -pub fn set_high(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.high = input; - self -} -/// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. -pub fn get_high(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.high -} -/// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. -pub fn low(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.low = ::std::option::Option::Some(input.into()); - self -} -/// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. -pub fn set_low(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.low = input; - self -} -/// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. -pub fn get_low(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.low -} -/// The characters to split on. -pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.split = ::std::option::Option::Some(input.into()); - self -} -/// The characters to split on. -pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.split = input; - self -} -/// The characters to split on. -pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { - &self.split -} + pub fn high(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.high = ::std::option::Option::Some(input.into()); + self + } + /// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. + pub fn set_high(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.high = input; + self + } + /// The index to stop the segments at, exclusive. Negative numbers count from the end. -1 is the last segment. + pub fn get_high(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.high + } + /// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. + pub fn low(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.low = ::std::option::Option::Some(input.into()); + self + } + /// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. + pub fn set_low(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.low = input; + self + } + /// The index to start the segments from, inclusive. Negative numbers count from the end. -1 is the last segment. + pub fn get_low(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.low + } + /// The characters to split on. + pub fn split(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.split = ::std::option::Option::Some(input.into()); + self + } + /// The characters to split on. + pub fn set_split(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.split = input; + self + } + /// The characters to split on. + pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { + &self.split + } /// Consumes the builder and constructs a [`GetSegments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments). pub fn build( self, @@ -93,10 +95,12 @@ pub fn get_split(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments { - high: self.high, -low: self.low, -split: self.split, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments { + high: self.high, + low: self.low, + split: self.split, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_substring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_substring.rs index 97ba942ca..3957f276a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_substring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_substring.rs @@ -6,23 +6,25 @@ /// The Virtual Part Transformation that gets a substring from a string. pub struct GetSubstring { /// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. -pub high: ::std::option::Option<::std::primitive::i32>, -/// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. -pub low: ::std::option::Option<::std::primitive::i32>, + pub high: ::std::option::Option<::std::primitive::i32>, + /// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. + pub low: ::std::option::Option<::std::primitive::i32>, } impl GetSubstring { /// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn high(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.high -} -/// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn low(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.low -} + pub fn high(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.high + } + /// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn low(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.low + } } impl GetSubstring { /// Creates a new builder-style object to manufacture [`GetSubstring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSubstringBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSubstringBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSubstringBuilder::default() } } @@ -34,37 +36,37 @@ impl GetSubstring { )] pub struct GetSubstringBuilder { pub(crate) high: ::std::option::Option<::std::primitive::i32>, -pub(crate) low: ::std::option::Option<::std::primitive::i32>, + pub(crate) low: ::std::option::Option<::std::primitive::i32>, } impl GetSubstringBuilder { /// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn high(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.high = ::std::option::Option::Some(input.into()); - self -} -/// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn set_high(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.high = input; - self -} -/// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn get_high(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.high -} -/// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn low(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.low = ::std::option::Option::Some(input.into()); - self -} -/// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn set_low(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.low = input; - self -} -/// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. -pub fn get_low(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.low -} + pub fn high(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.high = ::std::option::Option::Some(input.into()); + self + } + /// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn set_high(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.high = input; + self + } + /// The index to stop the substring at, exclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn get_high(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.high + } + /// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn low(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.low = ::std::option::Option::Some(input.into()); + self + } + /// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn set_low(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.low = input; + self + } + /// The index to start the substring from, inclusive. Negative numbers count from the end. -1 is the last character of a string. + pub fn get_low(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.low + } /// Consumes the builder and constructs a [`GetSubstring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring). pub fn build( self, @@ -72,9 +74,11 @@ pub fn get_low(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring { - high: self.high, -low: self.low, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring { + high: self.high, + low: self.low, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_suffix.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_suffix.rs index 99fa3f135..ba9a506a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_suffix.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_get_suffix.rs @@ -6,17 +6,19 @@ /// The Virtual Part Transformation that gets the suffix of a string. pub struct GetSuffix { /// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GetSuffix { /// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GetSuffix { /// Creates a new builder-style object to manufacture [`GetSuffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSuffixBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSuffixBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::GetSuffixBuilder::default() } } @@ -31,19 +33,19 @@ pub struct GetSuffixBuilder { } impl GetSuffixBuilder { /// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -/// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -/// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + /// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + /// If positive, the number of characters to return from the end. If negative, the absolute number of characters to exclude from the front. e.g. GetSuffix(-1) returns all but the first character. + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GetSuffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix { - length: self.length, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix { + length: self.length, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_insert.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_insert.rs index aec5dcfb2..d7a59c990 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_insert.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_insert.rs @@ -6,17 +6,19 @@ /// The Virtual Part Transformation that appends a literal string. pub struct Insert { /// The literal string to append. -pub literal: ::std::option::Option<::std::string::String>, + pub literal: ::std::option::Option<::std::string::String>, } impl Insert { /// The literal string to append. -pub fn literal(&self) -> &::std::option::Option<::std::string::String> { - &self.literal -} + pub fn literal(&self) -> &::std::option::Option<::std::string::String> { + &self.literal + } } impl Insert { /// Creates a new builder-style object to manufacture [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::InsertBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::InsertBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::InsertBuilder::default() } } @@ -31,19 +33,19 @@ pub struct InsertBuilder { } impl InsertBuilder { /// The literal string to append. -pub fn literal(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.literal = ::std::option::Option::Some(input.into()); - self -} -/// The literal string to append. -pub fn set_literal(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.literal = input; - self -} -/// The literal string to append. -pub fn get_literal(&self) -> &::std::option::Option<::std::string::String> { - &self.literal -} + pub fn literal(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.literal = ::std::option::Option::Some(input.into()); + self + } + /// The literal string to append. + pub fn set_literal(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.literal = input; + self + } + /// The literal string to append. + pub fn get_literal(&self) -> &::std::option::Option<::std::string::String> { + &self.literal + } /// Consumes the builder and constructs a [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_literal(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert { - literal: self.literal, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert { + literal: self.literal, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_override.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_override.rs index 34866b67a..6e15c1aa4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_override.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_override.rs @@ -16,25 +16,40 @@ pub policy: ::std::option::Option &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// This input is not used in the Java Client and should not be specified. -pub fn default_attribute_flag(&self) -> &::std::option::Option { - &self.default_attribute_flag -} -/// A configuration for the legacy DynamoDB Encryption Client's Encryptor. -pub fn encryptor(&self) -> &::std::option::Option { - &self.encryptor -} -/// A policy which configurates whether legacy behavior overrides encryption and/or decryption. -pub fn policy(&self) -> &::std::option::Option { - &self.policy -} + pub fn attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// This input is not used in the Java Client and should not be specified. + pub fn default_attribute_flag( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + > { + &self.default_attribute_flag + } + /// A configuration for the legacy DynamoDB Encryption Client's Encryptor. + pub fn encryptor(&self) -> &::std::option::Option{ + &self.encryptor + } + /// A policy which configurates whether legacy behavior overrides encryption and/or decryption. + pub fn policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, + > { + &self.policy + } } impl LegacyOverride { /// Creates a new builder-style object to manufacture [`LegacyOverride`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LegacyOverrideBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LegacyOverrideBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LegacyOverrideBuilder::default() } } @@ -52,61 +67,108 @@ pub(crate) policy: ::std::option::Option>) -> Self { - self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); - self -} -/// Overrides which attributes are encrypted and/or signed for any items read or written with legacy behavior. -pub fn set_attribute_actions_on_encrypt(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = input; - self -} -/// Overrides which attributes are encrypted and/or signed for any items read or written with legacy behavior. -pub fn get_attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// This input is not used in the Java Client and should not be specified. -pub fn default_attribute_flag(mut self, input: impl ::std::convert::Into) -> Self { - self.default_attribute_flag = ::std::option::Option::Some(input.into()); - self -} -/// This input is not used in the Java Client and should not be specified. -pub fn set_default_attribute_flag(mut self, input: ::std::option::Option) -> Self { - self.default_attribute_flag = input; - self -} -/// This input is not used in the Java Client and should not be specified. -pub fn get_default_attribute_flag(&self) -> &::std::option::Option { - &self.default_attribute_flag -} -/// A configuration for the legacy DynamoDB Encryption Client's Encryptor. -pub fn encryptor(mut self, input: impl ::std::convert::Into) -> Self { - self.encryptor = ::std::option::Option::Some(input.into()); - self -} -/// A configuration for the legacy DynamoDB Encryption Client's Encryptor. -pub fn set_encryptor(mut self, input: ::std::option::Option) -> Self { - self.encryptor = input; - self -} -/// A configuration for the legacy DynamoDB Encryption Client's Encryptor. -pub fn get_encryptor(&self) -> &::std::option::Option { - &self.encryptor -} -/// A policy which configurates whether legacy behavior overrides encryption and/or decryption. -pub fn policy(mut self, input: impl ::std::convert::Into) -> Self { - self.policy = ::std::option::Option::Some(input.into()); - self -} -/// A policy which configurates whether legacy behavior overrides encryption and/or decryption. -pub fn set_policy(mut self, input: ::std::option::Option) -> Self { - self.policy = input; - self -} -/// A policy which configurates whether legacy behavior overrides encryption and/or decryption. -pub fn get_policy(&self) -> &::std::option::Option { - &self.policy -} + pub fn attribute_actions_on_encrypt( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); + self + } + /// Overrides which attributes are encrypted and/or signed for any items read or written with legacy behavior. + pub fn set_attribute_actions_on_encrypt( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = input; + self + } + /// Overrides which attributes are encrypted and/or signed for any items read or written with legacy behavior. + pub fn get_attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// This input is not used in the Java Client and should not be specified. + pub fn default_attribute_flag( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + ) -> Self { + self.default_attribute_flag = ::std::option::Option::Some(input.into()); + self + } + /// This input is not used in the Java Client and should not be specified. + pub fn set_default_attribute_flag( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + ) -> Self { + self.default_attribute_flag = input; + self + } + /// This input is not used in the Java Client and should not be specified. + pub fn get_default_attribute_flag( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + > { + &self.default_attribute_flag + } + /// A configuration for the legacy DynamoDB Encryption Client's Encryptor. + pub fn encryptor( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.encryptor = ::std::option::Option::Some(input.into()); + self + } + /// A configuration for the legacy DynamoDB Encryption Client's Encryptor. + pub fn set_encryptor( + mut self, + input: ::std::option::Option, + ) -> Self { + self.encryptor = input; + self + } + /// A configuration for the legacy DynamoDB Encryption Client's Encryptor. + pub fn get_encryptor(&self) -> &::std::option::Option{ + &self.encryptor + } + /// A policy which configurates whether legacy behavior overrides encryption and/or decryption. + pub fn policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, + >, + ) -> Self { + self.policy = ::std::option::Option::Some(input.into()); + self + } + /// A policy which configurates whether legacy behavior overrides encryption and/or decryption. + pub fn set_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, + >, + ) -> Self { + self.policy = input; + self + } + /// A policy which configurates whether legacy behavior overrides encryption and/or decryption. + pub fn get_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, + > { + &self.policy + } /// Consumes the builder and constructs a [`LegacyOverride`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride). pub fn build( self, @@ -114,11 +176,13 @@ pub fn get_policy(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride { - attribute_actions_on_encrypt: self.attribute_actions_on_encrypt, -default_attribute_flag: self.default_attribute_flag, -encryptor: self.encryptor, -policy: self.policy, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride { + attribute_actions_on_encrypt: self.attribute_actions_on_encrypt, + default_attribute_flag: self.default_attribute_flag, + encryptor: self.encryptor, + policy: self.policy, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_policy.rs index fc3e716dd..ed6d839d2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_legacy_policy.rs @@ -5,16 +5,22 @@ #[allow(missing_docs)] pub enum LegacyPolicy { ForceLegacyEncryptAllowLegacyDecrypt, -ForbidLegacyEncryptAllowLegacyDecrypt, -ForbidLegacyEncryptForbidLegacyDecrypt, + ForbidLegacyEncryptAllowLegacyDecrypt, + ForbidLegacyEncryptForbidLegacyDecrypt, } impl ::std::fmt::Display for LegacyPolicy { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - LegacyPolicy::ForceLegacyEncryptAllowLegacyDecrypt => write!(f, "FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT"), -LegacyPolicy::ForbidLegacyEncryptAllowLegacyDecrypt => write!(f, "FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT"), -LegacyPolicy::ForbidLegacyEncryptForbidLegacyDecrypt => write!(f, "FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT"), + LegacyPolicy::ForceLegacyEncryptAllowLegacyDecrypt => { + write!(f, "FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT") + } + LegacyPolicy::ForbidLegacyEncryptAllowLegacyDecrypt => { + write!(f, "FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT") + } + LegacyPolicy::ForbidLegacyEncryptForbidLegacyDecrypt => { + write!(f, "FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT") + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_lower.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_lower.rs index 6f8b00193..17e9681ee 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_lower.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_lower.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// The Virtual Part Transformation that converts ASCII characters to lower case. -pub struct Lower { - -} -impl Lower { - -} +pub struct Lower {} +impl Lower {} impl Lower { /// Creates a new builder-style object to manufacture [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LowerBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LowerBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::LowerBuilder::default() } } @@ -22,11 +19,8 @@ impl Lower { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct LowerBuilder { - -} +pub struct LowerBuilder {} impl LowerBuilder { - /// Consumes the builder and constructs a [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower). pub fn build( self, @@ -34,8 +28,8 @@ impl LowerBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_multi_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_multi_key_store.rs index 95d49b4ee..e9e7e5f38 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_multi_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_multi_key_store.rs @@ -6,29 +6,41 @@ /// The configuration for using multiple Beacon Keys. pub struct MultiKeyStore { /// Which type of local cache to use. -pub cache: ::std::option::Option, -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub cache_ttl: ::std::option::Option<::std::primitive::i32>, -/// The name of the field that stores the Beacon Key. This may be a Virtual Field. -pub key_field_name: ::std::option::Option<::std::string::String>, + pub cache: + ::std::option::Option, + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub cache_ttl: ::std::option::Option<::std::primitive::i32>, + /// The name of the field that stores the Beacon Key. This may be a Virtual Field. + pub key_field_name: ::std::option::Option<::std::string::String>, + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub partition_id: ::std::option::Option<::std::string::String>, } impl MultiKeyStore { /// Which type of local cache to use. -pub fn cache(&self) -> &::std::option::Option { - &self.cache -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.cache_ttl -} -/// The name of the field that stores the Beacon Key. This may be a Virtual Field. -pub fn key_field_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_field_name -} + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.cache_ttl + } + /// The name of the field that stores the Beacon Key. This may be a Virtual Field. + pub fn key_field_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_field_name + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } } impl MultiKeyStore { /// Creates a new builder-style object to manufacture [`MultiKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::MultiKeyStoreBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::MultiKeyStoreBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::MultiKeyStoreBuilder::default() } } @@ -39,53 +51,88 @@ impl MultiKeyStore { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct MultiKeyStoreBuilder { - pub(crate) cache: ::std::option::Option, -pub(crate) cache_ttl: ::std::option::Option<::std::primitive::i32>, -pub(crate) key_field_name: ::std::option::Option<::std::string::String>, + pub(crate) cache: + ::std::option::Option, + pub(crate) cache_ttl: ::std::option::Option<::std::primitive::i32>, + pub(crate) key_field_name: ::std::option::Option<::std::string::String>, + pub(crate) partition_id: ::std::option::Option<::std::string::String>, } impl MultiKeyStoreBuilder { /// Which type of local cache to use. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.cache = ::std::option::Option::Some(input.into()); - self -} -/// Which type of local cache to use. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.cache = input; - self -} -/// Which type of local cache to use. -pub fn get_cache(&self) -> &::std::option::Option { - &self.cache -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn cache_ttl(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.cache_ttl = ::std::option::Option::Some(input.into()); - self -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn set_cache_ttl(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.cache_ttl = input; - self -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn get_cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.cache_ttl -} -/// The name of the field that stores the Beacon Key. This may be a Virtual Field. -pub fn key_field_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_field_name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the field that stores the Beacon Key. This may be a Virtual Field. -pub fn set_key_field_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_field_name = input; - self -} -/// The name of the field that stores the Beacon Key. This may be a Virtual Field. -pub fn get_key_field_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_field_name -} + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Which type of local cache to use. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Which type of local cache to use. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn cache_ttl(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.cache_ttl = ::std::option::Option::Some(input.into()); + self + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn set_cache_ttl(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.cache_ttl = input; + self + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn get_cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.cache_ttl + } + /// The name of the field that stores the Beacon Key. This may be a Virtual Field. + pub fn key_field_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_field_name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the field that stores the Beacon Key. This may be a Virtual Field. + pub fn set_key_field_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_field_name = input; + self + } + /// The name of the field that stores the Beacon Key. This may be a Virtual Field. + pub fn get_key_field_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_field_name + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.partition_id = ::std::option::Option::Some(input.into()); + self + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.partition_id = input; + self + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } /// Consumes the builder and constructs a [`MultiKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore). pub fn build( self, @@ -93,10 +140,13 @@ pub fn get_key_field_name(&self) -> &::std::option::Option<::std::string::String crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore { - cache: self.cache, -cache_ttl: self.cache_ttl, -key_field_name: self.key_field_name, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::MultiKeyStore { + cache: self.cache, + cache_ttl: self.cache_ttl, + key_field_name: self.key_field_name, + partition_id: self.partition_id, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_part_only.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_part_only.rs index d11e93d84..b952bcaa2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_part_only.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_part_only.rs @@ -4,15 +4,13 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// Attribute must be used as part of a Compound Beacon, never alone. -pub struct PartOnly { - -} -impl PartOnly { - -} +pub struct PartOnly {} +impl PartOnly {} impl PartOnly { /// Creates a new builder-style object to manufacture [`PartOnly`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::PartOnlyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::PartOnlyBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::PartOnlyBuilder::default() } } @@ -22,11 +20,8 @@ impl PartOnly { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct PartOnlyBuilder { - -} +pub struct PartOnlyBuilder {} impl PartOnlyBuilder { - /// Consumes the builder and constructs a [`PartOnly`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly). pub fn build( self, @@ -34,8 +29,8 @@ impl PartOnlyBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PartOnly {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_plaintext_override.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_plaintext_override.rs index fa3da4575..de5de9e43 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_plaintext_override.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_plaintext_override.rs @@ -5,16 +5,22 @@ #[allow(missing_docs)] pub enum PlaintextOverride { ForcePlaintextWriteAllowPlaintextRead, -ForbidPlaintextWriteAllowPlaintextRead, -ForbidPlaintextWriteForbidPlaintextRead, + ForbidPlaintextWriteAllowPlaintextRead, + ForbidPlaintextWriteForbidPlaintextRead, } impl ::std::fmt::Display for PlaintextOverride { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - PlaintextOverride::ForcePlaintextWriteAllowPlaintextRead => write!(f, "FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ"), -PlaintextOverride::ForbidPlaintextWriteAllowPlaintextRead => write!(f, "FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ"), -PlaintextOverride::ForbidPlaintextWriteForbidPlaintextRead => write!(f, "FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ"), + PlaintextOverride::ForcePlaintextWriteAllowPlaintextRead => { + write!(f, "FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ") + } + PlaintextOverride::ForbidPlaintextWriteAllowPlaintextRead => { + write!(f, "FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ") + } + PlaintextOverride::ForbidPlaintextWriteForbidPlaintextRead => { + write!(f, "FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ") + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_search_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_search_config.rs index c23b05749..d92c91bd6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_search_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_search_config.rs @@ -6,23 +6,35 @@ /// The configuration for searchable encryption. pub struct SearchConfig { /// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. -pub versions: ::std::option::Option<::std::vec::Vec>, -/// The searchable encryption version to use when writing new items. Must be '1'. -pub write_version: ::std::option::Option<::std::primitive::i32>, + pub versions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + >, + /// The searchable encryption version to use when writing new items. Must be '1'. + pub write_version: ::std::option::Option<::std::primitive::i32>, } impl SearchConfig { /// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. -pub fn versions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.versions -} -/// The searchable encryption version to use when writing new items. Must be '1'. -pub fn write_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.write_version -} + pub fn versions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + > { + &self.versions + } + /// The searchable encryption version to use when writing new items. Must be '1'. + pub fn write_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.write_version + } } impl SearchConfig { /// Creates a new builder-style object to manufacture [`SearchConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SearchConfigBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SearchConfigBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SearchConfigBuilder::default() } } @@ -33,38 +45,68 @@ impl SearchConfig { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct SearchConfigBuilder { - pub(crate) versions: ::std::option::Option<::std::vec::Vec>, -pub(crate) write_version: ::std::option::Option<::std::primitive::i32>, + pub(crate) versions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + >, + pub(crate) write_version: ::std::option::Option<::std::primitive::i32>, } impl SearchConfigBuilder { /// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. -pub fn versions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.versions = ::std::option::Option::Some(input.into()); - self -} -/// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. -pub fn set_versions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.versions = input; - self -} -/// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. -pub fn get_versions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.versions -} -/// The searchable encryption version to use when writing new items. Must be '1'. -pub fn write_version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.write_version = ::std::option::Option::Some(input.into()); - self -} -/// The searchable encryption version to use when writing new items. Must be '1'. -pub fn set_write_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.write_version = input; - self -} -/// The searchable encryption version to use when writing new items. Must be '1'. -pub fn get_write_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.write_version -} + pub fn versions( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + >, + ) -> Self { + self.versions = ::std::option::Option::Some(input.into()); + self + } + /// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. + pub fn set_versions( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + >, + ) -> Self { + self.versions = input; + self + } + /// The versions of searchable encryption to support reading. Currently must contain a single configuration with version '1'. + pub fn get_versions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconVersion, + >, + > { + &self.versions + } + /// The searchable encryption version to use when writing new items. Must be '1'. + pub fn write_version( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.write_version = ::std::option::Option::Some(input.into()); + self + } + /// The searchable encryption version to use when writing new items. Must be '1'. + pub fn set_write_version( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.write_version = input; + self + } + /// The searchable encryption version to use when writing new items. Must be '1'. + pub fn get_write_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.write_version + } /// Consumes the builder and constructs a [`SearchConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig). pub fn build( self, @@ -72,9 +114,11 @@ pub fn get_write_version(&self) -> &::std::option::Option<::std::primitive::i32> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig { - versions: self.versions, -write_version: self.write_version, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SearchConfig { + versions: self.versions, + write_version: self.write_version, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared.rs index 5672b1253..f9a3061f7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared.rs @@ -6,17 +6,19 @@ /// This beacon should calculate values like another beacon, so they can be compared. pub struct Shared { /// Calculate beacon values as for this beacon. -pub other: ::std::option::Option<::std::string::String>, + pub other: ::std::option::Option<::std::string::String>, } impl Shared { /// Calculate beacon values as for this beacon. -pub fn other(&self) -> &::std::option::Option<::std::string::String> { - &self.other -} + pub fn other(&self) -> &::std::option::Option<::std::string::String> { + &self.other + } } impl Shared { /// Creates a new builder-style object to manufacture [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedBuilder::default() } } @@ -31,19 +33,19 @@ pub struct SharedBuilder { } impl SharedBuilder { /// Calculate beacon values as for this beacon. -pub fn other(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.other = ::std::option::Option::Some(input.into()); - self -} -/// Calculate beacon values as for this beacon. -pub fn set_other(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.other = input; - self -} -/// Calculate beacon values as for this beacon. -pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { - &self.other -} + pub fn other(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.other = ::std::option::Option::Some(input.into()); + self + } + /// Calculate beacon values as for this beacon. + pub fn set_other(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.other = input; + self + } + /// Calculate beacon values as for this beacon. + pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { + &self.other + } /// Consumes the builder and constructs a [`Shared`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared { - other: self.other, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Shared { + other: self.other, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared_set.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared_set.rs index 1ba51c1ca..c8e0c67f4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared_set.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_shared_set.rs @@ -6,17 +6,19 @@ /// Both Shared and AsSet. pub struct SharedSet { /// Calculate beacon values as for this beacon. -pub other: ::std::option::Option<::std::string::String>, + pub other: ::std::option::Option<::std::string::String>, } impl SharedSet { /// Calculate beacon values as for this beacon. -pub fn other(&self) -> &::std::option::Option<::std::string::String> { - &self.other -} + pub fn other(&self) -> &::std::option::Option<::std::string::String> { + &self.other + } } impl SharedSet { /// Creates a new builder-style object to manufacture [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedSetBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedSetBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SharedSetBuilder::default() } } @@ -31,19 +33,19 @@ pub struct SharedSetBuilder { } impl SharedSetBuilder { /// Calculate beacon values as for this beacon. -pub fn other(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.other = ::std::option::Option::Some(input.into()); - self -} -/// Calculate beacon values as for this beacon. -pub fn set_other(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.other = input; - self -} -/// Calculate beacon values as for this beacon. -pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { - &self.other -} + pub fn other(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.other = ::std::option::Option::Some(input.into()); + self + } + /// Calculate beacon values as for this beacon. + pub fn set_other(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.other = input; + self + } + /// Calculate beacon values as for this beacon. + pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { + &self.other + } /// Consumes the builder and constructs a [`SharedSet`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_other(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet { - other: self.other, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SharedSet { + other: self.other, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_signed_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_signed_part.rs index 8a192bdcb..26400ef58 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_signed_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_signed_part.rs @@ -6,29 +6,31 @@ /// A part of a Compound Beacon that contains signed plaintext data. pub struct SignedPart { /// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. -pub loc: ::std::option::Option<::std::string::String>, -/// The name for this Signed Part. -pub name: ::std::option::Option<::std::string::String>, -/// The prefix that is written with this Signed Part. -pub prefix: ::std::option::Option<::std::string::String>, + pub loc: ::std::option::Option<::std::string::String>, + /// The name for this Signed Part. + pub name: ::std::option::Option<::std::string::String>, + /// The prefix that is written with this Signed Part. + pub prefix: ::std::option::Option<::std::string::String>, } impl SignedPart { /// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. -pub fn loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// The name for this Signed Part. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The prefix that is written with this Signed Part. -pub fn prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.prefix -} + pub fn loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// The name for this Signed Part. + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The prefix that is written with this Signed Part. + pub fn prefix(&self) -> &::std::option::Option<::std::string::String> { + &self.prefix + } } impl SignedPart { /// Creates a new builder-style object to manufacture [`SignedPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SignedPartBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SignedPartBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SignedPartBuilder::default() } } @@ -40,52 +42,52 @@ impl SignedPart { )] pub struct SignedPartBuilder { pub(crate) loc: ::std::option::Option<::std::string::String>, -pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) prefix: ::std::option::Option<::std::string::String>, + pub(crate) name: ::std::option::Option<::std::string::String>, + pub(crate) prefix: ::std::option::Option<::std::string::String>, } impl SignedPartBuilder { /// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. -pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.loc = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. -pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.loc = input; - self -} -/// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. -pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// The name for this Signed Part. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name for this Signed Part. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name for this Signed Part. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The prefix that is written with this Signed Part. -pub fn prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.prefix = ::std::option::Option::Some(input.into()); - self -} -/// The prefix that is written with this Signed Part. -pub fn set_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.prefix = input; - self -} -/// The prefix that is written with this Signed Part. -pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.prefix -} + pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.loc = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. + pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.loc = input; + self + } + /// The DynamoDB document path to the value for this Signed Part. If not provided, the 'name' is used for the location. + pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// The name for this Signed Part. + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name for this Signed Part. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name for this Signed Part. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The prefix that is written with this Signed Part. + pub fn prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.prefix = ::std::option::Option::Some(input.into()); + self + } + /// The prefix that is written with this Signed Part. + pub fn set_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.prefix = input; + self + } + /// The prefix that is written with this Signed Part. + pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { + &self.prefix + } /// Consumes the builder and constructs a [`SignedPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart). pub fn build( self, @@ -93,10 +95,12 @@ pub fn get_prefix(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart { - loc: self.loc, -name: self.name, -prefix: self.prefix, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SignedPart { + loc: self.loc, + name: self.name, + prefix: self.prefix, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_single_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_single_key_store.rs index a71eeeb3a..f25cd2a74 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_single_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_single_key_store.rs @@ -5,24 +5,40 @@ #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// The configuration for using a single Beacon Key. pub struct SingleKeyStore { + /// Which type of local cache to use. Please see the [spec](https://github.com/aws/aws-database-encryption-sdk-dynamodb/blob/main/specification/searchable-encryption/search-config.md#key-store-cache) on how to provide a cache for a SingleKeyStore. + pub cache: + ::std::option::Option, /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub cache_ttl: ::std::option::Option<::std::primitive::i32>, -/// The Beacon Key ID. -pub key_id: ::std::option::Option<::std::string::String>, + pub cache_ttl: ::std::option::Option<::std::primitive::i32>, + /// The Beacon Key ID. + pub key_id: ::std::option::Option<::std::string::String>, + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub partition_id: ::std::option::Option<::std::string::String>, } impl SingleKeyStore { + /// Which type of local cache to use. Please see the [spec](https://github.com/aws/aws-database-encryption-sdk-dynamodb/blob/main/specification/searchable-encryption/search-config.md#key-store-cache) on how to provide a cache for a SingleKeyStore. + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.cache_ttl -} -/// The Beacon Key ID. -pub fn key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_id -} + pub fn cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.cache_ttl + } + /// The Beacon Key ID. + pub fn key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_id + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } } impl SingleKeyStore { /// Creates a new builder-style object to manufacture [`SingleKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SingleKeyStoreBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SingleKeyStoreBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::SingleKeyStoreBuilder::default() } } @@ -33,38 +49,82 @@ impl SingleKeyStore { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct SingleKeyStoreBuilder { + pub(crate) cache: + ::std::option::Option, pub(crate) cache_ttl: ::std::option::Option<::std::primitive::i32>, -pub(crate) key_id: ::std::option::Option<::std::string::String>, + pub(crate) key_id: ::std::option::Option<::std::string::String>, + pub(crate) partition_id: ::std::option::Option<::std::string::String>, } impl SingleKeyStoreBuilder { + /// Which type of local cache to use. Please see the [spec](https://github.com/aws/aws-database-encryption-sdk-dynamodb/blob/main/specification/searchable-encryption/search-config.md#key-store-cache) on how to provide a cache for a SingleKeyStore. + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Which type of local cache to use. Please see the [spec](https://github.com/aws/aws-database-encryption-sdk-dynamodb/blob/main/specification/searchable-encryption/search-config.md#key-store-cache) on how to provide a cache for a SingleKeyStore. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Which type of local cache to use. Please see the [spec](https://github.com/aws/aws-database-encryption-sdk-dynamodb/blob/main/specification/searchable-encryption/search-config.md#key-store-cache) on how to provide a cache for a SingleKeyStore. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn cache_ttl(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.cache_ttl = ::std::option::Option::Some(input.into()); - self -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn set_cache_ttl(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.cache_ttl = input; - self -} -/// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. -pub fn get_cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.cache_ttl -} -/// The Beacon Key ID. -pub fn key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_id = ::std::option::Option::Some(input.into()); - self -} -/// The Beacon Key ID. -pub fn set_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_id = input; - self -} -/// The Beacon Key ID. -pub fn get_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_id -} + pub fn cache_ttl(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.cache_ttl = ::std::option::Option::Some(input.into()); + self + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn set_cache_ttl(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.cache_ttl = input; + self + } + /// How long (in seconds) the beacon key material is cached locally before it is re-retrieved from DynamoDB and re-authed with AWS KMS. + pub fn get_cache_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.cache_ttl + } + /// The Beacon Key ID. + pub fn key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_id = ::std::option::Option::Some(input.into()); + self + } + /// The Beacon Key ID. + pub fn set_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_id = input; + self + } + /// The Beacon Key ID. + pub fn get_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_id + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.partition_id = ::std::option::Option::Some(input.into()); + self + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.partition_id = input; + self + } + /// Partition ID to distinguish Beacon Key Sources writing to a Shared cache. If the Partition ID is the same for two Beacon Key Sources, they can share the same cache entries in the Shared cache. + pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } /// Consumes the builder and constructs a [`SingleKeyStore`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore). pub fn build( self, @@ -72,9 +132,13 @@ pub fn get_key_id(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore { - cache_ttl: self.cache_ttl, -key_id: self.key_id, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::SingleKeyStore { + cache: self.cache, + cache_ttl: self.cache_ttl, + key_id: self.key_id, + partition_id: self.partition_id, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_standard_beacon.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_standard_beacon.rs index 1e0cdd4d5..f41abfa89 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_standard_beacon.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_standard_beacon.rs @@ -6,35 +6,41 @@ /// The configuration for a Standard Beacon. pub struct StandardBeacon { /// The length of the calculated beacon. -pub length: ::std::option::Option<::std::primitive::i32>, -/// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. -pub loc: ::std::option::Option<::std::string::String>, -/// The name for this Standard Beacon. -pub name: ::std::option::Option<::std::string::String>, -/// Optional augmented behavior. -pub style: ::std::option::Option, + pub length: ::std::option::Option<::std::primitive::i32>, + /// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. + pub loc: ::std::option::Option<::std::string::String>, + /// The name for this Standard Beacon. + pub name: ::std::option::Option<::std::string::String>, + /// Optional augmented behavior. + pub style: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + >, } impl StandardBeacon { /// The length of the calculated beacon. -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} -/// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. -pub fn loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// The name for this Standard Beacon. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// Optional augmented behavior. -pub fn style(&self) -> &::std::option::Option { - &self.style -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } + /// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. + pub fn loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// The name for this Standard Beacon. + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// Optional augmented behavior. + pub fn style( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + > { + &self.style + } } impl StandardBeacon { /// Creates a new builder-style object to manufacture [`StandardBeacon`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::StandardBeaconBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::StandardBeaconBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::StandardBeaconBuilder::default() } } @@ -46,67 +52,83 @@ impl StandardBeacon { )] pub struct StandardBeaconBuilder { pub(crate) length: ::std::option::Option<::std::primitive::i32>, -pub(crate) loc: ::std::option::Option<::std::string::String>, -pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) style: ::std::option::Option, + pub(crate) loc: ::std::option::Option<::std::string::String>, + pub(crate) name: ::std::option::Option<::std::string::String>, + pub(crate) style: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + >, } impl StandardBeaconBuilder { /// The length of the calculated beacon. -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -/// The length of the calculated beacon. -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -/// The length of the calculated beacon. -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} -/// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. -pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.loc = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. -pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.loc = input; - self -} -/// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. -pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// The name for this Standard Beacon. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name for this Standard Beacon. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name for this Standard Beacon. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// Optional augmented behavior. -pub fn style(mut self, input: impl ::std::convert::Into) -> Self { - self.style = ::std::option::Option::Some(input.into()); - self -} -/// Optional augmented behavior. -pub fn set_style(mut self, input: ::std::option::Option) -> Self { - self.style = input; - self -} -/// Optional augmented behavior. -pub fn get_style(&self) -> &::std::option::Option { - &self.style -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + /// The length of the calculated beacon. + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + /// The length of the calculated beacon. + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } + /// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. + pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.loc = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. + pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.loc = input; + self + } + /// The DynamoDB document path to the value this beacon will calculate over. If not specified, the beacon will calculate values for the attribute with the name specified in 'name'. + pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// The name for this Standard Beacon. + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name for this Standard Beacon. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name for this Standard Beacon. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// Optional augmented behavior. + pub fn style( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + >, + ) -> Self { + self.style = ::std::option::Option::Some(input.into()); + self + } + /// Optional augmented behavior. + pub fn set_style( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + >, + ) -> Self { + self.style = input; + self + } + /// Optional augmented behavior. + pub fn get_style( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::BeaconStyle, + > { + &self.style + } /// Consumes the builder and constructs a [`StandardBeacon`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon). pub fn build( self, @@ -114,11 +136,13 @@ pub fn get_style(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon { - length: self.length, -loc: self.loc, -name: self.name, -style: self.style, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::StandardBeacon { + length: self.length, + loc: self.loc, + name: self.name, + style: self.style, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_upper.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_upper.rs index b573e4a1f..b891481ab 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_upper.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_upper.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// The Virtual Part Transformation that converts ASCII characters to upper case. -pub struct Upper { - -} -impl Upper { - -} +pub struct Upper {} +impl Upper {} impl Upper { /// Creates a new builder-style object to manufacture [`Upper`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::UpperBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::UpperBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::UpperBuilder::default() } } @@ -22,11 +19,8 @@ impl Upper { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UpperBuilder { - -} +pub struct UpperBuilder {} impl UpperBuilder { - /// Consumes the builder and constructs a [`Upper`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper). pub fn build( self, @@ -34,8 +28,8 @@ impl UpperBuilder { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_field.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_field.rs index e95519a57..8b0464def 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_field.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_field.rs @@ -6,23 +6,31 @@ /// The configuration for a Virtual Field. A Virtual Field is a field constructed from parts of other fields for use with beacons, but never itself stored on items. pub struct VirtualField { /// The name of the Virtual Field. -pub name: ::std::option::Option<::std::string::String>, -/// The list of ordered parts that make up a Virtual Field. -pub parts: ::std::option::Option<::std::vec::Vec>, + pub name: ::std::option::Option<::std::string::String>, + /// The list of ordered parts that make up a Virtual Field. + pub parts: ::std::option::Option< + ::std::vec::Vec, + >, } impl VirtualField { /// The name of the Virtual Field. -pub fn name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The list of ordered parts that make up a Virtual Field. -pub fn parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.parts -} + pub fn name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The list of ordered parts that make up a Virtual Field. + pub fn parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.parts + } } impl VirtualField { /// Creates a new builder-style object to manufacture [`VirtualField`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualFieldBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualFieldBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualFieldBuilder::default() } } @@ -34,37 +42,57 @@ impl VirtualField { )] pub struct VirtualFieldBuilder { pub(crate) name: ::std::option::Option<::std::string::String>, -pub(crate) parts: ::std::option::Option<::std::vec::Vec>, + pub(crate) parts: ::std::option::Option< + ::std::vec::Vec, + >, } impl VirtualFieldBuilder { /// The name of the Virtual Field. -pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the Virtual Field. -pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.name = input; - self -} -/// The name of the Virtual Field. -pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { - &self.name -} -/// The list of ordered parts that make up a Virtual Field. -pub fn parts(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.parts = ::std::option::Option::Some(input.into()); - self -} -/// The list of ordered parts that make up a Virtual Field. -pub fn set_parts(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.parts = input; - self -} -/// The list of ordered parts that make up a Virtual Field. -pub fn get_parts(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.parts -} + pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the Virtual Field. + pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.name = input; + self + } + /// The name of the Virtual Field. + pub fn get_name(&self) -> &::std::option::Option<::std::string::String> { + &self.name + } + /// The list of ordered parts that make up a Virtual Field. + pub fn parts( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart, + >, + >, + ) -> Self { + self.parts = ::std::option::Option::Some(input.into()); + self + } + /// The list of ordered parts that make up a Virtual Field. + pub fn set_parts( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart, + >, + >, + ) -> Self { + self.parts = input; + self + } + /// The list of ordered parts that make up a Virtual Field. + pub fn get_parts( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.parts + } /// Consumes the builder and constructs a [`VirtualField`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField). pub fn build( self, @@ -72,9 +100,11 @@ pub fn get_parts(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField { - name: self.name, -parts: self.parts, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualField { + name: self.name, + parts: self.parts, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_part.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_part.rs index 11a3df973..26fae7ae2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_part.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_part.rs @@ -6,23 +6,35 @@ /// A Virtual Part is the configuration of a transformation on an existing field in an item. pub struct VirtualPart { /// The DynamoDB document path to the value for this part. -pub loc: ::std::option::Option<::std::string::String>, -/// A list of transformations performed on the value for this part. -pub trans: ::std::option::Option<::std::vec::Vec>, + pub loc: ::std::option::Option<::std::string::String>, + /// A list of transformations performed on the value for this part. + pub trans: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + >, } impl VirtualPart { /// The DynamoDB document path to the value for this part. -pub fn loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// A list of transformations performed on the value for this part. -pub fn trans(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.trans -} + pub fn loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// A list of transformations performed on the value for this part. + pub fn trans( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + > { + &self.trans + } } impl VirtualPart { /// Creates a new builder-style object to manufacture [`VirtualPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualPartBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualPartBuilder + { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::builders::VirtualPartBuilder::default() } } @@ -34,37 +46,61 @@ impl VirtualPart { )] pub struct VirtualPartBuilder { pub(crate) loc: ::std::option::Option<::std::string::String>, -pub(crate) trans: ::std::option::Option<::std::vec::Vec>, + pub(crate) trans: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + >, } impl VirtualPartBuilder { /// The DynamoDB document path to the value for this part. -pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.loc = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB document path to the value for this part. -pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.loc = input; - self -} -/// The DynamoDB document path to the value for this part. -pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { - &self.loc -} -/// A list of transformations performed on the value for this part. -pub fn trans(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.trans = ::std::option::Option::Some(input.into()); - self -} -/// A list of transformations performed on the value for this part. -pub fn set_trans(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.trans = input; - self -} -/// A list of transformations performed on the value for this part. -pub fn get_trans(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.trans -} + pub fn loc(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.loc = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB document path to the value for this part. + pub fn set_loc(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.loc = input; + self + } + /// The DynamoDB document path to the value for this part. + pub fn get_loc(&self) -> &::std::option::Option<::std::string::String> { + &self.loc + } + /// A list of transformations performed on the value for this part. + pub fn trans( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + >, + ) -> Self { + self.trans = ::std::option::Option::Some(input.into()); + self + } + /// A list of transformations performed on the value for this part. + pub fn set_trans( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + >, + ) -> Self { + self.trans = input; + self + } + /// A list of transformations performed on the value for this part. + pub fn get_trans( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform, + >, + > { + &self.trans + } /// Consumes the builder and constructs a [`VirtualPart`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart). pub fn build( self, @@ -72,9 +108,11 @@ pub fn get_trans(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart { - loc: self.loc, -trans: self.trans, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualPart { + loc: self.loc, + trans: self.trans, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_transform.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_transform.rs index 6233ebe55..3f554490c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_transform.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/_virtual_transform.rs @@ -6,21 +6,21 @@ #[allow(missing_docs)] pub enum VirtualTransform { #[allow(missing_docs)] -Upper(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper), -#[allow(missing_docs)] -Lower(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower), -#[allow(missing_docs)] -Insert(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert), -#[allow(missing_docs)] -Prefix(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix), -#[allow(missing_docs)] -Suffix(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix), -#[allow(missing_docs)] -Substring(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring), -#[allow(missing_docs)] -Segment(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment), -#[allow(missing_docs)] -Segments(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments), + Upper(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper), + #[allow(missing_docs)] + Lower(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower), + #[allow(missing_docs)] + Insert(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert), + #[allow(missing_docs)] + Prefix(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix), + #[allow(missing_docs)] + Suffix(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix), + #[allow(missing_docs)] + Substring(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring), + #[allow(missing_docs)] + Segment(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment), + #[allow(missing_docs)] + Segments(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -33,109 +33,149 @@ Segments(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegme } impl VirtualTransform { /// Tries to convert the enum instance into [`Upper`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_upper(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_upper( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Upper, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_lower(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower(val) = &self { + } + /// Tries to convert the enum instance into [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_lower( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Lower, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_insert(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert(val) = &self { + } + /// Tries to convert the enum instance into [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_insert( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::Insert, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Prefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_prefix(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix(val) = &self { + } + /// Tries to convert the enum instance into [`Prefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_prefix( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetPrefix, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Suffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_suffix(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix(val) = &self { + } + /// Tries to convert the enum instance into [`Suffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_suffix( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSuffix, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Substring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_substring(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring(val) = &self { + } + /// Tries to convert the enum instance into [`Substring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_substring( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSubstring, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Segment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_segment(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment(val) = &self { + } + /// Tries to convert the enum instance into [`Segment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_segment( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegment, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`Segments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_segments(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments(val) = &self { + } + /// Tries to convert the enum instance into [`Segments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_segments( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetSegments, + &Self, + > { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`Upper`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Upper). -pub fn is_upper(&self) -> ::std::primitive::bool { - self.as_upper().is_ok() -} -/// Returns true if this is a [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower). -pub fn is_lower(&self) -> ::std::primitive::bool { - self.as_lower().is_ok() -} -/// Returns true if this is a [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert). -pub fn is_insert(&self) -> ::std::primitive::bool { - self.as_insert().is_ok() -} -/// Returns true if this is a [`Prefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix). -pub fn is_prefix(&self) -> ::std::primitive::bool { - self.as_prefix().is_ok() -} -/// Returns true if this is a [`Suffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix). -pub fn is_suffix(&self) -> ::std::primitive::bool { - self.as_suffix().is_ok() -} -/// Returns true if this is a [`Substring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring). -pub fn is_substring(&self) -> ::std::primitive::bool { - self.as_substring().is_ok() -} -/// Returns true if this is a [`Segment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment). -pub fn is_segment(&self) -> ::std::primitive::bool { - self.as_segment().is_ok() -} -/// Returns true if this is a [`Segments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments). -pub fn is_segments(&self) -> ::std::primitive::bool { - self.as_segments().is_ok() -} + pub fn is_upper(&self) -> ::std::primitive::bool { + self.as_upper().is_ok() + } + /// Returns true if this is a [`Lower`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Lower). + pub fn is_lower(&self) -> ::std::primitive::bool { + self.as_lower().is_ok() + } + /// Returns true if this is a [`Insert`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Insert). + pub fn is_insert(&self) -> ::std::primitive::bool { + self.as_insert().is_ok() + } + /// Returns true if this is a [`Prefix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Prefix). + pub fn is_prefix(&self) -> ::std::primitive::bool { + self.as_prefix().is_ok() + } + /// Returns true if this is a [`Suffix`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Suffix). + pub fn is_suffix(&self) -> ::std::primitive::bool { + self.as_suffix().is_ok() + } + /// Returns true if this is a [`Substring`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Substring). + pub fn is_substring(&self) -> ::std::primitive::bool { + self.as_substring().is_ok() + } + /// Returns true if this is a [`Segment`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segment). + pub fn is_segment(&self) -> ::std::primitive::bool { + self.as_segment().is_ok() + } + /// Returns true if this is a [`Segments`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::VirtualTransform::Segments). + pub fn is_segments(&self) -> ::std::primitive::bool { + self.as_segments().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_encryption_config.rs index db34d5fb5..42ae61775 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_encryption_config.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct DynamoDbEncryptionConfig { - -} -impl DynamoDbEncryptionConfig { - -} +pub struct DynamoDbEncryptionConfig {} +impl DynamoDbEncryptionConfig {} impl DynamoDbEncryptionConfig { /// Creates a new builder-style object to manufacture [`DynamoDbEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbEncryptionConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfigBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfigBuilder::default() } } @@ -22,18 +18,15 @@ impl DynamoDbEncryptionConfig { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct DynamoDbEncryptionConfigBuilder { - -} +pub struct DynamoDbEncryptionConfigBuilder {} impl DynamoDbEncryptionConfigBuilder { - /// Consumes the builder and constructs a [`DynamoDbEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::DynamoDbEncryptionConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_key_branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_key_branch_key_id_supplier.rs index 2922c7429..bb0b139b7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_key_branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/dynamo_db_key_branch_key_id_supplier.rs @@ -3,7 +3,7 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait DynamoDbKeyBranchKeyIdSupplier { +pub trait DynamoDbKeyBranchKeyIdSupplier: Send + Sync { fn get_branch_key_id_from_ddb_key( &self, input: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput, @@ -16,18 +16,20 @@ pub trait DynamoDbKeyBranchKeyIdSupplier { #[derive(::std::clone::Clone)] /// A reference to a DynamoDbKeyBranchKeyIdSupplier pub struct DynamoDbKeyBranchKeyIdSupplierRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for DynamoDbKeyBranchKeyIdSupplierRef { +impl From for DynamoDbKeyBranchKeyIdSupplierRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for DynamoDbKeyBranchKeyIdSupplierRef { fn eq(&self, other: &DynamoDbKeyBranchKeyIdSupplierRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/error.rs index 243dd226f..1a5762ca4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/error.rs @@ -4,39 +4,40 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -DynamoDbEncryptionException { - message: ::std::string::String, -}, + DynamoDbEncryptionException { + message: ::std::string::String, + }, -AwsCryptographicPrimitivesError { - error: crate::deps::aws_cryptography_primitives::types::error::Error, -}, + AwsCryptographicPrimitivesError { + error: crate::deps::aws_cryptography_primitives::types::error::Error, + }, -DynamoDB_20120810Error { - error: crate::deps::com_amazonaws_dynamodb::types::error::Error, -}, + DynamoDB_20120810Error { + error: crate::deps::com_amazonaws_dynamodb::types::error::Error, + }, -AwsCryptographicMaterialProvidersError { - error: crate::deps::aws_cryptography_materialProviders::types::error::Error, -}, + AwsCryptographicMaterialProvidersError { + error: crate::deps::aws_cryptography_materialProviders::types::error::Error, + }, -StructuredEncryptionError { - error: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, -}, + StructuredEncryptionError { + error: + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, + }, -KeyStoreError { - error: crate::deps::aws_cryptography_keyStore::types::error::Error, -}, + KeyStoreError { + error: crate::deps::aws_cryptography_keyStore::types::error::Error, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -64,18 +65,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/legacy_dynamo_db_encryptor.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/legacy_dynamo_db_encryptor.rs index 9cc14d68a..565ab7ba0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/legacy_dynamo_db_encryptor.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/types/legacy_dynamo_db_encryptor.rs @@ -3,25 +3,25 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait LegacyDynamoDbEncryptor { - -} +pub trait LegacyDynamoDbEncryptor: Send + Sync {} #[derive(::std::clone::Clone)] /// A reference to a LegacyDynamoDbEncryptor pub struct LegacyDynamoDbEncryptorRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for LegacyDynamoDbEncryptorRef { +impl From for LegacyDynamoDbEncryptorRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for LegacyDynamoDbEncryptorRef { fn eq(&self, other: &LegacyDynamoDbEncryptorRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } @@ -30,4 +30,3 @@ impl ::std::fmt::Debug for LegacyDynamoDbEncryptorRef { write!(f, "") } } - diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/validation.rs index 687321c05..b4bcbf167 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb/validation.rs @@ -1,515 +1,559 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier(&input.ddb_key_branch_key_id_supplier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_for_DynamoDbEncryption_CreateDynamoDbEncryptionBranchKeyIdSupplier(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier(&input.ddb_key_branch_key_id_supplier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ddb_key_branch_key_id_supplier", - "ddb_key_branch_key_id_supplier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier(&input.r#ddb_key_branch_key_id_supplier)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_for_DynamoDbEncryption_CreateDynamoDbEncryptionBranchKeyIdSupplier( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier(&input.r#ddb_key_branch_key_id_supplier)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierInput_DddbKeyBranchKeyIdSupplier( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ddb_key_branch_key_id_supplier", + "ddb_key_branch_key_id_supplier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbKeyBranchKeyIdSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier(&input.branch_key_id_supplier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_for_DynamoDbEncryption_CreateDynamoDbEncryptionBranchKeyIdSupplier(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier(&input.branch_key_id_supplier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_id_supplier", - "branch_key_id_supplier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbKeyBranchKeyIdSupplierReference( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier(&input.r#branch_key_id_supplier)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_for_DynamoDbEncryption_CreateDynamoDbEncryptionBranchKeyIdSupplier( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::create_dynamo_db_encryption_branch_key_id_supplier::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier(&input.r#branch_key_id_supplier)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HCreateDynamoDbEncryptionBranchKeyIdSupplierOutput_DbranchKeyIdSupplier( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_id_supplier", + "branch_key_id_supplier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbEncryptionConfig(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbEncryptionConfig( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_encryption_config::DynamoDbEncryptionConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbKeyBranchKeyIdSupplierReference( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderId(&input.r#key_provider_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderInfo(&input.r#key_provider_info)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyId(&input.r#branch_key_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyVersion(&input.r#branch_key_version)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HDynamoDbKeyBranchKeyIdSupplierReference(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::dynamo_db_key_branch_key_id_supplier::DynamoDbKeyBranchKeyIdSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyVersion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderId(&input.key_provider_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderInfo(&input.key_provider_info)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyId(&input.branch_key_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyVersion(&input.branch_key_version)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_id", + "key_provider_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DbranchKeyVersion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderInfo( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_id", - "key_provider_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList_Dmember( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey( + &input.r#ddb_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_for_DynamoDbKeyBranchKeyIdSupplier_GetBranchKeyIdFromDdbKey( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey( + &input.r#ddb_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ddb_key", + "ddb_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription_DkeyProviderInfo(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_com_Pamazonaws_Pdynamodb_HKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId(&input.r#branch_key_id)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_for_DynamoDbKeyBranchKeyIdSupplier_GetBranchKeyIdFromDdbKey( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId(&input.r#branch_key_id)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_id", + "branch_key_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList_Dmember(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::EncryptedDataKeyDescription) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescription(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey(&input.ddb_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_for_DynamoDbKeyBranchKeyIdSupplier_GetBranchKeyIdFromDdbKey(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey(&input.ddb_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyInput_DddbKey(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ddb_key", - "ddb_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput(&input.r#input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_for_DynamoDbEncryption_GetEncryptedDataKeyDescription( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput(&input.r#input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "input", + "input is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_com_Pamazonaws_Pdynamodb_HKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetBranchKeyIdFromDdbKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId(&input.branch_key_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_for_DynamoDbKeyBranchKeyIdSupplier_GetBranchKeyIdFromDdbKey(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_branch_key_id_from_ddb_key::GetBranchKeyIdFromDdbKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId(&input.branch_key_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetBranchKeyIdFromDdbKeyOutput_DbranchKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_id", - "branch_key_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput(&input.input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_for_DynamoDbEncryption_GetEncryptedDataKeyDescription(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput(&input.input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionInput_Dinput(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "input", - "input is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput(&input.encrypted_data_key_description_output)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_for_DynamoDbEncryption_GetEncryptedDataKeyDescription(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput(&input.encrypted_data_key_description_output)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_key_description_output", - "encrypted_data_key_description_output is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput(&input.r#encrypted_data_key_description_output)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_for_DynamoDbEncryption_GetEncryptedDataKeyDescription( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::operation::get_encrypted_data_key_description::GetEncryptedDataKeyDescriptionOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput(&input.r#encrypted_data_key_description_output)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionOutput_DEncryptedDataKeyDescriptionOutput( + input: &::std::option::Option<::std::vec::Vec>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_key_description_output", + "encrypted_data_key_description_output is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList(input)?; - Ok(()) + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HEncryptedDataKeyDescriptionList(input)?; + Ok(()) } -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(ref inner) = &input { +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Header(ref inner) = &input { validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Dheader(inner)?; } -if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item(ref inner) = &input { + if let crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::GetEncryptedDataKeyDescriptionUnion::Item(ref inner) = &input { validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Ditem(inner)?; } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Dheader(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Ditem(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input: &crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Dheader( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HGetEncryptedDataKeyDescriptionUnion_Ditem( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference( + input: &crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let aws_sdk_dynamodb::types::AttributeValue::S(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::N(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::B(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Ss(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Ns(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Bs(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::M(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::L(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Null(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Bool(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(input: &::std::vec::Vec<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input: &::std::vec::Vec<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let aws_sdk_dynamodb::types::AttributeValue::S(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::N(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::B(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Ss(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Ns(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Bs(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::M(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::L(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Null(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Bool(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS( + input: &::std::vec::Vec<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL( + input: &::std::vec::Vec, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue( + input: &::std::vec::Vec<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue( + input: &::std::vec::Vec, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client.rs index f90957d1c..d0c1255e1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client.rs @@ -14,7 +14,10 @@ impl Client { #[track_caller] pub fn from_conf( input: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig, - ) -> Result { + ) -> Result< + Self, + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, + > { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::wrap_validation_err)?; let inner = @@ -28,7 +31,7 @@ impl Client { return Err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::error::from_dafny(inner.as_ref().error().clone())); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/decrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/decrypt_item.rs index 47b1f042a..6be9efda6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/decrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/decrypt_item.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::clien /// - [`parsed_header(Option)`](crate::operation::decrypt_item::DecryptItemOutput::parsed_header): (undocumented) /// - [`plaintext_item(Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>)`](crate::operation::decrypt_item::DecryptItemOutput::plaintext_item): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::decrypt_item::DecryptItemError) - pub fn decrypt_item(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemFluentBuilder { + pub fn decrypt_item(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/encrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/encrypt_item.rs index fdeeba1ae..ab44e1448 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/encrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/client/encrypt_item.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::clien /// - [`encrypted_item(Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>)`](crate::operation::encrypt_item::EncryptItemOutput::encrypted_item): (undocumented) /// - [`parsed_header(Option)`](crate::operation::encrypt_item::EncryptItemOutput::parsed_header): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::encrypt_item::EncryptItemError) - pub fn encrypt_item(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemFluentBuilder { + pub fn encrypt_item(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions.rs index 64d48f658..0e69d3ec2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions.rs @@ -3,20 +3,20 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; - pub mod decrypt_item; +pub mod decrypt_item; - pub mod decrypt_item_input; +pub mod decrypt_item_input; - pub mod decrypt_item_output; +pub mod decrypt_item_output; - pub mod encrypt_item; +pub mod encrypt_item; - pub mod encrypt_item_input; +pub mod encrypt_item_input; - pub mod encrypt_item_output; +pub mod encrypt_item_output; - pub mod error; +pub mod error; - pub mod parsed_header; +pub mod parsed_header; pub mod dynamo_db_item_encryptor_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/client.rs index 51a70a157..c61221944 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClient >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client { - crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item.rs index f628e2ceb..2dfb36b37 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decrypt_item_input; +pub mod _decrypt_item_input; - pub mod _decrypt_item_output; +pub mod _decrypt_item_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_input.rs index 657b41afb..d200b741d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput::DecryptItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput::DecryptItemInput { encryptedItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(&v.clone()) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput::builder() .set_encrypted_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_output.rs index 01ca95278..0b5bd2f2c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item/_decrypt_item_output.rs @@ -4,33 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput::DecryptItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput::DecryptItemOutput { plaintextItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(&v.clone()) , ) , - parsedHeader: ::std::rc::Rc::new(match &value.parsed_header { + parsedHeader: ::dafny_runtime::Rc::new(match &value.parsed_header { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::parsed_header::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput::builder() .set_plaintext_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_input.rs index 9f1539f8c..97b7133da 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput::DecryptItemInput { encryptedItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput { @@ -56,7 +56,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput::builder() .set_encrypted_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_output.rs index c87ea52ba..776360404 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/decrypt_item_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput::DecryptItemOutput { plaintextItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,7 +21,7 @@ pub fn to_dafny_plain( , ) , - parsedHeader: ::std::rc::Rc::new(match &value.parsed_header { + parsedHeader: ::dafny_runtime::Rc::new(match &value.parsed_header { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::parsed_header::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -32,36 +32,38 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput::DecryptItemOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput::builder() .set_plaintext_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -78,10 +80,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/dynamo_db_item_encryptor_config/_dynamo_db_item_encryptor_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/dynamo_db_item_encryptor_config/_dynamo_db_item_encryptor_config.rs index 79bcd4bca..c33fcb586 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/dynamo_db_item_encryptor_config/_dynamo_db_item_encryptor_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/dynamo_db_item_encryptor_config/_dynamo_db_item_encryptor_config.rs @@ -5,26 +5,25 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value)) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig{ plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { logicalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.logical_table_name) .Extract(), partitionKeyName: crate::standard_library_conversions::ostring_to_dafny(&value.partition_key_name) .Extract(), @@ -34,7 +33,7 @@ pub fn to_dafny_plain( |v| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::to_dafny(v.clone()), ) , - allowedUnsignedAttributes: ::std::rc::Rc::new(match &value.allowed_unsigned_attributes { + allowedUnsignedAttributes: ::dafny_runtime::Rc::new(match &value.allowed_unsigned_attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -44,27 +43,27 @@ pub fn to_dafny_plain( }) , allowedUnsignedAttributePrefix: crate::standard_library_conversions::ostring_to_dafny(&value.allowed_unsigned_attribute_prefix), - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - keyring: ::std::rc::Rc::new(match &value.keyring { + keyring: ::dafny_runtime::Rc::new(match &value.keyring { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - cmm: ::std::rc::Rc::new(match &value.cmm { + cmm: ::dafny_runtime::Rc::new(match &value.cmm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - legacyOverride: ::std::rc::Rc::new(match &value.legacy_override { + legacyOverride: ::dafny_runtime::Rc::new(match &value.legacy_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::legacy_override::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - plaintextOverride: ::std::rc::Rc::new(match &value.plaintext_override { + plaintextOverride: ::dafny_runtime::Rc::new(match &value.plaintext_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::conversions::plaintext_override::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -75,7 +74,7 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig::builder() @@ -84,7 +83,7 @@ pub fn plain_from_dafny( .set_sort_key_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.sortKeyName().clone())) .set_attribute_actions_on_encrypt(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.attributeActionsOnEncrypt(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_allowed_unsigned_attributes(match (*dafny_value.allowedUnsignedAttributes()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item.rs index b01e59a07..d485f0c0c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _encrypt_item_input; +pub mod _encrypt_item_input; - pub mod _encrypt_item_output; +pub mod _encrypt_item_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_input.rs index 59ff734f0..a43aac9a4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput::EncryptItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput::EncryptItemInput { plaintextItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(&v.clone()) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput::builder() .set_plaintext_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_output.rs index 18f2810bc..c5f3c5bd5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item/_encrypt_item_output.rs @@ -4,33 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput::EncryptItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput::EncryptItemOutput { encryptedItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(&v.clone()) , ) , - parsedHeader: ::std::rc::Rc::new(match &value.parsed_header { + parsedHeader: ::dafny_runtime::Rc::new(match &value.parsed_header { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::parsed_header::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput::builder() .set_encrypted_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_input.rs index 6bcb293ed..023823c58 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput::EncryptItemInput { plaintextItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput { @@ -56,7 +56,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput::builder() .set_plaintext_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_output.rs index 93917f602..91e4c6065 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/encrypt_item_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput::EncryptItemOutput { encryptedItem: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,7 +21,7 @@ pub fn to_dafny_plain( , ) , - parsedHeader: ::std::rc::Rc::new(match &value.parsed_header { + parsedHeader: ::dafny_runtime::Rc::new(match &value.parsed_header { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::parsed_header::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -32,36 +32,38 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput::EncryptItemOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput::builder() .set_encrypted_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedItem(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -78,10 +80,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/error.rs index bf61e2534..9f18bf341 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/error.rs @@ -3,14 +3,18 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error pub fn to_opaque_error(value: String) -> - ::std::rc::Rc + ::dafny_runtime::Rc { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -20,21 +24,21 @@ pub fn to_opaque_error(value: String) -> /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< + ::dafny_runtime::Rc< crate::_Wrappers_Compile::Result< T, - ::std::rc::Rc + ::dafny_runtime::Rc > > { - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::DynamoDbItemEncryptorException { message } => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -67,7 +71,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::err crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -88,7 +92,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::err #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/parsed_header.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/parsed_header.rs index ac7a5e01e..72e52ecec 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/parsed_header.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/conversions/parsed_header.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader{ crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader::ParsedHeader { attributeActionsOnEncrypt: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.attribute_actions_on_encrypt.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -48,20 +48,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader { @@ -77,12 +77,12 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader::builder() .set_attribute_actions_on_encrypt(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.attributeActionsOnEncrypt(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_algorithm_suite_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::from_dafny(dafny_value.algorithmSuiteId()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) @@ -98,7 +98,7 @@ pub fn plain_from_dafny( )) .set_selector_context(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.selectorContext(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -109,10 +109,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item.rs index 0058025c8..52a278ba5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item.rs @@ -17,10 +17,10 @@ impl DecryptItem { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_for_DynamoDbItemEncryptor_DecryptItem(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::decrypt_item::_decrypt_item_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::decrypt_item::_decrypt_item_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).DecryptItem(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_input.rs index 73bb5e0ba..977d97ff8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_input.rs @@ -6,17 +6,23 @@ /// Inputs for decrypting a DynamoDB Item. pub struct DecryptItemInput { /// The encrypted DynamoDB item to decrypt. -pub encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemInput { /// The encrypted DynamoDB item to decrypt. -pub fn encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} + pub fn encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } } impl DecryptItemInput { /// Creates a new builder-style object to manufacture [`DecryptItemInput`](crate::operation::decrypt_item::builders::DecryptItemInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemInputBuilder::default() } } @@ -27,30 +33,52 @@ impl DecryptItemInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptItemInputBuilder { - pub(crate) encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemInputBuilder { /// The encrypted DynamoDB item to decrypt. -pub fn encrypted_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = ::std::option::Option::Some(input.into()); - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn set_encrypted_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = input; - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn get_encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} + pub fn encrypted_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = ::std::option::Option::Some(input.into()); + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn set_encrypted_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = input; + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn get_encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } /// Consumes the builder and constructs a [`DecryptItemInput`](crate::operation::operation::DecryptItemInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput { encrypted_item: self.encrypted_item, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_output.rs index fdb871200..a8245b120 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/_decrypt_item_output.rs @@ -6,23 +6,35 @@ /// Outputs for decrypting a DynamoDB Item. pub struct DecryptItemOutput { /// A parsed version of the header on the encrypted DynamoDB item. -pub parsed_header: ::std::option::Option, -/// The decrypted DynamoDB item. -pub plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, + /// The decrypted DynamoDB item. + pub plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemOutput { /// A parsed version of the header on the encrypted DynamoDB item. -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -/// The decrypted DynamoDB item. -pub fn plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } + /// The decrypted DynamoDB item. + pub fn plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } } impl DecryptItemOutput { /// Creates a new builder-style object to manufacture [`DecryptItemOutput`](crate::operation::decrypt_item::builders::DecryptItemOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemOutputBuilder::default() } } @@ -33,45 +45,79 @@ impl DecryptItemOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptItemOutputBuilder { - pub(crate) parsed_header: ::std::option::Option, -pub(crate) plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, + pub(crate) plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemOutputBuilder { /// A parsed version of the header on the encrypted DynamoDB item. -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -/// A parsed version of the header on the encrypted DynamoDB item. -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -/// A parsed version of the header on the encrypted DynamoDB item. -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -/// The decrypted DynamoDB item. -pub fn plaintext_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = ::std::option::Option::Some(input.into()); - self -} -/// The decrypted DynamoDB item. -pub fn set_plaintext_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = input; - self -} -/// The decrypted DynamoDB item. -pub fn get_plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + /// A parsed version of the header on the encrypted DynamoDB item. + pub fn set_parsed_header( + mut self, + input: ::std::option::Option, + ) -> Self { + self.parsed_header = input; + self + } + /// A parsed version of the header on the encrypted DynamoDB item. + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } + /// The decrypted DynamoDB item. + pub fn plaintext_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = ::std::option::Option::Some(input.into()); + self + } + /// The decrypted DynamoDB item. + pub fn set_plaintext_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = input; + self + } + /// The decrypted DynamoDB item. + pub fn get_plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } /// Consumes the builder and constructs a [`DecryptItemOutput`](crate::operation::operation::DecryptItemOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput { parsed_header: self.parsed_header, plaintext_item: self.plaintext_item, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/builders.rs index 1f37bd521..0f015bd14 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/decrypt_item/builders.rs @@ -13,7 +13,7 @@ impl DecryptItemInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ let mut fluent_builder = client.decrypt_item(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct DecryptItemFluentBuilder { } impl DecryptItemFluentBuilder { /// Creates a new `DecryptItem`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the DecryptItem as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::builders::DecryptItemInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl DecryptItemFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,44 @@ impl DecryptItemFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItem::send(&self.client, input).await } /// The encrypted DynamoDB item to decrypt. -pub fn encrypted_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.encrypted_item(input.into()); - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn set_encrypted_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.set_encrypted_item(input); - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn get_encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - self.inner.get_encrypted_item() -} + pub fn encrypted_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.encrypted_item(input.into()); + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn set_encrypted_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.set_encrypted_item(input); + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn get_encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + self.inner.get_encrypted_item() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item.rs index fac65546f..3c6f505f2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item.rs @@ -17,10 +17,10 @@ impl EncryptItem { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_for_DynamoDbItemEncryptor_EncryptItem(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::encrypt_item::_encrypt_item_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::conversions::encrypt_item::_encrypt_item_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).EncryptItem(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_input.rs index 58fc3ab07..e1b8123a2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_input.rs @@ -6,17 +6,23 @@ /// Inputs for encrypting a DynamoDB Item. pub struct EncryptItemInput { /// The DynamoDB item to encrypt. -pub plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl EncryptItemInput { /// The DynamoDB item to encrypt. -pub fn plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } } impl EncryptItemInput { /// Creates a new builder-style object to manufacture [`EncryptItemInput`](crate::operation::encrypt_item::builders::EncryptItemInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemInputBuilder::default() } } @@ -27,30 +33,52 @@ impl EncryptItemInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptItemInputBuilder { - pub(crate) plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl EncryptItemInputBuilder { /// The DynamoDB item to encrypt. -pub fn plaintext_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB item to encrypt. -pub fn set_plaintext_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = input; - self -} -/// The DynamoDB item to encrypt. -pub fn get_plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn plaintext_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB item to encrypt. + pub fn set_plaintext_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = input; + self + } + /// The DynamoDB item to encrypt. + pub fn get_plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } /// Consumes the builder and constructs a [`EncryptItemInput`](crate::operation::operation::EncryptItemInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput { plaintext_item: self.plaintext_item, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_output.rs index 20483c7b1..c3d297214 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/_encrypt_item_output.rs @@ -6,23 +6,35 @@ /// Outputs for encrypting a DynamoDB Item. pub struct EncryptItemOutput { /// The encrypted DynamoDB item. -pub encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -/// A parsed version of the header written with the encrypted DynamoDB item. -pub parsed_header: ::std::option::Option, + pub encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + /// A parsed version of the header written with the encrypted DynamoDB item. + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, } impl EncryptItemOutput { /// The encrypted DynamoDB item. -pub fn encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptItemOutput { /// Creates a new builder-style object to manufacture [`EncryptItemOutput`](crate::operation::encrypt_item::builders::EncryptItemOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemOutputBuilder::default() } } @@ -33,45 +45,79 @@ impl EncryptItemOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptItemOutputBuilder { - pub(crate) encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -pub(crate) parsed_header: ::std::option::Option, + pub(crate) encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, } impl EncryptItemOutputBuilder { /// The encrypted DynamoDB item. -pub fn encrypted_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = ::std::option::Option::Some(input.into()); - self -} -/// The encrypted DynamoDB item. -pub fn set_encrypted_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = input; - self -} -/// The encrypted DynamoDB item. -pub fn get_encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = ::std::option::Option::Some(input.into()); + self + } + /// The encrypted DynamoDB item. + pub fn set_encrypted_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = input; + self + } + /// The encrypted DynamoDB item. + pub fn get_encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn set_parsed_header( + mut self, + input: ::std::option::Option, + ) -> Self { + self.parsed_header = input; + self + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptItemOutput`](crate::operation::operation::EncryptItemOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput { encrypted_item: self.encrypted_item, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/builders.rs index 873beb101..709309b9f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/operation/encrypt_item/builders.rs @@ -13,7 +13,7 @@ impl EncryptItemInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ let mut fluent_builder = client.encrypt_item(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct EncryptItemFluentBuilder { } impl EncryptItemFluentBuilder { /// Creates a new `EncryptItem`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the EncryptItem as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::builders::EncryptItemInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl EncryptItemFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,44 @@ impl EncryptItemFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItem::send(&self.client, input).await } /// The DynamoDB item to encrypt. -pub fn plaintext_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.plaintext_item(input.into()); - self -} -/// The DynamoDB item to encrypt. -pub fn set_plaintext_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.inner = self.inner.set_plaintext_item(input); - self -} -/// The DynamoDB item to encrypt. -pub fn get_plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - self.inner.get_plaintext_item() -} + pub fn plaintext_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.plaintext_item(input.into()); + self + } + /// The DynamoDB item to encrypt. + pub fn set_plaintext_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.inner = self.inner.set_plaintext_item(input); + self + } + /// The DynamoDB item to encrypt. + pub fn get_plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + self.inner.get_plaintext_item() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types.rs index df1c17aec..2c0cca684 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types.rs @@ -7,8 +7,6 @@ pub use crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::ty pub mod builders; - - mod _decrypt_item_input; pub use crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::_decrypt_item_input::DecryptItemInput; mod _decrypt_item_output; @@ -21,6 +19,3 @@ mod _parsed_header; pub use crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::_parsed_header::ParsedHeader; pub mod error; - - - diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_input.rs index 46433ed6f..aca23fa8f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_input.rs @@ -6,17 +6,23 @@ /// Inputs for decrypting a DynamoDB Item. pub struct DecryptItemInput { /// The encrypted DynamoDB item to decrypt. -pub encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemInput { /// The encrypted DynamoDB item to decrypt. -pub fn encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} + pub fn encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } } impl DecryptItemInput { /// Creates a new builder-style object to manufacture [`DecryptItemInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemInputBuilder::default() } } @@ -27,30 +33,52 @@ impl DecryptItemInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptItemInputBuilder { - pub(crate) encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemInputBuilder { /// The encrypted DynamoDB item to decrypt. -pub fn encrypted_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = ::std::option::Option::Some(input.into()); - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn set_encrypted_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = input; - self -} -/// The encrypted DynamoDB item to decrypt. -pub fn get_encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} + pub fn encrypted_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = ::std::option::Option::Some(input.into()); + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn set_encrypted_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = input; + self + } + /// The encrypted DynamoDB item to decrypt. + pub fn get_encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } /// Consumes the builder and constructs a [`DecryptItemInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput { encrypted_item: self.encrypted_item, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_output.rs index 776937371..0feff7838 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_decrypt_item_output.rs @@ -6,23 +6,35 @@ /// Outputs for decrypting a DynamoDB Item. pub struct DecryptItemOutput { /// A parsed version of the header on the encrypted DynamoDB item. -pub parsed_header: ::std::option::Option, -/// The decrypted DynamoDB item. -pub plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, + /// The decrypted DynamoDB item. + pub plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemOutput { /// A parsed version of the header on the encrypted DynamoDB item. -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -/// The decrypted DynamoDB item. -pub fn plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } + /// The decrypted DynamoDB item. + pub fn plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } } impl DecryptItemOutput { /// Creates a new builder-style object to manufacture [`DecryptItemOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::DecryptItemOutputBuilder::default() } } @@ -33,45 +45,79 @@ impl DecryptItemOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptItemOutputBuilder { - pub(crate) parsed_header: ::std::option::Option, -pub(crate) plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, + pub(crate) plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl DecryptItemOutputBuilder { /// A parsed version of the header on the encrypted DynamoDB item. -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -/// A parsed version of the header on the encrypted DynamoDB item. -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -/// A parsed version of the header on the encrypted DynamoDB item. -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -/// The decrypted DynamoDB item. -pub fn plaintext_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = ::std::option::Option::Some(input.into()); - self -} -/// The decrypted DynamoDB item. -pub fn set_plaintext_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = input; - self -} -/// The decrypted DynamoDB item. -pub fn get_plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + /// A parsed version of the header on the encrypted DynamoDB item. + pub fn set_parsed_header( + mut self, + input: ::std::option::Option, + ) -> Self { + self.parsed_header = input; + self + } + /// A parsed version of the header on the encrypted DynamoDB item. + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } + /// The decrypted DynamoDB item. + pub fn plaintext_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = ::std::option::Option::Some(input.into()); + self + } + /// The decrypted DynamoDB item. + pub fn set_plaintext_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = input; + self + } + /// The decrypted DynamoDB item. + pub fn get_plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } /// Consumes the builder and constructs a [`DecryptItemOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput { parsed_header: self.parsed_header, plaintext_item: self.plaintext_item, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_input.rs index 1eb6923c1..8a58cda2e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_input.rs @@ -6,17 +6,23 @@ /// Inputs for encrypting a DynamoDB Item. pub struct EncryptItemInput { /// The DynamoDB item to encrypt. -pub plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl EncryptItemInput { /// The DynamoDB item to encrypt. -pub fn plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } } impl EncryptItemInput { /// Creates a new builder-style object to manufacture [`EncryptItemInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemInputBuilder::default() } } @@ -27,30 +33,52 @@ impl EncryptItemInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptItemInputBuilder { - pub(crate) plaintext_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, + pub(crate) plaintext_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, } impl EncryptItemInputBuilder { /// The DynamoDB item to encrypt. -pub fn plaintext_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB item to encrypt. -pub fn set_plaintext_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.plaintext_item = input; - self -} -/// The DynamoDB item to encrypt. -pub fn get_plaintext_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.plaintext_item -} + pub fn plaintext_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB item to encrypt. + pub fn set_plaintext_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.plaintext_item = input; + self + } + /// The DynamoDB item to encrypt. + pub fn get_plaintext_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.plaintext_item + } /// Consumes the builder and constructs a [`EncryptItemInput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput { plaintext_item: self.plaintext_item, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_output.rs index 01ca3105d..e0c2f6522 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_encrypt_item_output.rs @@ -6,23 +6,35 @@ /// Outputs for encrypting a DynamoDB Item. pub struct EncryptItemOutput { /// The encrypted DynamoDB item. -pub encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -/// A parsed version of the header written with the encrypted DynamoDB item. -pub parsed_header: ::std::option::Option, + pub encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + /// A parsed version of the header written with the encrypted DynamoDB item. + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, } impl EncryptItemOutput { /// The encrypted DynamoDB item. -pub fn encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptItemOutput { /// Creates a new builder-style object to manufacture [`EncryptItemOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::EncryptItemOutputBuilder::default() } } @@ -33,45 +45,79 @@ impl EncryptItemOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptItemOutputBuilder { - pub(crate) encrypted_item: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -pub(crate) parsed_header: ::std::option::Option, + pub(crate) encrypted_item: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, } impl EncryptItemOutputBuilder { /// The encrypted DynamoDB item. -pub fn encrypted_item(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = ::std::option::Option::Some(input.into()); - self -} -/// The encrypted DynamoDB item. -pub fn set_encrypted_item(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.encrypted_item = input; - self -} -/// The encrypted DynamoDB item. -pub fn get_encrypted_item(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.encrypted_item -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -/// A parsed version of the header written with the encrypted DynamoDB item. -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_item( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = ::std::option::Option::Some(input.into()); + self + } + /// The encrypted DynamoDB item. + pub fn set_encrypted_item( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.encrypted_item = input; + self + } + /// The encrypted DynamoDB item. + pub fn get_encrypted_item( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.encrypted_item + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn set_parsed_header( + mut self, + input: ::std::option::Option, + ) -> Self { + self.parsed_header = input; + self + } + /// A parsed version of the header written with the encrypted DynamoDB item. + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptItemOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput { encrypted_item: self.encrypted_item, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_parsed_header.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_parsed_header.rs index b20879fee..9b235e388 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_parsed_header.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/_parsed_header.rs @@ -6,47 +6,89 @@ /// A parsed version of the header that was written with or read on an encrypted DynamoDB item. pub struct ParsedHeader { /// The ID of the algorithm suite that was used to encrypt this item. -pub algorithm_suite_id: ::std::option::Option, -/// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. -pub attribute_actions_on_encrypt: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, -/// The encrypted data keys that are stored in the header of this item. -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -/// The full encryption context. -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -/// The encryption context as presented to the branch key selector. -pub selector_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -/// The portion of the encryption context that was stored in the header of this item. -pub stored_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + /// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. + pub attribute_actions_on_encrypt: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, + /// The encrypted data keys that are stored in the header of this item. + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + /// The full encryption context. + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + /// The encryption context as presented to the branch key selector. + pub selector_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + /// The portion of the encryption context that was stored in the header of this item. + pub stored_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl ParsedHeader { /// The ID of the algorithm suite that was used to encrypt this item. -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. -pub fn attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The encrypted data keys that are stored in the header of this item. -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -/// The full encryption context. -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -/// The encryption context as presented to the branch key selector. -pub fn selector_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.selector_context -} -/// The portion of the encryption context that was stored in the header of this item. -pub fn stored_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.stored_encryption_context -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. + pub fn attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The encrypted data keys that are stored in the header of this item. + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + /// The full encryption context. + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + /// The encryption context as presented to the branch key selector. + pub fn selector_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.selector_context + } + /// The portion of the encryption context that was stored in the header of this item. + pub fn stored_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.stored_encryption_context + } } impl ParsedHeader { /// Creates a new builder-style object to manufacture [`ParsedHeader`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::ParsedHeaderBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::ParsedHeaderBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::builders::ParsedHeaderBuilder::default() } } @@ -57,98 +99,206 @@ impl ParsedHeader { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ParsedHeaderBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) attribute_actions_on_encrypt: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) selector_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>, -pub(crate) stored_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + pub(crate) attribute_actions_on_encrypt: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) selector_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, + pub(crate) stored_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl ParsedHeaderBuilder { /// The ID of the algorithm suite that was used to encrypt this item. -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -/// The ID of the algorithm suite that was used to encrypt this item. -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -/// The ID of the algorithm suite that was used to encrypt this item. -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. -pub fn attribute_actions_on_encrypt(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); - self -} -/// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. -pub fn set_attribute_actions_on_encrypt(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = input; - self -} -/// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. -pub fn get_attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The encrypted data keys that are stored in the header of this item. -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -/// The encrypted data keys that are stored in the header of this item. -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -/// The encrypted data keys that are stored in the header of this item. -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -/// The full encryption context. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// The full encryption context. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -/// The full encryption context. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -/// The encryption context as presented to the branch key selector. -pub fn selector_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.selector_context = ::std::option::Option::Some(input.into()); - self -} -/// The encryption context as presented to the branch key selector. -pub fn set_selector_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) -> Self { - self.selector_context = input; - self -} -/// The encryption context as presented to the branch key selector. -pub fn get_selector_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>> { - &self.selector_context -} -/// The portion of the encryption context that was stored in the header of this item. -pub fn stored_encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.stored_encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// The portion of the encryption context that was stored in the header of this item. -pub fn set_stored_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.stored_encryption_context = input; - self -} -/// The portion of the encryption context that was stored in the header of this item. -pub fn get_stored_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.stored_encryption_context -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + /// The ID of the algorithm suite that was used to encrypt this item. + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + /// The ID of the algorithm suite that was used to encrypt this item. + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. + pub fn attribute_actions_on_encrypt( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); + self + } + /// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. + pub fn set_attribute_actions_on_encrypt( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = input; + self + } + /// The non-DO_NOTHING Crypto Actions that were configured when this item was originally encrypted. + pub fn get_attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The encrypted data keys that are stored in the header of this item. + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + /// The encrypted data keys that are stored in the header of this item. + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + /// The encrypted data keys that are stored in the header of this item. + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + /// The full encryption context. + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// The full encryption context. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + /// The full encryption context. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + /// The encryption context as presented to the branch key selector. + pub fn selector_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.selector_context = ::std::option::Option::Some(input.into()); + self + } + /// The encryption context as presented to the branch key selector. + pub fn set_selector_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, + >, + ) -> Self { + self.selector_context = input; + self + } + /// The encryption context as presented to the branch key selector. + pub fn get_selector_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + > { + &self.selector_context + } + /// The portion of the encryption context that was stored in the header of this item. + pub fn stored_encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.stored_encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// The portion of the encryption context that was stored in the header of this item. + pub fn set_stored_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.stored_encryption_context = input; + self + } + /// The portion of the encryption context that was stored in the header of this item. + pub fn get_stored_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.stored_encryption_context + } /// Consumes the builder and constructs a [`ParsedHeader`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/dynamo_db_item_encryptor_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/dynamo_db_item_encryptor_config.rs index 32fba405f..7c01bd3bd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/dynamo_db_item_encryptor_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/dynamo_db_item_encryptor_config.rs @@ -30,53 +30,80 @@ pub sort_key_name: ::std::option::Option<::std::string::String>, } impl DynamoDbItemEncryptorConfig { /// An ID for the algorithm suite to use during encryption and decryption. -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn allowed_unsigned_attribute_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.allowed_unsigned_attribute_prefix -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn allowed_unsigned_attributes(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.allowed_unsigned_attributes -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn legacy_override(&self) -> &::std::option::Option { - &self.legacy_override -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn logical_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_table_name -} -/// The name of the partition key on the table this item will be written to or was read from. -pub fn partition_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_key_name -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn plaintext_override(&self) -> &::std::option::Option { - &self.plaintext_override -} -/// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. -pub fn sort_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.sort_key_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn allowed_unsigned_attribute_prefix( + &self, + ) -> &::std::option::Option<::std::string::String> { + &self.allowed_unsigned_attribute_prefix + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn allowed_unsigned_attributes( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.allowed_unsigned_attributes + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn legacy_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + > { + &self.legacy_override + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn logical_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_table_name + } + /// The name of the partition key on the table this item will be written to or was read from. + pub fn partition_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_key_name + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn plaintext_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + > { + &self.plaintext_override + } + /// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. + pub fn sort_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.sort_key_name + } } impl DynamoDbItemEncryptorConfig { /// Creates a new builder-style object to manufacture [`DynamoDbItemEncryptorConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DynamoDbItemEncryptorConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfigBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfigBuilder::default() } } @@ -101,166 +128,275 @@ pub(crate) sort_key_name: ::std::option::Option<::std::string::String>, } impl DynamoDbItemEncryptorConfigBuilder { /// An ID for the algorithm suite to use during encryption and decryption. -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -/// An ID for the algorithm suite to use during encryption and decryption. -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -/// An ID for the algorithm suite to use during encryption and decryption. -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn allowed_unsigned_attribute_prefix(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.allowed_unsigned_attribute_prefix = ::std::option::Option::Some(input.into()); - self -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn set_allowed_unsigned_attribute_prefix(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.allowed_unsigned_attribute_prefix = input; - self -} -/// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. -pub fn get_allowed_unsigned_attribute_prefix(&self) -> &::std::option::Option<::std::string::String> { - &self.allowed_unsigned_attribute_prefix -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn allowed_unsigned_attributes(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.allowed_unsigned_attributes = ::std::option::Option::Some(input.into()); - self -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn set_allowed_unsigned_attributes(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.allowed_unsigned_attributes = input; - self -} -/// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. -pub fn get_allowed_unsigned_attributes(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.allowed_unsigned_attributes -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn attribute_actions_on_encrypt(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); - self -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn set_attribute_actions_on_encrypt(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.attribute_actions_on_encrypt = input; - self -} -/// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. -pub fn get_attribute_actions_on_encrypt(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.attribute_actions_on_encrypt -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -/// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn legacy_override(mut self, input: impl ::std::convert::Into) -> Self { - self.legacy_override = ::std::option::Option::Some(input.into()); - self -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn set_legacy_override(mut self, input: ::std::option::Option) -> Self { - self.legacy_override = input; - self -} -/// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. -pub fn get_legacy_override(&self) -> &::std::option::Option { - &self.legacy_override -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn logical_table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.logical_table_name = ::std::option::Option::Some(input.into()); - self -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn set_logical_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.logical_table_name = input; - self -} -/// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. -pub fn get_logical_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_table_name -} -/// The name of the partition key on the table this item will be written to or was read from. -pub fn partition_key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.partition_key_name = ::std::option::Option::Some(input.into()); - self -} -/// The name of the partition key on the table this item will be written to or was read from. -pub fn set_partition_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.partition_key_name = input; - self -} -/// The name of the partition key on the table this item will be written to or was read from. -pub fn get_partition_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_key_name -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn plaintext_override(mut self, input: impl ::std::convert::Into) -> Self { - self.plaintext_override = ::std::option::Option::Some(input.into()); - self -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn set_plaintext_override(mut self, input: ::std::option::Option) -> Self { - self.plaintext_override = input; - self -} -/// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. -pub fn get_plaintext_override(&self) -> &::std::option::Option { - &self.plaintext_override -} -/// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. -pub fn sort_key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.sort_key_name = ::std::option::Option::Some(input.into()); - self -} -/// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. -pub fn set_sort_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.sort_key_name = input; - self -} -/// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. -pub fn get_sort_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.sort_key_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + /// An ID for the algorithm suite to use during encryption and decryption. + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + /// An ID for the algorithm suite to use during encryption and decryption. + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn allowed_unsigned_attribute_prefix( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.allowed_unsigned_attribute_prefix = ::std::option::Option::Some(input.into()); + self + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn set_allowed_unsigned_attribute_prefix( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.allowed_unsigned_attribute_prefix = input; + self + } + /// A prefix such that, if during decryption any attribute has a name with this prefix, it is treated as unsigned. + pub fn get_allowed_unsigned_attribute_prefix( + &self, + ) -> &::std::option::Option<::std::string::String> { + &self.allowed_unsigned_attribute_prefix + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn allowed_unsigned_attributes( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.allowed_unsigned_attributes = ::std::option::Option::Some(input.into()); + self + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn set_allowed_unsigned_attributes( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.allowed_unsigned_attributes = input; + self + } + /// A list of attribute names such that, if encountered during decryption, those attributes are treated as unsigned. + pub fn get_allowed_unsigned_attributes( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.allowed_unsigned_attributes + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn attribute_actions_on_encrypt( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = ::std::option::Option::Some(input.into()); + self + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn set_attribute_actions_on_encrypt( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.attribute_actions_on_encrypt = input; + self + } + /// A map that describes what attributes should be encrypted and/or signed on encrypt. This map must contain all attributes that might be encountered during encryption. + pub fn get_attribute_actions_on_encrypt( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.attribute_actions_on_encrypt + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + /// The Cryptographic Materials Manager that is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that should be used to wrap and unwrap data keys. If specified a Default Cryptographic Materials Manager with this Keyring is used to obtain materials for encryption and decryption. Either a Keyring or a Cryptographic Materials Manager must be specified. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn legacy_override( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + >, + ) -> Self { + self.legacy_override = ::std::option::Option::Some(input.into()); + self + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn set_legacy_override( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + >, + ) -> Self { + self.legacy_override = input; + self + } + /// A configuration that override encryption and/or decryption to instead perform legacy encryption and/or decryption. Used as part of migration from version 2.x to version 3.x. + pub fn get_legacy_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + > { + &self.legacy_override + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn logical_table_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.logical_table_name = ::std::option::Option::Some(input.into()); + self + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn set_logical_table_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.logical_table_name = input; + self + } + /// The logical table name for this table. This is the name that is cryptographically bound with your data. This can be the same as the actual DynamoDB table name. It's purpose is to be distinct from the DynamoDB table name so that the data may still be authenticated if being read from different (but logically similar) tables, such as a backup table. + pub fn get_logical_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_table_name + } + /// The name of the partition key on the table this item will be written to or was read from. + pub fn partition_key_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.partition_key_name = ::std::option::Option::Some(input.into()); + self + } + /// The name of the partition key on the table this item will be written to or was read from. + pub fn set_partition_key_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.partition_key_name = input; + self + } + /// The name of the partition key on the table this item will be written to or was read from. + pub fn get_partition_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_key_name + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn plaintext_override( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + >, + ) -> Self { + self.plaintext_override = ::std::option::Option::Some(input.into()); + self + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn set_plaintext_override( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + >, + ) -> Self { + self.plaintext_override = input; + self + } + /// A configuration that override encryption and/or decryption to instead passthrough and write and/or read plaintext. Used to update plaintext tables to fully use client-side encryption. + pub fn get_plaintext_override( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + > { + &self.plaintext_override + } + /// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. + pub fn sort_key_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.sort_key_name = ::std::option::Option::Some(input.into()); + self + } + /// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. + pub fn set_sort_key_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.sort_key_name = input; + self + } + /// If this table contains a sort key, the name of the sort key on the table this item will be written to or was read from. + pub fn get_sort_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.sort_key_name + } /// Consumes the builder and constructs a [`DynamoDbItemEncryptorConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DynamoDbItemEncryptorConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig { algorithm_suite_id: self.algorithm_suite_id, allowed_unsigned_attribute_prefix: self.allowed_unsigned_attribute_prefix, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/error.rs index 579f67c74..0b351973d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/types/error.rs @@ -4,39 +4,40 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -DynamoDbItemEncryptorException { - message: ::std::string::String, -}, + DynamoDbItemEncryptorException { + message: ::std::string::String, + }, -AwsCryptographicPrimitivesError { - error: crate::deps::aws_cryptography_primitives::types::error::Error, -}, + AwsCryptographicPrimitivesError { + error: crate::deps::aws_cryptography_primitives::types::error::Error, + }, -DynamoDB_20120810Error { - error: crate::deps::com_amazonaws_dynamodb::types::error::Error, -}, + DynamoDB_20120810Error { + error: crate::deps::com_amazonaws_dynamodb::types::error::Error, + }, -AwsCryptographicMaterialProvidersError { - error: crate::deps::aws_cryptography_materialProviders::types::error::Error, -}, + AwsCryptographicMaterialProvidersError { + error: crate::deps::aws_cryptography_materialProviders::types::error::Error, + }, -StructuredEncryptionError { - error: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, -}, + StructuredEncryptionError { + error: + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, + }, -DynamoDbEncryptionError { - error: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, -}, + DynamoDbEncryptionError { + error: crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::error::Error, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -64,18 +65,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/validation.rs index a62668c1c..7f256d5b7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor/validation.rs @@ -1,876 +1,1011 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dkey(inner_key)?; - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions( + input: &::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dkey(inner_key)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dvalue(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyDynamoDbEncryptorReference(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dpolicy(&input.policy)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dencryptor(&input.encryptor)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DattributeActionsOnEncrypt(&input.attribute_actions_on_encrypt)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DdefaultAttributeFlag(&input.default_attribute_flag)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DattributeActionsOnEncrypt(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "attribute_actions_on_encrypt", - "attribute_actions_on_encrypt is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DdefaultAttributeFlag(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dencryptor(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryptor", - "encryptor is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyDynamoDbEncryptorReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dpolicy(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "policy", - "policy is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem(&input.encrypted_item)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_for_DynamoDbItemEncryptor_DecryptItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem(&input.encrypted_item)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_item", - "encrypted_item is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem(&input.plaintext_item)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_for_DynamoDbItemEncryptor_DecryptItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem(&input.plaintext_item)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_item", - "plaintext_item is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlogicalTableName(&input.logical_table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DpartitionKeyName(&input.partition_key_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DsortKeyName(&input.sort_key_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DattributeActionsOnEncrypt(&input.attribute_actions_on_encrypt)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributes(&input.allowed_unsigned_attributes)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributePrefix(&input.allowed_unsigned_attribute_prefix)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dkeyring(&input.keyring)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlegacyOverride(&input.legacy_override)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DplaintextOverride(&input.plaintext_override)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributePrefix(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributes(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(&input.len()) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions_Dvalue( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyDynamoDbEncryptorReference( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::legacy_dynamo_db_encryptor::LegacyDynamoDbEncryptorRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dpolicy(&input.r#policy)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dencryptor( + &input.r#encryptor, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DattributeActionsOnEncrypt(&input.r#attribute_actions_on_encrypt)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DdefaultAttributeFlag( + &input.r#default_attribute_flag, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DattributeActionsOnEncrypt( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "attribute_actions_on_encrypt", + "attribute_actions_on_encrypt is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_DdefaultAttributeFlag( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dencryptor( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryptor", + "encryptor is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyDynamoDbEncryptorReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride_Dpolicy( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyPolicy, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "policy", + "policy is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem(&input.r#encrypted_item)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_for_DynamoDbItemEncryptor_DecryptItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem(&input.r#encrypted_item)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemInput_DencryptedItem( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_item", + "encrypted_item is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::DecryptItemOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem(&input.r#plaintext_item)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_for_DynamoDbItemEncryptor_DecryptItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::decrypt_item::DecryptItemOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem(&input.r#plaintext_item)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDecryptItemOutput_DplaintextItem( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_item", + "plaintext_item is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::dynamo_db_item_encryptor_config::DynamoDbItemEncryptorConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlogicalTableName(&input.r#logical_table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DpartitionKeyName(&input.r#partition_key_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DsortKeyName(&input.r#sort_key_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DattributeActionsOnEncrypt(&input.r#attribute_actions_on_encrypt)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributes(&input.r#allowed_unsigned_attributes)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributePrefix(&input.r#allowed_unsigned_attribute_prefix)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dkeyring(&input.r#keyring)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dcmm(&input.r#cmm)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlegacyOverride(&input.r#legacy_override)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DplaintextOverride(&input.r#plaintext_override)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributePrefix( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DallowedUnsignedAttributes( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(&input.len()) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "allowed_unsigned_attributes", "allowed_unsigned_attributes failed to satisfy constraint: Member must have length greater than or equal to 1", )); -} -validate_com_Pamazonaws_Pdynamodb_HAttributeNameList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DattributeActionsOnEncrypt(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "attribute_actions_on_encrypt", - "attribute_actions_on_encrypt is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dcmm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dkeyring(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlegacyOverride(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlogicalTableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "logical_table_name", - "logical_table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DpartitionKeyName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "partition_key_name", - "partition_key_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=255).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + validate_com_Pamazonaws_Pdynamodb_HAttributeNameList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DattributeActionsOnEncrypt( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "attribute_actions_on_encrypt", + "attribute_actions_on_encrypt is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dcmm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_Dkeyring( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlegacyOverride( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::LegacyOverride, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HLegacyOverride(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DlogicalTableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "logical_table_name", + "logical_table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DpartitionKeyName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "partition_key_name", + "partition_key_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=255).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "partition_key_name", "partition_key_name failed to satisfy constraint: Member must have length between 1 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DplaintextOverride(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DsortKeyName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=255).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DplaintextOverride( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb::types::PlaintextOverride, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HDynamoDbItemEncryptorConfig_DsortKeyName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=255).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "sort_key_name", "sort_key_name failed to satisfy constraint: Member must have length between 1 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem(&input.plaintext_item)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_for_DynamoDbItemEncryptor_EncryptItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem(&input.plaintext_item)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_item", - "plaintext_item is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem(&input.encrypted_item)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_for_DynamoDbItemEncryptor_EncryptItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem(&input.encrypted_item)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_item", - "encrypted_item is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader(input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DattributeActionsOnEncrypt(&input.attribute_actions_on_encrypt)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DstoredEncryptionContext(&input.stored_encryption_context)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DselectorContext(&input.selector_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite_id", - "algorithm_suite_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DattributeActionsOnEncrypt(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "attribute_actions_on_encrypt", - "attribute_actions_on_encrypt is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptedDataKeys(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_keys", - "encrypted_data_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DselectorContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "selector_context", - "selector_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_com_Pamazonaws_Pdynamodb_HKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DstoredEncryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "stored_encryption_context", - "stored_encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(&input.key_provider_id)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(&input.key_provider_info)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(&input.ciphertext)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ciphertext", - "ciphertext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_id", - "key_provider_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_info", - "key_provider_info is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input: &::std::collections::HashMap<::std::string::String, ::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem(&input.r#plaintext_item)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_for_DynamoDbItemEncryptor_EncryptItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem(&input.r#plaintext_item)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemInput_DplaintextItem( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_item", + "plaintext_item is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::EncryptItemOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem(&input.r#encrypted_item)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_for_DynamoDbItemEncryptor_EncryptItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::operation::encrypt_item::EncryptItemOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem(&input.r#encrypted_item)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DencryptedItem( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_item", + "encrypted_item is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_com_Pamazonaws_Pdynamodb_HAttributeMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HEncryptItemOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_dynamoDb_itemEncryptor::types::ParsedHeader, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DattributeActionsOnEncrypt(&input.r#attribute_actions_on_encrypt)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptedDataKeys(&input.r#encrypted_data_keys)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DstoredEncryptionContext(&input.r#stored_encryption_context)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptionContext(&input.r#encryption_context)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DselectorContext(&input.r#selector_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite_id", + "algorithm_suite_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DattributeActionsOnEncrypt( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "attribute_actions_on_encrypt", + "attribute_actions_on_encrypt is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_HAttributeActions(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptedDataKeys( + input: &::std::option::Option< + ::std::vec::Vec, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_keys", + "encrypted_data_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DselectorContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "selector_context", + "selector_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_com_Pamazonaws_Pdynamodb_HKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PdynamoDb_PitemEncryptor_HParsedHeader_DstoredEncryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "stored_encryption_context", + "stored_encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + &input.r#key_provider_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + &input.r#key_provider_info, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + &input.r#ciphertext, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ciphertext", + "ciphertext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_id", + "key_provider_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_info", + "key_provider_info is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext( + input: &::std::collections::HashMap<::std::string::String, ::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringReference( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeNameList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HAttributeNameList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeNameList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeMap_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeNameList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HAttributeNameList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeNameList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "member", "member failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let aws_sdk_dynamodb::types::AttributeValue::S(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::N(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::B(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Ss(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Ns(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Bs(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::M(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::L(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Null(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(inner)?; -} -if let aws_sdk_dynamodb::types::AttributeValue::Bool(ref inner) = &input { - validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(input: &::std::vec::Vec<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input: &::std::vec::Vec<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let aws_sdk_dynamodb::types::AttributeValue::S(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::N(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::B(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Ss(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Ns(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Bs(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::M(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::L(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Null(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL(inner)?; + } + if let aws_sdk_dynamodb::types::AttributeValue::Bool(ref inner) = &input { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DB( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBOOL( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DBS( + input: &::std::vec::Vec<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DL( + input: &::std::vec::Vec, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DM( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DN( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNS( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DNULL( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DS( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HAttributeValue_DSS( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue( + input: &::std::vec::Vec<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HBinarySetAttributeValue_Dmember( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HKey_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue(input: &::std::collections::HashMap<::std::string::String, aws_sdk_dynamodb::types::AttributeValue>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(inner_key)?; - validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(0..=65535).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HKey_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue( + input: &::std::vec::Vec, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HListAttributeValue_Dmember( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue( + input: &::std::collections::HashMap< + ::std::string::String, + aws_sdk_dynamodb::types::AttributeValue, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey(inner_key)?; + validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(0..=65535).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key", "key failed to satisfy constraint: Member must have length between 0 and 65535, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue(input: &aws_sdk_dynamodb::types::AttributeValue) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HMapAttributeValue_Dvalue( + input: &aws_sdk_dynamodb::types::AttributeValue, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_com_Pamazonaws_Pdynamodb_HAttributeValue(input)?; + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HNumberSetAttributeValue_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_com_Pamazonaws_Pdynamodb_HStringSetAttributeValue_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client.rs index 61506e2bd..fff26a131 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client.rs @@ -14,7 +14,10 @@ impl Client { #[track_caller] pub fn from_conf( input: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig, - ) -> Result { + ) -> Result< + Self, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, + > { crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredEncryptionConfig(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; let inner = @@ -28,7 +31,7 @@ impl Client { return Err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::error::from_dafny(inner.as_ref().error().clone())); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_path_structure.rs index 8b17bf106..0963eec58 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_path_structure.rs @@ -13,7 +13,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client: /// - [`parsed_header(Option)`](crate::operation::decrypt_path_structure::DecryptPathStructureOutput::parsed_header): (undocumented) /// - [`plaintext_structure(Option<::std::vec::Vec>)`](crate::operation::decrypt_path_structure::DecryptPathStructureOutput::plaintext_structure): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::decrypt_path_structure::DecryptPathStructureError) - pub fn decrypt_path_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureFluentBuilder { + pub fn decrypt_path_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_structure.rs index 23ce6a92c..53377bde8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/decrypt_structure.rs @@ -15,7 +15,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client: /// - [`parsed_header(Option)`](crate::operation::decrypt_structure::DecryptStructureOutput::parsed_header): (undocumented) /// - [`plaintext_structure(Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>)`](crate::operation::decrypt_structure::DecryptStructureOutput::plaintext_structure): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::decrypt_structure::DecryptStructureError) - pub fn decrypt_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureFluentBuilder { + pub fn decrypt_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_path_structure.rs index 2046b5887..0497d92d0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_path_structure.rs @@ -14,7 +14,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client: /// - [`encrypted_structure(Option<::std::vec::Vec>)`](crate::operation::encrypt_path_structure::EncryptPathStructureOutput::encrypted_structure): (undocumented) /// - [`parsed_header(Option)`](crate::operation::encrypt_path_structure::EncryptPathStructureOutput::parsed_header): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::encrypt_path_structure::EncryptPathStructureError) - pub fn encrypt_path_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureFluentBuilder { + pub fn encrypt_path_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_structure.rs index 0d6af8240..c5aed6646 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/encrypt_structure.rs @@ -16,7 +16,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client: /// - [`encrypted_structure(Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>)`](crate::operation::encrypt_structure::EncryptStructureOutput::encrypted_structure): (undocumented) /// - [`parsed_header(Option)`](crate::operation::encrypt_structure::EncryptStructureOutput::parsed_header): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::encrypt_structure::EncryptStructureError) - pub fn encrypt_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureFluentBuilder { + pub fn encrypt_structure(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/resolve_auth_actions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/resolve_auth_actions.rs index 68e40074d..b276e58be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/resolve_auth_actions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/client/resolve_auth_actions.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client: /// - On success, responds with [`ResolveAuthActionsOutput`](crate::operation::resolve_auth_actions::ResolveAuthActionsOutput) with field(s): /// - [`crypto_actions(Option<::std::vec::Vec>)`](crate::operation::resolve_auth_actions::ResolveAuthActionsOutput::crypto_actions): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::resolve_auth_actions::ResolveAuthActionsError) - pub fn resolve_auth_actions(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsFluentBuilder { + pub fn resolve_auth_actions(&self) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsFluentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions.rs index 5440bf491..b0b336758 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions.rs @@ -3,52 +3,52 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod auth_item; - pub mod authenticate_action; +pub mod authenticate_action; - pub mod client; +pub mod client; - pub mod crypto_action; +pub mod crypto_action; - pub mod crypto_item; +pub mod crypto_item; - pub mod decrypt_path_structure; +pub mod decrypt_path_structure; - pub mod decrypt_path_structure_input; +pub mod decrypt_path_structure_input; - pub mod decrypt_path_structure_output; +pub mod decrypt_path_structure_output; - pub mod decrypt_structure; +pub mod decrypt_structure; - pub mod decrypt_structure_input; +pub mod decrypt_structure_input; - pub mod decrypt_structure_output; +pub mod decrypt_structure_output; - pub mod encrypt_path_structure; +pub mod encrypt_path_structure; - pub mod encrypt_path_structure_input; +pub mod encrypt_path_structure_input; - pub mod encrypt_path_structure_output; +pub mod encrypt_path_structure_output; - pub mod encrypt_structure; +pub mod encrypt_structure; - pub mod encrypt_structure_input; +pub mod encrypt_structure_input; - pub mod encrypt_structure_output; +pub mod encrypt_structure_output; - pub mod error; +pub mod error; - pub mod parsed_header; +pub mod parsed_header; - pub mod path_segment; +pub mod path_segment; - pub mod resolve_auth_actions; +pub mod resolve_auth_actions; - pub mod resolve_auth_actions_input; +pub mod resolve_auth_actions_input; - pub mod resolve_auth_actions_output; +pub mod resolve_auth_actions_output; - pub mod structure_segment; +pub mod structure_segment; - pub mod structured_data_terminal; +pub mod structured_data_terminal; pub mod structured_encryption_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/auth_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/auth_item.rs index f80c12137..b03b7b5c7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/auth_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/auth_item.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem::AuthItem { key: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.key.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::to_dafny(&e.clone()) @@ -29,20 +29,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem::AuthItem {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.key(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::from_dafny(e.clone()) , ) )) @@ -71,10 +71,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/authenticate_action.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/authenticate_action.rs index 1de7be78b..6b4217025 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/authenticate_action.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/authenticate_action.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction::Sign => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthenticateAction::SIGN {}, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction::DoNotSign => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthenticateAction::DO_NOT_SIGN {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthenticateAction, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/client.rs index 0fc3bc965..ce606410b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client { - crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_action.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_action.rs index 9eb167f82..de9fae2a0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_action.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_action.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction::EncryptAndSign => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction::ENCRYPT_AND_SIGN {}, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction::SignAndIncludeInEncryptionContext => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction::SignOnly => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction::SIGN_ONLY {}, @@ -14,7 +14,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::Crypt _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_item.rs index a66727e7f..6c2f9f5ff 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/crypto_item.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem::CryptoItem { key: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.key.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::to_dafny(&e.clone()) @@ -29,20 +29,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem::CryptoItem {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.key(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::path_segment::from_dafny(e.clone()) , ) )) @@ -71,10 +71,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure.rs index 8d35df5df..92725facc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decrypt_path_structure_input; +pub mod _decrypt_path_structure_input; - pub mod _decrypt_path_structure_output; +pub mod _decrypt_path_structure_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_input.rs index ef766ab1d..8a8382ae0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput::DecryptPathStructureInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput::DecryptPathStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::to_dafny(&e.clone()) @@ -17,7 +17,7 @@ pub fn to_dafny( cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -29,16 +29,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_output.rs index 97a47bc0c..be95727f3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure/_decrypt_path_structure_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput::DecryptPathStructureOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput::DecryptPathStructureOutput { plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.plaintext_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) , @@ -17,15 +17,15 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput::builder() .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.plaintextStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_input.rs index df6c77100..e4d079eb6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput::DecryptPathStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_structure.clone().unwrap(), @@ -24,7 +24,7 @@ pub fn to_dafny_plain( cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -40,36 +40,36 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput::DecryptPathStructureInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) , ) )) @@ -93,10 +93,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_output.rs index a9837469a..3db17474d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_path_structure_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput::DecryptPathStructureOutput { plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.plaintext_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) @@ -28,35 +28,35 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput::DecryptPathStructureOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput::builder() .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.plaintextStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) @@ -69,10 +69,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure.rs index 45626e360..fad578cf7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decrypt_structure_input; +pub mod _decrypt_structure_input; - pub mod _decrypt_structure_output; +pub mod _decrypt_structure_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_input.rs index 31639ce32..233043ee1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput::DecryptStructureInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput::DecryptStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -23,7 +23,7 @@ pub fn to_dafny( cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -35,23 +35,23 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_authenticate_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.authenticateSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::authenticate_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::authenticate_action::from_dafny(v), ) )) .set_cmm(Some( crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::from_dafny(dafny_value.cmm().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_output.rs index 710141ecd..b9ebdd1f9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure/_decrypt_structure_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput::DecryptStructureOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput::DecryptStructureOutput { plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::to_dafny(&v.clone()) @@ -23,22 +23,22 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput::builder() .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_parsed_header(Some( crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::parsed_header::from_dafny(dafny_value.parsedHeader().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_input.rs index d1970fe9e..68a70a20b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput::DecryptStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_structure.clone().unwrap(), @@ -30,7 +30,7 @@ pub fn to_dafny_plain( cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -46,43 +46,45 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput::DecryptStructureInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_authenticate_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.authenticateSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::authenticate_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::authenticate_action::from_dafny(v), ) )) .set_cmm(Some( crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::from_dafny(dafny_value.cmm().clone()) @@ -105,10 +107,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_output.rs index 309095432..c08c1f3c2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/decrypt_structure_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput::DecryptStructureOutput { plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -34,42 +34,44 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput::DecryptStructureOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput::builder() .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_parsed_header(Some( crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::parsed_header::from_dafny(dafny_value.parsedHeader().clone()) @@ -81,10 +83,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure.rs index 258a6f18a..b1a4d5b64 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _encrypt_path_structure_input; +pub mod _encrypt_path_structure_input; - pub mod _encrypt_path_structure_output; +pub mod _encrypt_path_structure_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_input.rs index d1a4e296a..48841de33 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput::EncryptPathStructureInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput::EncryptPathStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.plaintext_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) @@ -16,13 +16,13 @@ pub fn to_dafny( , cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -34,16 +34,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.plaintextStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_output.rs index 6e598e104..1a20cb1fc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure/_encrypt_path_structure_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput::EncryptPathStructureOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput::EncryptPathStructureOutput { encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) , @@ -17,15 +17,15 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput::builder() .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_input.rs index 75e1f34a5..aeac6b130 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput::EncryptPathStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.plaintext_structure.clone().unwrap(), @@ -23,13 +23,13 @@ pub fn to_dafny_plain( , cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -45,36 +45,36 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput::EncryptPathStructureInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.plaintextStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) @@ -105,10 +105,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_output.rs index 7637f2e69..3a9a8826e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_path_structure_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput::EncryptPathStructureOutput { encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_structure.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) @@ -28,35 +28,35 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput::EncryptPathStructureOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput::builder() .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedStructure(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) @@ -69,10 +69,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure.rs index 4d0368377..9685b0347 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _encrypt_structure_input; +pub mod _encrypt_structure_input; - pub mod _encrypt_structure_output; +pub mod _encrypt_structure_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_input.rs index 3738d42d2..05152bae2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput::EncryptStructureInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput::EncryptStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -22,13 +22,13 @@ pub fn to_dafny( , cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -40,23 +40,23 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_cmm(Some( crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::from_dafny(dafny_value.cmm().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_output.rs index 49c78c8e3..c0bf4bf38 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure/_encrypt_structure_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput::EncryptStructureOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput::EncryptStructureOutput { encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::to_dafny(&v.clone()) @@ -23,22 +23,22 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput::builder() .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_parsed_header(Some( crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::parsed_header::from_dafny(dafny_value.parsedHeader().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_input.rs index d72e8d94f..d0ff0a669 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput::EncryptStructureInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), plaintextStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.plaintext_structure.clone().unwrap(), @@ -29,13 +29,13 @@ pub fn to_dafny_plain( , cmm: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&value.cmm.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -51,43 +51,45 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput::EncryptStructureInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_plaintext_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.plaintextStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_cmm(Some( crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::from_dafny(dafny_value.cmm().clone()) @@ -117,10 +119,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_output.rs index e83ccec36..6a0ae9fbc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/encrypt_structure_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput::EncryptStructureOutput { encryptedStructure: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encrypted_structure.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -34,42 +34,44 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput::EncryptStructureOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput::builder() .set_encrypted_structure(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptedStructure(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structured_data_terminal::from_dafny(v.clone()) , ) )) .set_crypto_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.cryptoSchema(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), + |v: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_action::from_dafny(v), ) )) .set_parsed_header(Some( crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::parsed_header::from_dafny(dafny_value.parsedHeader().clone()) @@ -81,10 +83,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/error.rs index fabb11a0a..7ba8c01bd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/error.rs @@ -3,14 +3,18 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error pub fn to_opaque_error(value: String) -> - ::std::rc::Rc + ::dafny_runtime::Rc { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -20,21 +24,21 @@ pub fn to_opaque_error(value: String) -> /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< + ::dafny_runtime::Rc< crate::_Wrappers_Compile::Result< T, - ::std::rc::Rc + ::dafny_runtime::Rc > > { - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::StructuredEncryptionException { message } => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::StructuredEncryptionException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -55,7 +59,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -76,7 +80,7 @@ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/parsed_header.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/parsed_header.rs index 48451e1b0..b513e05c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/parsed_header.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/parsed_header.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader::ParsedHeader { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::to_dafny(value.algorithm_suite_id.clone().unwrap()), encryptedDataKeys: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_data_keys.clone().unwrap(), @@ -37,20 +37,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader { @@ -66,7 +66,7 @@ pub fn plain_from_dafny( crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader::builder() .set_algorithm_suite_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::dbe_algorithm_suite_id::from_dafny(dafny_value.algorithmSuiteId()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) @@ -87,10 +87,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/path_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/path_segment.rs index 263f2cb75..cdddab28b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/path_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/path_segment.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::PathSegment, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(x) => crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::PathSegment::member { member: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structure_segment::to_dafny(&x.clone()) @@ -19,11 +19,11 @@ pub fn to_dafny( #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::PathSegment, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::PathSegment::member { member: x @ _, } => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::structure_segment::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions.rs index d6c86b5d8..f38bf6f7f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _resolve_auth_actions_input; +pub mod _resolve_auth_actions_input; - pub mod _resolve_auth_actions_output; +pub mod _resolve_auth_actions_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_input.rs index 703b815d7..b93fc15aa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput::ResolveAuthActionsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput::ResolveAuthActionsInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), authActions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.auth_actions.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::to_dafny(&e.clone()) @@ -17,16 +17,16 @@ pub fn to_dafny( headerBytes: crate::standard_library_conversions::blob_to_dafny(&value.header_bytes.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_auth_actions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.authActions(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_output.rs index 96663ab74..f6ae65505 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions/_resolve_auth_actions_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput::ResolveAuthActionsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput::ResolveAuthActionsOutput { cryptoActions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.crypto_actions.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) , @@ -15,15 +15,15 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput::builder() .set_crypto_actions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.cryptoActions(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_input.rs index 3e375fbbf..3630bbbae 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput::ResolveAuthActionsInput { tableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), authActions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.auth_actions.clone().unwrap(), @@ -28,36 +28,36 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput::ResolveAuthActionsInput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.tableName()) )) .set_auth_actions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.authActions(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::auth_item::from_dafny(e.clone()) , ) )) @@ -69,10 +69,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_output.rs index 6954bdcc9..91395eb4c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/resolve_auth_actions_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput::ResolveAuthActionsOutput { cryptoActions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.crypto_actions.clone().unwrap(), |e| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::to_dafny(&e.clone()) @@ -26,35 +26,35 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput::ResolveAuthActionsOutput {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput::builder() .set_crypto_actions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.cryptoActions(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::crypto_item::from_dafny(e.clone()) , ) )) @@ -65,10 +65,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structure_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structure_segment.rs index e11811090..8e95f080c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structure_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structure_segment.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructureSegment, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructureSegment { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructureSegment{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructureSegment::StructureSegment { key: crate::standard_library_conversions::ostring_to_dafny(&value.key) .Extract(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructureSegment, >, ) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_data_terminal.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_data_terminal.rs index 9cdd6d259..4a4455fbf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_data_terminal.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_data_terminal.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal::StructuredDataTerminal { value: crate::standard_library_conversions::blob_to_dafny(&value.value.unwrap()), typeId: crate::standard_library_conversions::blob_to_dafny(&value.type_id.unwrap()), @@ -23,30 +23,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal +{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal::StructuredDataTerminal {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal::builder() @@ -59,10 +61,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_encryption_config/_structured_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_encryption_config/_structured_encryption_config.rs index c94440b88..d6741c1a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_encryption_config/_structured_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/conversions/structured_encryption_config/_structured_encryption_config.rs @@ -5,26 +5,25 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value)) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig, >, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig{ plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig, -) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig { +) -> crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig{ crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig::StructuredEncryptionConfig { } @@ -33,7 +32,7 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig, -) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig { +) -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig{ match dafny_value { crate::r#software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig::StructuredEncryptionConfig {..} => crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig::builder() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure.rs index 83437124d..9e02a1951 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure.rs @@ -17,10 +17,10 @@ impl DecryptPathStructure { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_for_StructuredEncryption_DecryptPathStructure(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::decrypt_path_structure::_decrypt_path_structure_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::decrypt_path_structure::_decrypt_path_structure_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).DecryptPathStructure(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_input.rs index 58c93b147..2523013d5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_input.rs @@ -16,25 +16,35 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl DecryptPathStructureInput { #[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl DecryptPathStructureInput { /// Creates a new builder-style object to manufacture [`DecryptPathStructureInput`](crate::operation::decrypt_path_structure::builders::DecryptPathStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureInputBuilder::default() } } @@ -52,68 +62,108 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl DecryptPathStructureInputBuilder { #[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`DecryptPathStructureInput`](crate::operation::operation::DecryptPathStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput { cmm: self.cmm, encrypted_structure: self.encrypted_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_output.rs index 1eae94eab..757cab64f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/_decrypt_path_structure_output.rs @@ -6,23 +6,39 @@ #[allow(missing_docs)] pub struct DecryptPathStructureOutput { #[allow(missing_docs)] -pub parsed_header: ::std::option::Option, -#[allow(missing_docs)] -pub plaintext_structure: ::std::option::Option<::std::vec::Vec>, + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + #[allow(missing_docs)] + pub plaintext_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl DecryptPathStructureOutput { #[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } } impl DecryptPathStructureOutput { /// Creates a new builder-style object to manufacture [`DecryptPathStructureOutput`](crate::operation::decrypt_path_structure::builders::DecryptPathStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureOutputBuilder::default() } } @@ -33,45 +49,77 @@ impl DecryptPathStructureOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptPathStructureOutputBuilder { - pub(crate) parsed_header: ::std::option::Option, -pub(crate) plaintext_structure: ::std::option::Option<::std::vec::Vec>, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + pub(crate) plaintext_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl DecryptPathStructureOutputBuilder { #[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } /// Consumes the builder and constructs a [`DecryptPathStructureOutput`](crate::operation::operation::DecryptPathStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput { parsed_header: self.parsed_header, plaintext_structure: self.plaintext_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/builders.rs index a844953bc..e9ffb5289 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_path_structure/builders.rs @@ -13,7 +13,7 @@ impl DecryptPathStructureInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let mut fluent_builder = client.decrypt_path_structure(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct DecryptPathStructureFluentBuilder { } impl DecryptPathStructureFluentBuilder { /// Creates a new `DecryptPathStructure`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the DecryptPathStructure as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::builders::DecryptPathStructureInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl DecryptPathStructureFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,66 +57,106 @@ impl DecryptPathStructureFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructure::send(&self.client, input).await } #[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cmm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cmm(input); - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - self.inner.get_cmm() -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.encrypted_structure(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_encrypted_structure(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_encrypted_structure() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.table_name(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_table_name(input); - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_table_name() -} + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.cmm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_cmm(input); + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + self.inner.get_cmm() + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.inner = self.inner.encrypted_structure(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.inner = self.inner.set_encrypted_structure(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + self.inner.get_encrypted_structure() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.table_name(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_table_name(input); + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_table_name() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure.rs index 32e24c6b9..db285a2e4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure.rs @@ -17,10 +17,10 @@ impl DecryptStructure { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_for_StructuredEncryption_DecryptStructure(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::decrypt_structure::_decrypt_structure_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::decrypt_structure::_decrypt_structure_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).DecryptStructure(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_input.rs index 30de08c92..72a0f4004 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_input.rs @@ -18,29 +18,33 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl DecryptStructureInput { #[allow(missing_docs)] -pub fn authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>> { - &self.authenticate_schema -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>{ + &self.authenticate_schema + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl DecryptStructureInput { /// Creates a new builder-style object to manufacture [`DecryptStructureInput`](crate::operation::decrypt_structure::builders::DecryptStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureInputBuilder::default() } } @@ -59,82 +63,114 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl DecryptStructureInputBuilder { #[allow(missing_docs)] -pub fn authenticate_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.authenticate_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_authenticate_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.authenticate_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>> { - &self.authenticate_schema -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn authenticate_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.authenticate_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_authenticate_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.authenticate_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>{ + &self.authenticate_schema + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`DecryptStructureInput`](crate::operation::operation::DecryptStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput { authenticate_schema: self.authenticate_schema, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_output.rs index e7bf27b0e..8bde6df4a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/_decrypt_structure_output.rs @@ -14,21 +14,32 @@ pub plaintext_structure: ::std::option::Option<::std::collections::HashMap<::std } impl DecryptStructureOutput { #[allow(missing_docs)] -pub fn crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } } impl DecryptStructureOutput { /// Creates a new builder-style object to manufacture [`DecryptStructureOutput`](crate::operation::decrypt_structure::builders::DecryptStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureOutputBuilder::default() } } @@ -45,54 +56,87 @@ pub(crate) plaintext_structure: ::std::option::Option<::std::collections::HashMa } impl DecryptStructureOutputBuilder { #[allow(missing_docs)] -pub fn crypto_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } /// Consumes the builder and constructs a [`DecryptStructureOutput`](crate::operation::operation::DecryptStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput { crypto_schema: self.crypto_schema, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/builders.rs index 0b9dc39be..91a8f63f2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/decrypt_structure/builders.rs @@ -13,7 +13,7 @@ impl DecryptStructureInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let mut fluent_builder = client.decrypt_structure(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct DecryptStructureFluentBuilder { } impl DecryptStructureFluentBuilder { /// Creates a new `DecryptStructure`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the DecryptStructure as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::builders::DecryptStructureInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl DecryptStructureFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,80 +57,112 @@ impl DecryptStructureFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructure::send(&self.client, input).await } #[allow(missing_docs)] -pub fn authenticate_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.inner = self.inner.authenticate_schema(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_authenticate_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.inner = self.inner.set_authenticate_schema(input); - self -} -#[allow(missing_docs)] -pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>> { - self.inner.get_authenticate_schema() -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cmm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cmm(input); - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - self.inner.get_cmm() -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.inner = self.inner.encrypted_structure(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.inner = self.inner.set_encrypted_structure(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - self.inner.get_encrypted_structure() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.table_name(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_table_name(input); - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_table_name() -} + pub fn authenticate_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.inner = self.inner.authenticate_schema(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_authenticate_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.inner = self.inner.set_authenticate_schema(input); + self + } + #[allow(missing_docs)] + pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>{ + self.inner.get_authenticate_schema() + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.cmm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_cmm(input); + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + self.inner.get_cmm() + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.inner = self.inner.encrypted_structure(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.inner = self.inner.set_encrypted_structure(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + self.inner.get_encrypted_structure() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.table_name(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_table_name(input); + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_table_name() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure.rs index 15fda1519..47290cc3c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure.rs @@ -17,10 +17,10 @@ impl EncryptPathStructure { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_for_StructuredEncryption_EncryptPathStructure(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::encrypt_path_structure::_encrypt_path_structure_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::encrypt_path_structure::_encrypt_path_structure_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).EncryptPathStructure(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_input.rs index 0cad345e6..5ef7c9433 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_input.rs @@ -18,29 +18,43 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl EncryptPathStructureInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl EncryptPathStructureInput { /// Creates a new builder-style object to manufacture [`EncryptPathStructureInput`](crate::operation::encrypt_path_structure::builders::EncryptPathStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureInputBuilder::default() } } @@ -59,82 +73,128 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl EncryptPathStructureInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`EncryptPathStructureInput`](crate::operation::operation::EncryptPathStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput { algorithm_suite_id: self.algorithm_suite_id, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_output.rs index 50cdb8d34..d4dd586a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/_encrypt_path_structure_output.rs @@ -6,23 +6,39 @@ #[allow(missing_docs)] pub struct EncryptPathStructureOutput { #[allow(missing_docs)] -pub encrypted_structure: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub parsed_header: ::std::option::Option, + pub encrypted_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, + #[allow(missing_docs)] + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, } impl EncryptPathStructureOutput { #[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptPathStructureOutput { /// Creates a new builder-style object to manufacture [`EncryptPathStructureOutput`](crate::operation::encrypt_path_structure::builders::EncryptPathStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureOutputBuilder::default() } } @@ -33,45 +49,77 @@ impl EncryptPathStructureOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptPathStructureOutputBuilder { - pub(crate) encrypted_structure: ::std::option::Option<::std::vec::Vec>, -pub(crate) parsed_header: ::std::option::Option, + pub(crate) encrypted_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, } impl EncryptPathStructureOutputBuilder { #[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptPathStructureOutput`](crate::operation::operation::EncryptPathStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput { encrypted_structure: self.encrypted_structure, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/builders.rs index b89fea2fd..e21bea736 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_path_structure/builders.rs @@ -13,7 +13,7 @@ impl EncryptPathStructureInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let mut fluent_builder = client.encrypt_path_structure(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct EncryptPathStructureFluentBuilder { } impl EncryptPathStructureFluentBuilder { /// Creates a new `EncryptPathStructure`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the EncryptPathStructure as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::builders::EncryptPathStructureInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl EncryptPathStructureFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,80 +57,126 @@ impl EncryptPathStructureFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructure::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cmm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cmm(input); - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - self.inner.get_cmm() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.plaintext_structure(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_plaintext_structure(input); - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_plaintext_structure() -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.table_name(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_table_name(input); - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_table_name() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.cmm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_cmm(input); + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + self.inner.get_cmm() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.inner = self.inner.plaintext_structure(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.inner = self.inner.set_plaintext_structure(input); + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + self.inner.get_plaintext_structure() + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.table_name(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_table_name(input); + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_table_name() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure.rs index 8df27660d..a915ddf74 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure.rs @@ -17,10 +17,10 @@ impl EncryptStructure { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_for_StructuredEncryption_EncryptStructure(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::encrypt_structure::_encrypt_structure_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::encrypt_structure::_encrypt_structure_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).EncryptStructure(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_input.rs index 4168ea770..6c2d297a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_input.rs @@ -20,33 +20,48 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl EncryptStructureInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl EncryptStructureInput { /// Creates a new builder-style object to manufacture [`EncryptStructureInput`](crate::operation::encrypt_structure::builders::EncryptStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureInputBuilder::default() } } @@ -66,96 +81,149 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl EncryptStructureInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn crypto_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`EncryptStructureInput`](crate::operation::operation::EncryptStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput { algorithm_suite_id: self.algorithm_suite_id, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_output.rs index 19654c9b5..6f50c9fdd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/_encrypt_structure_output.rs @@ -14,21 +14,32 @@ pub parsed_header: ::std::option::Option &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptStructureOutput { /// Creates a new builder-style object to manufacture [`EncryptStructureOutput`](crate::operation::encrypt_structure::builders::EncryptStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureOutputBuilder::default() } } @@ -45,54 +56,87 @@ pub(crate) parsed_header: ::std::option::Option>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptStructureOutput`](crate::operation::operation::EncryptStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput { crypto_schema: self.crypto_schema, encrypted_structure: self.encrypted_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/builders.rs index 462a4930c..a84824a4c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/encrypt_structure/builders.rs @@ -13,7 +13,7 @@ impl EncryptStructureInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let mut fluent_builder = client.encrypt_structure(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct EncryptStructureFluentBuilder { } impl EncryptStructureFluentBuilder { /// Creates a new `EncryptStructure`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the EncryptStructure as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::builders::EncryptStructureInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl EncryptStructureFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,94 +57,147 @@ impl EncryptStructureFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructure::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cmm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cmm(input); - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - self.inner.get_cmm() -} -#[allow(missing_docs)] -pub fn crypto_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.inner = self.inner.crypto_schema(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.inner = self.inner.set_crypto_schema(input); - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - self.inner.get_crypto_schema() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.inner = self.inner.plaintext_structure(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.inner = self.inner.set_plaintext_structure(input); - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - self.inner.get_plaintext_structure() -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.table_name(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_table_name(input); - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_table_name() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.cmm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_cmm(input); + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + self.inner.get_cmm() + } + #[allow(missing_docs)] + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.inner = self.inner.crypto_schema(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.inner = self.inner.set_crypto_schema(input); + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + self.inner.get_crypto_schema() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.inner = self.inner.plaintext_structure(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.inner = self.inner.set_plaintext_structure(input); + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + self.inner.get_plaintext_structure() + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.table_name(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_table_name(input); + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_table_name() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions.rs index 2f703f80e..a926a4f36 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions.rs @@ -17,10 +17,10 @@ impl ResolveAuthActions { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::validation::validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_for_StructuredEncryption_ResolveAuthActions(&input) .map_err(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::resolve_auth_actions::_resolve_auth_actions_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::conversions::resolve_auth_actions::_resolve_auth_actions_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ResolveAuthActions(&inner_input); if matches!( diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_input.rs index 50966e45a..5bb4b587d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_input.rs @@ -6,29 +6,39 @@ #[allow(missing_docs)] pub struct ResolveAuthActionsInput { #[allow(missing_docs)] -pub auth_actions: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub table_name: ::std::option::Option<::std::string::String>, + pub auth_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + #[allow(missing_docs)] + pub header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub table_name: ::std::option::Option<::std::string::String>, } impl ResolveAuthActionsInput { #[allow(missing_docs)] -pub fn auth_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.auth_actions -} -#[allow(missing_docs)] -pub fn header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.header_bytes -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn auth_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.auth_actions + } + #[allow(missing_docs)] + pub fn header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.header_bytes + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl ResolveAuthActionsInput { /// Creates a new builder-style object to manufacture [`ResolveAuthActionsInput`](crate::operation::resolve_auth_actions::builders::ResolveAuthActionsInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsInputBuilder::default() } } @@ -39,60 +49,90 @@ impl ResolveAuthActionsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ResolveAuthActionsInputBuilder { - pub(crate) auth_actions: ::std::option::Option<::std::vec::Vec>, -pub(crate) header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) table_name: ::std::option::Option<::std::string::String>, + pub(crate) auth_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + pub(crate) header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl ResolveAuthActionsInputBuilder { #[allow(missing_docs)] -pub fn auth_actions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.auth_actions = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_actions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.auth_actions = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.auth_actions -} -#[allow(missing_docs)] -pub fn header_bytes(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.header_bytes = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_header_bytes(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.header_bytes = input; - self -} -#[allow(missing_docs)] -pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.header_bytes -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn auth_actions( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.auth_actions = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_actions( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.auth_actions = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.auth_actions + } + #[allow(missing_docs)] + pub fn header_bytes( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.header_bytes = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_header_bytes( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.header_bytes = input; + self + } + #[allow(missing_docs)] + pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.header_bytes + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`ResolveAuthActionsInput`](crate::operation::operation::ResolveAuthActionsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput { auth_actions: self.auth_actions, header_bytes: self.header_bytes, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_output.rs index 0da1d2601..50df48e18 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/_resolve_auth_actions_output.rs @@ -6,17 +6,27 @@ #[allow(missing_docs)] pub struct ResolveAuthActionsOutput { #[allow(missing_docs)] -pub crypto_actions: ::std::option::Option<::std::vec::Vec>, + pub crypto_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl ResolveAuthActionsOutput { #[allow(missing_docs)] -pub fn crypto_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.crypto_actions -} + pub fn crypto_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.crypto_actions + } } impl ResolveAuthActionsOutput { /// Creates a new builder-style object to manufacture [`ResolveAuthActionsOutput`](crate::operation::resolve_auth_actions::builders::ResolveAuthActionsOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsOutputBuilder::default() } } @@ -27,30 +37,46 @@ impl ResolveAuthActionsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ResolveAuthActionsOutputBuilder { - pub(crate) crypto_actions: ::std::option::Option<::std::vec::Vec>, + pub(crate) crypto_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl ResolveAuthActionsOutputBuilder { #[allow(missing_docs)] -pub fn crypto_actions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.crypto_actions = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_actions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.crypto_actions = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.crypto_actions -} + pub fn crypto_actions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.crypto_actions = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_actions( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.crypto_actions = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.crypto_actions + } /// Consumes the builder and constructs a [`ResolveAuthActionsOutput`](crate::operation::operation::ResolveAuthActionsOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput { crypto_actions: self.crypto_actions, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/builders.rs index 4619740a3..ef335f1c6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/operation/resolve_auth_actions/builders.rs @@ -13,7 +13,7 @@ impl ResolveAuthActionsInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let mut fluent_builder = client.resolve_auth_actions(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct ResolveAuthActionsFluentBuilder { } impl ResolveAuthActionsFluentBuilder { /// Creates a new `ResolveAuthActions`. - pub(crate) fn new(client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ResolveAuthActions as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::builders::ResolveAuthActionsInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl ResolveAuthActionsFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,52 +57,78 @@ impl ResolveAuthActionsFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActions::send(&self.client, input).await } #[allow(missing_docs)] -pub fn auth_actions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.auth_actions(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_actions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_auth_actions(input); - self -} -#[allow(missing_docs)] -pub fn get_auth_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_auth_actions() -} -#[allow(missing_docs)] -pub fn header_bytes(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.header_bytes(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_header_bytes(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_header_bytes(input); - self -} -#[allow(missing_docs)] -pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_header_bytes() -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.table_name(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_table_name(input); - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_table_name() -} + pub fn auth_actions( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.inner = self.inner.auth_actions(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_actions( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.inner = self.inner.set_auth_actions(input); + self + } + #[allow(missing_docs)] + pub fn get_auth_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + self.inner.get_auth_actions() + } + #[allow(missing_docs)] + pub fn header_bytes( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.header_bytes(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_header_bytes( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_header_bytes(input); + self + } + #[allow(missing_docs)] + pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_header_bytes() + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.table_name(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_table_name(input); + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_table_name() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types.rs index 57a4e8c05..02468aaef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types.rs @@ -7,8 +7,6 @@ pub use crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::type pub mod builders; - - mod _auth_item; pub use crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::_auth_item::AuthItem; mod _crypto_item; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_auth_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_auth_item.rs index 8e0ea47b8..94840937a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_auth_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_auth_item.rs @@ -14,21 +14,27 @@ pub key: ::std::option::Option<::std::vec::Vec &::std::option::Option { - &self.action -} -#[allow(missing_docs)] -pub fn data(&self) -> &::std::option::Option { - &self.data -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.key -} + pub fn action(&self) -> &::std::option::Option{ + &self.action + } + #[allow(missing_docs)] + pub fn data(&self) -> &::std::option::Option{ + &self.data + } + #[allow(missing_docs)] + pub fn key( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + > { + &self.key + } } impl AuthItem { /// Creates a new builder-style object to manufacture [`AuthItem`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::AuthItemBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::AuthItemBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::AuthItemBuilder::default() } } @@ -45,47 +51,71 @@ pub(crate) key: ::std::option::Option<::std::vec::Vec) -> Self { - self.action = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_action(mut self, input: ::std::option::Option) -> Self { - self.action = input; - self -} -#[allow(missing_docs)] -pub fn get_action(&self) -> &::std::option::Option { - &self.action -} -#[allow(missing_docs)] -pub fn data(mut self, input: impl ::std::convert::Into) -> Self { - self.data = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_data(mut self, input: ::std::option::Option) -> Self { - self.data = input; - self -} -#[allow(missing_docs)] -pub fn get_data(&self) -> &::std::option::Option { - &self.data -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.key -} + pub fn action( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.action = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_action( + mut self, + input: ::std::option::Option, + ) -> Self { + self.action = input; + self + } + #[allow(missing_docs)] + pub fn get_action(&self) -> &::std::option::Option{ + &self.action + } + #[allow(missing_docs)] + pub fn data( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.data = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_data( + mut self, + input: ::std::option::Option, + ) -> Self { + self.data = input; + self + } + #[allow(missing_docs)] + pub fn get_data(&self) -> &::std::option::Option{ + &self.data + } + #[allow(missing_docs)] + pub fn key( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + > { + &self.key + } /// Consumes the builder and constructs a [`AuthItem`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem). pub fn build( self, @@ -93,10 +123,12 @@ pub fn get_key(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem { - action: self.action, -data: self.data, -key: self.key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem { + action: self.action, + data: self.data, + key: self.key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_authenticate_action.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_authenticate_action.rs index 043dff587..8708e0603 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_authenticate_action.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_authenticate_action.rs @@ -5,14 +5,14 @@ #[allow(missing_docs)] pub enum AuthenticateAction { Sign, -DoNotSign, + DoNotSign, } impl ::std::fmt::Display for AuthenticateAction { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { AuthenticateAction::Sign => write!(f, "SIGN"), -AuthenticateAction::DoNotSign => write!(f, "DO_NOT_SIGN"), + AuthenticateAction::DoNotSign => write!(f, "DO_NOT_SIGN"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_action.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_action.rs index cbe6e9f89..4a02d7bd3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_action.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_action.rs @@ -5,18 +5,20 @@ #[allow(missing_docs)] pub enum CryptoAction { EncryptAndSign, -SignAndIncludeInEncryptionContext, -SignOnly, -DoNothing, + SignAndIncludeInEncryptionContext, + SignOnly, + DoNothing, } impl ::std::fmt::Display for CryptoAction { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { CryptoAction::EncryptAndSign => write!(f, "ENCRYPT_AND_SIGN"), -CryptoAction::SignAndIncludeInEncryptionContext => write!(f, "SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT"), -CryptoAction::SignOnly => write!(f, "SIGN_ONLY"), -CryptoAction::DoNothing => write!(f, "DO_NOTHING"), + CryptoAction::SignAndIncludeInEncryptionContext => { + write!(f, "SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT") + } + CryptoAction::SignOnly => write!(f, "SIGN_ONLY"), + CryptoAction::DoNothing => write!(f, "DO_NOTHING"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_item.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_item.rs index 1319fd7ba..d9341141c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_item.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_crypto_item.rs @@ -14,21 +14,31 @@ pub key: ::std::option::Option<::std::vec::Vec &::std::option::Option { - &self.action -} -#[allow(missing_docs)] -pub fn data(&self) -> &::std::option::Option { - &self.data -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.key -} + pub fn action( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + > { + &self.action + } + #[allow(missing_docs)] + pub fn data(&self) -> &::std::option::Option{ + &self.data + } + #[allow(missing_docs)] + pub fn key( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + > { + &self.key + } } impl CryptoItem { /// Creates a new builder-style object to manufacture [`CryptoItem`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::CryptoItemBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::CryptoItemBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::CryptoItemBuilder::default() } } @@ -45,47 +55,79 @@ pub(crate) key: ::std::option::Option<::std::vec::Vec) -> Self { - self.action = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_action(mut self, input: ::std::option::Option) -> Self { - self.action = input; - self -} -#[allow(missing_docs)] -pub fn get_action(&self) -> &::std::option::Option { - &self.action -} -#[allow(missing_docs)] -pub fn data(mut self, input: impl ::std::convert::Into) -> Self { - self.data = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_data(mut self, input: ::std::option::Option) -> Self { - self.data = input; - self -} -#[allow(missing_docs)] -pub fn get_data(&self) -> &::std::option::Option { - &self.data -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.key -} + pub fn action( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + ) -> Self { + self.action = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_action( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + ) -> Self { + self.action = input; + self + } + #[allow(missing_docs)] + pub fn get_action( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + > { + &self.action + } + #[allow(missing_docs)] + pub fn data( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.data = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_data( + mut self, + input: ::std::option::Option, + ) -> Self { + self.data = input; + self + } + #[allow(missing_docs)] + pub fn get_data(&self) -> &::std::option::Option{ + &self.data + } + #[allow(missing_docs)] + pub fn key( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + > { + &self.key + } /// Consumes the builder and constructs a [`CryptoItem`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem). pub fn build( self, @@ -93,10 +135,12 @@ pub fn get_key(&self) -> &::std::option::Option<::std::vec::Vec { - ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem { - action: self.action, -data: self.data, -key: self.key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem { + action: self.action, + data: self.data, + key: self.key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_input.rs index 0ccd7862d..0c72c0b23 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_input.rs @@ -16,25 +16,35 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl DecryptPathStructureInput { #[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl DecryptPathStructureInput { /// Creates a new builder-style object to manufacture [`DecryptPathStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureInputBuilder::default() } } @@ -52,68 +62,108 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl DecryptPathStructureInputBuilder { #[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`DecryptPathStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput { cmm: self.cmm, encrypted_structure: self.encrypted_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_output.rs index 449485746..615e97acd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_path_structure_output.rs @@ -6,23 +6,39 @@ #[allow(missing_docs)] pub struct DecryptPathStructureOutput { #[allow(missing_docs)] -pub parsed_header: ::std::option::Option, -#[allow(missing_docs)] -pub plaintext_structure: ::std::option::Option<::std::vec::Vec>, + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + #[allow(missing_docs)] + pub plaintext_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl DecryptPathStructureOutput { #[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } } impl DecryptPathStructureOutput { /// Creates a new builder-style object to manufacture [`DecryptPathStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptPathStructureOutputBuilder::default() } } @@ -33,45 +49,77 @@ impl DecryptPathStructureOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptPathStructureOutputBuilder { - pub(crate) parsed_header: ::std::option::Option, -pub(crate) plaintext_structure: ::std::option::Option<::std::vec::Vec>, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + pub(crate) plaintext_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl DecryptPathStructureOutputBuilder { #[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } /// Consumes the builder and constructs a [`DecryptPathStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput { parsed_header: self.parsed_header, plaintext_structure: self.plaintext_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_input.rs index cbc8731a4..1defd70c6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_input.rs @@ -18,29 +18,33 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl DecryptStructureInput { #[allow(missing_docs)] -pub fn authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>> { - &self.authenticate_schema -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>{ + &self.authenticate_schema + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl DecryptStructureInput { /// Creates a new builder-style object to manufacture [`DecryptStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureInputBuilder::default() } } @@ -59,82 +63,114 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl DecryptStructureInputBuilder { #[allow(missing_docs)] -pub fn authenticate_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.authenticate_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_authenticate_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) -> Self { - self.authenticate_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>> { - &self.authenticate_schema -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn authenticate_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.authenticate_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_authenticate_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, + ) -> Self { + self.authenticate_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_authenticate_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>{ + &self.authenticate_schema + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`DecryptStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput { authenticate_schema: self.authenticate_schema, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_output.rs index c2a72ee5d..eef55ad29 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_decrypt_structure_output.rs @@ -14,21 +14,32 @@ pub plaintext_structure: ::std::option::Option<::std::collections::HashMap<::std } impl DecryptStructureOutput { #[allow(missing_docs)] -pub fn crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } } impl DecryptStructureOutput { /// Creates a new builder-style object to manufacture [`DecryptStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::DecryptStructureOutputBuilder::default() } } @@ -45,54 +56,87 @@ pub(crate) plaintext_structure: ::std::option::Option<::std::collections::HashMa } impl DecryptStructureOutputBuilder { #[allow(missing_docs)] -pub fn crypto_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } /// Consumes the builder and constructs a [`DecryptStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput { crypto_schema: self.crypto_schema, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_input.rs index e501fa373..e5d8559ba 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_input.rs @@ -18,29 +18,43 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl EncryptPathStructureInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl EncryptPathStructureInput { /// Creates a new builder-style object to manufacture [`EncryptPathStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureInputBuilder::default() } } @@ -59,82 +73,128 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl EncryptPathStructureInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`EncryptPathStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput { algorithm_suite_id: self.algorithm_suite_id, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_output.rs index 29d7223d3..2a8d94735 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_path_structure_output.rs @@ -6,23 +6,39 @@ #[allow(missing_docs)] pub struct EncryptPathStructureOutput { #[allow(missing_docs)] -pub encrypted_structure: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub parsed_header: ::std::option::Option, + pub encrypted_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, + #[allow(missing_docs)] + pub parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, } impl EncryptPathStructureOutput { #[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptPathStructureOutput { /// Creates a new builder-style object to manufacture [`EncryptPathStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptPathStructureOutputBuilder::default() } } @@ -33,45 +49,77 @@ impl EncryptPathStructureOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptPathStructureOutputBuilder { - pub(crate) encrypted_structure: ::std::option::Option<::std::vec::Vec>, -pub(crate) parsed_header: ::std::option::Option, + pub(crate) encrypted_structure: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, + pub(crate) parsed_header: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, } impl EncryptPathStructureOutputBuilder { #[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptPathStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput { encrypted_structure: self.encrypted_structure, parsed_header: self.parsed_header, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_input.rs index 1c786ad69..28e430691 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_input.rs @@ -20,33 +20,48 @@ pub table_name: ::std::option::Option<::std::string::String>, } impl EncryptStructureInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl EncryptStructureInput { /// Creates a new builder-style object to manufacture [`EncryptStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureInputBuilder::default() } } @@ -66,96 +81,149 @@ pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl EncryptStructureInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.cmm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cmm(mut self, input: ::std::option::Option) -> Self { - self.cmm = input; - self -} -#[allow(missing_docs)] -pub fn get_cmm(&self) -> &::std::option::Option { - &self.cmm -} -#[allow(missing_docs)] -pub fn crypto_schema(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.plaintext_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.plaintext_structure -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.cmm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.cmm = input; + self + } + #[allow(missing_docs)] + pub fn get_cmm(&self) -> &::std::option::Option{ + &self.cmm + } + #[allow(missing_docs)] + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.plaintext_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.plaintext_structure + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`EncryptStructureInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput { algorithm_suite_id: self.algorithm_suite_id, cmm: self.cmm, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_output.rs index c125bb592..ba4025ae3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_encrypt_structure_output.rs @@ -14,21 +14,32 @@ pub parsed_header: ::std::option::Option &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } } impl EncryptStructureOutput { /// Creates a new builder-style object to manufacture [`EncryptStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::EncryptStructureOutputBuilder::default() } } @@ -45,54 +56,87 @@ pub(crate) parsed_header: ::std::option::Option>) -> Self { - self.crypto_schema = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_schema(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) -> Self { - self.crypto_schema = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_schema(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>> { - &self.crypto_schema -} -#[allow(missing_docs)] -pub fn encrypted_structure(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_structure(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) -> Self { - self.encrypted_structure = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>> { - &self.encrypted_structure -} -#[allow(missing_docs)] -pub fn parsed_header(mut self, input: impl ::std::convert::Into) -> Self { - self.parsed_header = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_parsed_header(mut self, input: ::std::option::Option) -> Self { - self.parsed_header = input; - self -} -#[allow(missing_docs)] -pub fn get_parsed_header(&self) -> &::std::option::Option { - &self.parsed_header -} + pub fn crypto_schema( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_schema( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>, + ) -> Self { + self.crypto_schema = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_schema( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + > { + &self.crypto_schema + } + #[allow(missing_docs)] + pub fn encrypted_structure( + mut self, + input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_structure( + mut self, + input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, + ) -> Self { + self.encrypted_structure = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_structure(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>{ + &self.encrypted_structure + } + #[allow(missing_docs)] + pub fn parsed_header( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_parsed_header( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, + ) -> Self { + self.parsed_header = input; + self + } + #[allow(missing_docs)] + pub fn get_parsed_header( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + > { + &self.parsed_header + } /// Consumes the builder and constructs a [`EncryptStructureOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput { crypto_schema: self.crypto_schema, encrypted_structure: self.encrypted_structure, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_parsed_header.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_parsed_header.rs index 54ef00d8c..ca1779e51 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_parsed_header.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_parsed_header.rs @@ -6,35 +6,59 @@ #[allow(missing_docs)] pub struct ParsedHeader { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub stored_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub stored_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl ParsedHeader { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn stored_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.stored_encryption_context -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn stored_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.stored_encryption_context + } } impl ParsedHeader { /// Creates a new builder-style object to manufacture [`ParsedHeader`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ParsedHeaderBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ParsedHeaderBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ParsedHeaderBuilder::default() } } @@ -45,68 +69,136 @@ impl ParsedHeader { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ParsedHeaderBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) stored_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) stored_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl ParsedHeaderBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn stored_encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.stored_encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stored_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.stored_encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_stored_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.stored_encryption_context -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn stored_encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.stored_encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stored_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.stored_encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_stored_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.stored_encryption_context + } /// Consumes the builder and constructs a [`ParsedHeader`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_path_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_path_segment.rs index 7fe557028..5c10b6ea6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_path_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_path_segment.rs @@ -6,7 +6,9 @@ #[allow(missing_docs)] pub enum PathSegment { #[allow(missing_docs)] -Member(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment), + Member( + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, + ), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -19,18 +21,18 @@ Member(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types } impl PathSegment { /// Tries to convert the enum instance into [`Member`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member), extracting the inner [`crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_member(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, &Self> { - if let crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_member(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, &Self>{ + if let crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`Member`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member). -pub fn is_member(&self) -> ::std::primitive::bool { - self.as_member().is_ok() -} + pub fn is_member(&self) -> ::std::primitive::bool { + self.as_member().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_input.rs index dc5ce1ea2..9c4e3bfbd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_input.rs @@ -6,29 +6,39 @@ #[allow(missing_docs)] pub struct ResolveAuthActionsInput { #[allow(missing_docs)] -pub auth_actions: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub table_name: ::std::option::Option<::std::string::String>, + pub auth_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + #[allow(missing_docs)] + pub header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub table_name: ::std::option::Option<::std::string::String>, } impl ResolveAuthActionsInput { #[allow(missing_docs)] -pub fn auth_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.auth_actions -} -#[allow(missing_docs)] -pub fn header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.header_bytes -} -#[allow(missing_docs)] -pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn auth_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.auth_actions + } + #[allow(missing_docs)] + pub fn header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.header_bytes + } + #[allow(missing_docs)] + pub fn table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } } impl ResolveAuthActionsInput { /// Creates a new builder-style object to manufacture [`ResolveAuthActionsInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsInputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsInputBuilder::default() } } @@ -39,60 +49,90 @@ impl ResolveAuthActionsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ResolveAuthActionsInputBuilder { - pub(crate) auth_actions: ::std::option::Option<::std::vec::Vec>, -pub(crate) header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) table_name: ::std::option::Option<::std::string::String>, + pub(crate) auth_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + pub(crate) header_bytes: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) table_name: ::std::option::Option<::std::string::String>, } impl ResolveAuthActionsInputBuilder { #[allow(missing_docs)] -pub fn auth_actions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.auth_actions = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_actions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.auth_actions = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.auth_actions -} -#[allow(missing_docs)] -pub fn header_bytes(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.header_bytes = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_header_bytes(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.header_bytes = input; - self -} -#[allow(missing_docs)] -pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.header_bytes -} -#[allow(missing_docs)] -pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_name = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_name = input; - self -} -#[allow(missing_docs)] -pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.table_name -} + pub fn auth_actions( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.auth_actions = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_actions( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, + ) -> Self { + self.auth_actions = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + > { + &self.auth_actions + } + #[allow(missing_docs)] + pub fn header_bytes( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.header_bytes = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_header_bytes( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.header_bytes = input; + self + } + #[allow(missing_docs)] + pub fn get_header_bytes(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.header_bytes + } + #[allow(missing_docs)] + pub fn table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_name = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_name = input; + self + } + #[allow(missing_docs)] + pub fn get_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.table_name + } /// Consumes the builder and constructs a [`ResolveAuthActionsInput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput { auth_actions: self.auth_actions, header_bytes: self.header_bytes, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_output.rs index 742c13a79..eb8089b29 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_resolve_auth_actions_output.rs @@ -6,17 +6,27 @@ #[allow(missing_docs)] pub struct ResolveAuthActionsOutput { #[allow(missing_docs)] -pub crypto_actions: ::std::option::Option<::std::vec::Vec>, + pub crypto_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl ResolveAuthActionsOutput { #[allow(missing_docs)] -pub fn crypto_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.crypto_actions -} + pub fn crypto_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.crypto_actions + } } impl ResolveAuthActionsOutput { /// Creates a new builder-style object to manufacture [`ResolveAuthActionsOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsOutputBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::ResolveAuthActionsOutputBuilder::default() } } @@ -27,30 +37,46 @@ impl ResolveAuthActionsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ResolveAuthActionsOutputBuilder { - pub(crate) crypto_actions: ::std::option::Option<::std::vec::Vec>, + pub(crate) crypto_actions: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, } impl ResolveAuthActionsOutputBuilder { #[allow(missing_docs)] -pub fn crypto_actions(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.crypto_actions = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_crypto_actions(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.crypto_actions = input; - self -} -#[allow(missing_docs)] -pub fn get_crypto_actions(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.crypto_actions -} + pub fn crypto_actions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec>, + ) -> Self { + self.crypto_actions = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_crypto_actions( + mut self, + input: ::std::option::Option<::std::vec::Vec>, + ) -> Self { + self.crypto_actions = input; + self + } + #[allow(missing_docs)] + pub fn get_crypto_actions( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + > { + &self.crypto_actions + } /// Consumes the builder and constructs a [`ResolveAuthActionsOutput`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput { crypto_actions: self.crypto_actions, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structure_segment.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structure_segment.rs index 9a8f8f7e2..ce6cd7afa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structure_segment.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structure_segment.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct StructureSegment { #[allow(missing_docs)] -pub key: ::std::option::Option<::std::string::String>, + pub key: ::std::option::Option<::std::string::String>, } impl StructureSegment { #[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::std::string::String> { - &self.key -} + pub fn key(&self) -> &::std::option::Option<::std::string::String> { + &self.key + } } impl StructureSegment { /// Creates a new builder-style object to manufacture [`StructureSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructureSegmentBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructureSegmentBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructureSegmentBuilder::default() } } @@ -31,19 +31,19 @@ pub struct StructureSegmentBuilder { } impl StructureSegmentBuilder { #[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::std::string::String> { - &self.key -} + pub fn key(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::std::string::String> { + &self.key + } /// Consumes the builder and constructs a [`StructureSegment`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structured_data_terminal.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structured_data_terminal.rs index 532431504..76db46d44 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structured_data_terminal.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/_structured_data_terminal.rs @@ -6,23 +6,23 @@ #[allow(missing_docs)] pub struct StructuredDataTerminal { #[allow(missing_docs)] -pub type_id: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub value: ::std::option::Option<::aws_smithy_types::Blob>, + pub type_id: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub value: ::std::option::Option<::aws_smithy_types::Blob>, } impl StructuredDataTerminal { #[allow(missing_docs)] -pub fn type_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.type_id -} -#[allow(missing_docs)] -pub fn value(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.value -} + pub fn type_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.type_id + } + #[allow(missing_docs)] + pub fn value(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.value + } } impl StructuredDataTerminal { /// Creates a new builder-style object to manufacture [`StructuredDataTerminal`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructuredDataTerminalBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructuredDataTerminalBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::builders::StructuredDataTerminalBuilder::default() } } @@ -34,44 +34,44 @@ impl StructuredDataTerminal { )] pub struct StructuredDataTerminalBuilder { pub(crate) type_id: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) value: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) value: ::std::option::Option<::aws_smithy_types::Blob>, } impl StructuredDataTerminalBuilder { #[allow(missing_docs)] -pub fn type_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.type_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_type_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.type_id = input; - self -} -#[allow(missing_docs)] -pub fn get_type_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.type_id -} -#[allow(missing_docs)] -pub fn value(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.value = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_value(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.value = input; - self -} -#[allow(missing_docs)] -pub fn get_value(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.value -} + pub fn type_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.type_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_type_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.type_id = input; + self + } + #[allow(missing_docs)] + pub fn get_type_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.type_id + } + #[allow(missing_docs)] + pub fn value(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.value = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_value(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.value = input; + self + } + #[allow(missing_docs)] + pub fn get_value(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.value + } /// Consumes the builder and constructs a [`StructuredDataTerminal`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal { type_id: self.type_id, value: self.value, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/error.rs index 61ee40f5c..a6d6d3017 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/error.rs @@ -4,27 +4,27 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -StructuredEncryptionException { - message: ::std::string::String, -}, + StructuredEncryptionException { + message: ::std::string::String, + }, -AwsCryptographicPrimitivesError { - error: crate::deps::aws_cryptography_primitives::types::error::Error, -}, + AwsCryptographicPrimitivesError { + error: crate::deps::aws_cryptography_primitives::types::error::Error, + }, -AwsCryptographicMaterialProvidersError { - error: crate::deps::aws_cryptography_materialProviders::types::error::Error, -}, + AwsCryptographicMaterialProvidersError { + error: crate::deps::aws_cryptography_materialProviders::types::error::Error, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -52,18 +52,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/structured_encryption_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/structured_encryption_config.rs index ce76d2727..e7ad0af76 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/structured_encryption_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/types/structured_encryption_config.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct StructuredEncryptionConfig { - -} -impl StructuredEncryptionConfig { - -} +pub struct StructuredEncryptionConfig {} +impl StructuredEncryptionConfig {} impl StructuredEncryptionConfig { /// Creates a new builder-style object to manufacture [`StructuredEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredEncryptionConfig). - pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfigBuilder{ crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfigBuilder::default() } } @@ -22,18 +18,15 @@ impl StructuredEncryptionConfig { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct StructuredEncryptionConfigBuilder { - -} +pub struct StructuredEncryptionConfigBuilder {} impl StructuredEncryptionConfigBuilder { - /// Consumes the builder and constructs a [`StructuredEncryptionConfig`](crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredEncryptionConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/validation.rs index 6adaa06ba..7f16f5227 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_dbEncryptionSdk_structuredEncryption/validation.rs @@ -1,1186 +1,1395 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap(input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dkey(inner_key)?; - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap( + input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dkey(inner_key)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dvalue( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Dkey(&input.r#key)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Ddata( + &input.r#data, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Daction( + &input.r#action, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Daction( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "action", + "action is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap_Dvalue(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Dkey(&input.key)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Ddata(&input.data)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Daction(&input.action)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Daction(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "action", - "action is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Ddata(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "data", - "data is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Dkey(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList_Dmember(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Dkey(&input.key)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Ddata(&input.data)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Daction(&input.action)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Daction(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "action", - "action is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Ddata( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "data", + "data is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Ddata(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "data", - "data is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem_Dkey( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Dkey(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList_Dmember( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthItem(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Dkey( + &input.r#key, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Ddata( + &input.r#data, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Daction( + &input.r#action, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Daction( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "action", + "action is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList_Dmember(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dkey(inner_key)?; - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Ddata( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "data", + "data is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dvalue(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem_Dkey( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_for_StructuredEncryption_DecryptPathStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cmm", - "cmm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList_Dmember( + inner, + )?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList_Dmember( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoItem(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap( + input: &::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dkey( + inner_key, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dvalue( + inner_val, + )?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap_Dvalue( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm(&input.r#cmm)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_for_StructuredEncryption_DecryptPathStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm(&input.r#cmm)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_Dcmm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cmm", + "cmm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_structure", - "encrypted_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptedStructure( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_structure", + "encrypted_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_name", - "table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureInput_DtableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_name", + "table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_for_StructuredEncryption_DecryptPathStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "parsed_header", - "parsed_header is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptPathStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_for_StructuredEncryption_DecryptPathStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_path_structure::DecryptPathStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "parsed_header", + "parsed_header is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_structure", - "plaintext_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptPathStructureOutput_DplaintextStructure( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_structure", + "plaintext_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema(&input.authenticate_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_for_StructuredEncryption_DecryptStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema(&input.authenticate_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "authenticate_schema", - "authenticate_schema is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema(&input.r#authenticate_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm( + &input.r#cmm, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_for_StructuredEncryption_DecryptStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema(&input.r#authenticate_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm( + &input.r#cmm, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DauthenticateSchema( + input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthenticateAction>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "authenticate_schema", + "authenticate_schema is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cmm", - "cmm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthenticateSchemaMap( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_Dcmm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cmm", + "cmm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_structure", - "encrypted_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptedStructure( + input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_structure", + "encrypted_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_name", - "table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureInput_DtableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_name", + "table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_for_StructuredEncryption_DecryptStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "crypto_schema", - "crypto_schema is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::DecryptStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_for_StructuredEncryption_DecryptStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::decrypt_structure::DecryptStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DcryptoSchema( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "crypto_schema", + "crypto_schema is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "parsed_header", - "parsed_header is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "parsed_header", + "parsed_header is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_structure", - "plaintext_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HDecryptStructureOutput_DplaintextStructure( + input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_structure", + "plaintext_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_for_StructuredEncryption_EncryptPathStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm(&input.r#cmm)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_for_StructuredEncryption_EncryptPathStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm(&input.r#cmm)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cmm", - "cmm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_Dcmm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cmm", + "cmm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_structure", - "plaintext_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DplaintextStructure( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_structure", + "plaintext_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_name", - "table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureInput_DtableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_name", + "table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_for_StructuredEncryption_EncryptPathStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_structure", - "encrypted_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptPathStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_for_StructuredEncryption_EncryptPathStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_path_structure::EncryptPathStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DencryptedStructure( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_structure", + "encrypted_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "parsed_header", - "parsed_header is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptPathStructureOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "parsed_header", + "parsed_header is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_for_StructuredEncryption_EncryptStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure(&input.plaintext_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm(&input.cmm)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm( + &input.r#cmm, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_for_StructuredEncryption_EncryptStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure(&input.r#plaintext_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm( + &input.r#cmm, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cmm", - "cmm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_Dcmm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cmm", + "cmm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "crypto_schema", - "crypto_schema is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DcryptoSchema( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "crypto_schema", + "crypto_schema is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext_structure", - "plaintext_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DplaintextStructure( + input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext_structure", + "plaintext_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_name", - "table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureInput_DtableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_name", + "table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_for_StructuredEncryption_EncryptStructure(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure(&input.encrypted_structure)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema(&input.crypto_schema)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader(&input.parsed_header)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "crypto_schema", - "crypto_schema is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::EncryptStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_for_StructuredEncryption_EncryptStructure( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::encrypt_structure::EncryptStructureOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure(&input.r#encrypted_structure)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema(&input.r#crypto_schema)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader(&input.r#parsed_header)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DcryptoSchema( + input: &::std::option::Option< + ::std::collections::HashMap< + ::std::string::String, + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoAction, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "crypto_schema", + "crypto_schema is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_structure", - "encrypted_structure is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoSchemaMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DencryptedStructure( + input: &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_structure", + "encrypted_structure is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "parsed_header", - "parsed_header is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HEncryptStructureOutput_DparsedHeader( + input: &::std::option::Option< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "parsed_header", + "parsed_header is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DstoredEncryptionContext(&input.stored_encryption_context)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite_id", - "algorithm_suite_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ParsedHeader, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptedDataKeys(&input.r#encrypted_data_keys)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DstoredEncryptionContext(&input.r#stored_encryption_context)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptionContext(&input.r#encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite_id", + "algorithm_suite_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptedDataKeys(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_keys", - "encrypted_data_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptedDataKeys( + input: &::std::option::Option< + ::std::vec::Vec, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_keys", + "encrypted_data_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DstoredEncryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "stored_encryption_context", - "stored_encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HParsedHeader_DstoredEncryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "stored_encryption_context", + "stored_encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath_Dmember(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(ref inner) = &input { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPath_Dmember( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::PathSegment::Member(ref inner) = &input { validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment_Dmember(inner)?; } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment_Dmember(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions(&input.auth_actions)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes(&input.header_bytes)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_for_StructuredEncryption_ResolveAuthActions(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName(&input.table_name)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions(&input.auth_actions)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes(&input.header_bytes)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "auth_actions", - "auth_actions is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "header_bytes", - "header_bytes is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HPathSegment_Dmember( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions(&input.r#auth_actions)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes(&input.r#header_bytes)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_for_StructuredEncryption_ResolveAuthActions( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName(&input.r#table_name)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions(&input.r#auth_actions)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes(&input.r#header_bytes)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DauthActions( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::AuthItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "auth_actions", + "auth_actions is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_name", - "table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HAuthList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DheaderBytes( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "header_bytes", + "header_bytes is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions(&input.crypto_actions)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_for_StructuredEncryption_ResolveAuthActions(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions(&input.crypto_actions)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "crypto_actions", - "crypto_actions is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsInput_DtableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_name", + "table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap(input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dkey(inner_key)?; - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::ResolveAuthActionsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions(&input.r#crypto_actions)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_for_StructuredEncryption_ResolveAuthActions( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::operation::resolve_auth_actions::ResolveAuthActionsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions(&input.r#crypto_actions)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HResolveAuthActionsOutput_DcryptoActions( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::CryptoItem, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "crypto_actions", + "crypto_actions is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dvalue(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_Dvalue(&input.value)?; -validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_DtypeId(&input.type_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_DtypeId(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "type_id", - "type_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HCryptoList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap( + input: &::std::collections::HashMap<::std::string::String, crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dkey( + inner_key, + )?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataMap_Dvalue( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructuredDataTerminal, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_Dvalue(&input.r#value)?; + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_DtypeId(&input.r#type_id)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_DtypeId( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "type_id", + "type_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -if !(2..=2).contains(&input.as_ref().len()) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + if !(2..=2).contains(&input.as_ref().len()) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "type_id", "type_id failed to satisfy constraint: Member must have length between 2 and 2, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_Dvalue(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "value", - "value is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredEncryptionConfig(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment(input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment_Dkey(&input.key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment_Dkey(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(&input.key_provider_id)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(&input.key_provider_info)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(&input.ciphertext)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ciphertext", - "ciphertext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredDataTerminal_Dvalue( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "value", + "value is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_id", - "key_provider_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructuredEncryptionConfig( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::structured_encryption_config::StructuredEncryptionConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment( + input: &crate::deps::aws_cryptography_dbEncryptionSdk_structuredEncryption::types::StructureSegment, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment_Dkey( + &input.r#key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PdbEncryptionSdk_PstructuredEncryption_HStructureSegment_Dkey( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_info", - "key_provider_info is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + &input.r#key_provider_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + &input.r#key_provider_info, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + &input.r#ciphertext, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ciphertext", + "ciphertext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input: &::std::collections::HashMap<::std::string::String, ::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_id", + "key_provider_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_info", + "key_provider_info is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); - Ok(()) + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext( + input: &::std::collections::HashMap<::std::string::String, ::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client.rs index 31fc09ea6..e20c1bdca 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client.rs @@ -25,10 +25,14 @@ impl Client { inner.as_ref(), crate::_Wrappers_Compile::Result::Failure { .. } ) { - return Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny(inner.as_ref().error().clone())); + return Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner.as_ref().error().clone(), + ), + ); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key.rs index 9f1a13e58..7a1eca3d2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`CreateKeyOutput`](crate::operation::create_key::CreateKeyOutput) with field(s): /// - [`branch_key_identifier(Option<::std::string::String>)`](crate::operation::create_key::CreateKeyOutput::branch_key_identifier): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_key::CreateKeyError) - pub fn create_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyFluentBuilder { + pub fn create_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key_store.rs index 25b8da064..da9e049fd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/create_key_store.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`CreateKeyStoreOutput`](crate::operation::create_key_store::CreateKeyStoreOutput) with field(s): /// - [`table_arn(Option<::std::string::String>)`](crate::operation::create_key_store::CreateKeyStoreOutput::table_arn): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_key_store::CreateKeyStoreError) - pub fn create_key_store(&self) -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreFluentBuilder { + pub fn create_key_store(&self) -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_active_branch_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_active_branch_key.rs index 359a8f92b..fcbaa1662 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_active_branch_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_active_branch_key.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`GetActiveBranchKeyOutput`](crate::operation::get_active_branch_key::GetActiveBranchKeyOutput) with field(s): /// - [`branch_key_materials(Option)`](crate::operation::get_active_branch_key::GetActiveBranchKeyOutput::branch_key_materials): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_active_branch_key::GetActiveBranchKeyError) - pub fn get_active_branch_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyFluentBuilder { + pub fn get_active_branch_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_beacon_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_beacon_key.rs index a9145fb62..f0bab35dd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_beacon_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_beacon_key.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`GetBeaconKeyOutput`](crate::operation::get_beacon_key::GetBeaconKeyOutput) with field(s): /// - [`beacon_key_materials(Option)`](crate::operation::get_beacon_key::GetBeaconKeyOutput::beacon_key_materials): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_beacon_key::GetBeaconKeyError) - pub fn get_beacon_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyFluentBuilder { + pub fn get_beacon_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_branch_key_version.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_branch_key_version.rs index 4c3cfc4c5..7eab72445 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_branch_key_version.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_branch_key_version.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`GetBranchKeyVersionOutput`](crate::operation::get_branch_key_version::GetBranchKeyVersionOutput) with field(s): /// - [`branch_key_materials(Option)`](crate::operation::get_branch_key_version::GetBranchKeyVersionOutput::branch_key_materials): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_branch_key_version::GetBranchKeyVersionError) - pub fn get_branch_key_version(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionFluentBuilder { + pub fn get_branch_key_version(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_key_store_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_key_store_info.rs index 9129b90c8..ac5cddea7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_key_store_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/get_key_store_info.rs @@ -13,7 +13,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - [`kms_configuration(Option)`](crate::operation::get_key_store_info::GetKeyStoreInfoOutput::kms_configuration): (undocumented) /// - [`logical_key_store_name(Option<::std::string::String>)`](crate::operation::get_key_store_info::GetKeyStoreInfoOutput::logical_key_store_name): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_key_store_info::GetKeyStoreInfoError) - pub fn get_key_store_info(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoFluentBuilder { + pub fn get_key_store_info(&self) -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/version_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/version_key.rs index bec7b50d7..1724a2474 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/version_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/client/version_key.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_keyStore::client::Client { /// - On success, responds with [`VersionKeyOutput`](crate::operation::version_key::VersionKeyOutput) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::version_key::VersionKeyError) - pub fn version_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyFluentBuilder { + pub fn version_key(&self) -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyFluentBuilder{ crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions.rs index 7d77243e6..0611caa22 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions.rs @@ -3,56 +3,56 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod beacon_key_materials; - pub mod branch_key_materials; +pub mod branch_key_materials; - pub mod client; +pub mod client; - pub mod create_key; +pub mod create_key; - pub mod create_key_input; +pub mod create_key_input; - pub mod create_key_output; +pub mod create_key_output; - pub mod create_key_store; +pub mod create_key_store; - pub mod create_key_store_input; +pub mod create_key_store_input; - pub mod create_key_store_output; +pub mod create_key_store_output; - pub mod discovery; +pub mod discovery; - pub mod error; +pub mod error; - pub mod get_active_branch_key; +pub mod get_active_branch_key; - pub mod get_active_branch_key_input; +pub mod get_active_branch_key_input; - pub mod get_active_branch_key_output; +pub mod get_active_branch_key_output; - pub mod get_beacon_key; +pub mod get_beacon_key; - pub mod get_beacon_key_input; +pub mod get_beacon_key_input; - pub mod get_beacon_key_output; +pub mod get_beacon_key_output; - pub mod get_branch_key_version; +pub mod get_branch_key_version; - pub mod get_branch_key_version_input; +pub mod get_branch_key_version_input; - pub mod get_branch_key_version_output; +pub mod get_branch_key_version_output; - pub mod get_key_store_info; +pub mod get_key_store_info; - pub mod get_key_store_info_output; +pub mod get_key_store_info_output; - pub mod kms_configuration; +pub mod kms_configuration; - pub mod mr_discovery; +pub mod mr_discovery; - pub mod version_key; +pub mod version_key; - pub mod version_key_input; +pub mod version_key_input; - pub mod version_key_output; +pub mod version_key_output; pub mod key_store_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/beacon_key_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/beacon_key_materials.rs index f6bb6ffc0..19568c9a5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/beacon_key_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/beacon_key_materials.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::BeaconKeyMaterials, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -23,7 +23,7 @@ pub fn to_dafny_plain( , beaconKey: crate::standard_library_conversions::oblob_to_dafny(&value.beacon_key), hmacKeys: -::std::rc::Rc::new(match &value.hmac_keys { +::dafny_runtime::Rc::new(match &value.hmac_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -39,20 +39,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::BeaconKeyMaterials, >, ) -> crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials { @@ -91,7 +91,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/branch_key_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/branch_key_materials.rs index ad6db44e0..265ac3b30 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/branch_key_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/branch_key_materials.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -16,7 +16,7 @@ pub fn to_dafny_plain( ) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials { crate::r#software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials::BranchKeyMaterials { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), - branchKeyVersion: std::rc::Rc::new(match value.branch_key_version { + branchKeyVersion: dafny_runtime::Rc::new(match value.branch_key_version { Some(s) => crate::_Wrappers_Compile::Option::Some { value: dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&s.as_bytes().to_vec(), |b| *b) }, None => crate::_Wrappers_Compile::Option::None {}, }).Extract(), @@ -32,20 +32,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials, >, ) -> crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials { @@ -74,7 +74,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/client.rs index 73cbbd4bc..c2646b4e8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/client.rs @@ -8,9 +8,9 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::client::Client, -) -> - ::dafny_runtime::Object -{ +) -> ::dafny_runtime::Object< + dyn crate::r#software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient, +> { value.dafny_client.clone() } @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient >, ) -> crate::deps::aws_cryptography_keyStore::client::Client { - crate::deps::aws_cryptography_keyStore::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_keyStore::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key.rs index 2f6e427c4..5f7862515 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_key_input; +pub mod _create_key_input; - pub mod _create_key_output; +pub mod _create_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_input.rs index 722892c14..f570462b8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_input.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput::CreateKeyInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput::CreateKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier), encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -22,25 +22,42 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput { crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput::builder() - .set_branch_key_identifier(crate::standard_library_conversions::ostring_from_dafny(dafny_value.branchKeyIdentifier().clone())) - .set_encryption_context(match (*dafny_value.encryptionContext()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some( - ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, - |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| ::std::string::String::from_utf8(dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(&::std::borrow::Borrow::borrow(k), |b| *b)).unwrap(), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| ::std::string::String::from_utf8(dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(&::std::borrow::Borrow::borrow(v), |b| *b)).unwrap(), - ) - ), - _ => None -} -) + .set_branch_key_identifier(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.branchKeyIdentifier().clone(), + )) + .set_encryption_context(match (*dafny_value.encryptionContext()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap( + value, + |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| { + ::std::string::String::from_utf8( + dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec( + &::std::borrow::Borrow::borrow(k), + |b| *b, + ), + ) + .unwrap() + }, + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| { + ::std::string::String::from_utf8( + dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec( + &::std::borrow::Borrow::borrow(v), + |b| *b, + ), + ) + .unwrap() + }, + ), + ), + _ => None, + }) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_output.rs index 36affe8b6..9b3d0b2b6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key/_create_key_output.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput::CreateKeyOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput::CreateKeyOutput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput { crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput::builder() - .set_branch_key_identifier(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyIdentifier()) )) + .set_branch_key_identifier(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.branchKeyIdentifier(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_input.rs index 4f8de1890..7f5ed0587 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::CreateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -17,7 +17,7 @@ pub fn to_dafny_plain( crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput::CreateKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier), encryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -32,21 +32,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::CreateKeyInput { @@ -79,7 +83,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_output.rs index 73ec9b854..6458e9c79 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store.rs index 4ecd3d73d..f681d573f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_key_store_input; +pub mod _create_key_store_input; - pub mod _create_key_store_output; +pub mod _create_key_store_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_input.rs index 07f657e8a..f314f02b4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput::CreateKeyStoreInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput::CreateKeyStoreInput { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_output.rs index 4dea43410..94bfdf1fd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store/_create_key_store_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput::CreateKeyStoreOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput::CreateKeyStoreOutput { tableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_input.rs index 5df471ed3..3a6643ccf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_output.rs index 7d333e0e7..27371af6e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/create_key_store_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/discovery.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/discovery.rs index 28969982b..2eb3bfcbe 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/discovery.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/discovery.rs @@ -4,38 +4,40 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::Discovery, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::Discovery, ) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery { - crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery::Discovery { - - } + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery::Discovery {} } #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery, >, ) -> crate::deps::aws_cryptography_keyStore::types::Discovery { @@ -57,9 +59,13 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, + dafny_value: ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Discovery, + >, + >, + >, ) -> ::std::option::Option { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/error.rs index 5d1615cb3..6c361099b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/error.rs @@ -2,15 +2,21 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -19,22 +25,26 @@ pub fn to_opaque_error(value: String) -> } /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure -pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< - crate::_Wrappers_Compile::Result< - T, - ::std::rc::Rc - > - > -{ - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { +pub fn to_opaque_error_result( + value: String, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Result< + T, + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error, + >, + >, +> { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_keyStore::types::error::Error::KeyStoreException { message } => crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -55,7 +65,7 @@ crate::deps::aws_cryptography_keyStore::types::error::Error::TrentServiceError { crate::deps::aws_cryptography_keyStore::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -76,7 +86,7 @@ crate::deps::aws_cryptography_keyStore::types::error::Error::TrentServiceError { #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_keyStore::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key.rs index b2ba42651..7a610c7ef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_active_branch_key_input; +pub mod _get_active_branch_key_input; - pub mod _get_active_branch_key_output; +pub mod _get_active_branch_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_input.rs index c50ca1abd..e91463214 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_input.rs @@ -4,19 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput::GetActiveBranchKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput::GetActiveBranchKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput, >, -) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput { +) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput +{ crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput::builder() .set_branch_key_identifier(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyIdentifier()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_output.rs index f6db8f77c..24950bc50 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key/_get_active_branch_key_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput::GetActiveBranchKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput::GetActiveBranchKeyOutput { branchKeyMaterials: crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::to_dafny(&value.branch_key_materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput, >, -) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput { +) -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput{ crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput::builder() .set_branch_key_materials(Some( crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::from_dafny(dafny_value.branchKeyMaterials().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_input.rs index 4f2da4ba1..2cb678a07 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput, -) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput { +) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput +{ crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput::GetActiveBranchKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_output.rs index e952df0af..47b00c57b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_active_branch_key_output.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput, -) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput { +) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput +{ crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput::GetActiveBranchKeyOutput { branchKeyMaterials: crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::to_dafny(&value.branch_key_materials.clone().unwrap()) , @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput { @@ -59,10 +60,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key.rs index 606fcb270..dcd6353aa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_beacon_key_input; +pub mod _get_beacon_key_input; - pub mod _get_beacon_key_output; +pub mod _get_beacon_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_input.rs index d463891f3..4471ded76 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_input.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput::GetBeaconKeyInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput::GetBeaconKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput { crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput::builder() - .set_branch_key_identifier(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyIdentifier()) )) + .set_branch_key_identifier(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.branchKeyIdentifier(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_output.rs index 186c958ad..b30d65366 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key/_get_beacon_key_output.rs @@ -4,23 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput::GetBeaconKeyOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput::GetBeaconKeyOutput { beaconKeyMaterials: crate::deps::aws_cryptography_keyStore::conversions::beacon_key_materials::to_dafny(&value.beacon_key_materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput { crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput::builder() - .set_beacon_key_materials(Some( crate::deps::aws_cryptography_keyStore::conversions::beacon_key_materials::from_dafny(dafny_value.beaconKeyMaterials().clone()) - )) + .set_beacon_key_materials(Some( + crate::deps::aws_cryptography_keyStore::conversions::beacon_key_materials::from_dafny( + dafny_value.beaconKeyMaterials().clone(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_input.rs index 400d886a3..ef5a4769c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_output.rs index 30aceeffe..fef938c05 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_beacon_key_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version.rs index 57007fdb0..cfbef52a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_branch_key_version_input; +pub mod _get_branch_key_version_input; - pub mod _get_branch_key_version_output; +pub mod _get_branch_key_version_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_input.rs index 61136b836..b08664399 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput::GetBranchKeyVersionInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput::GetBranchKeyVersionInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), branchKeyVersion: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_version) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput, >, -) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput { +) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput{ crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput::builder() .set_branch_key_identifier(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyIdentifier()) )) .set_branch_key_version(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyVersion()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_output.rs index 4908e1a0a..7e08bde70 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version/_get_branch_key_version_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput::GetBranchKeyVersionOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput::GetBranchKeyVersionOutput { branchKeyMaterials: crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::to_dafny(&value.branch_key_materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput, >, -) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput { +) -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput{ crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput::builder() .set_branch_key_materials(Some( crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::from_dafny(dafny_value.branchKeyMaterials().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_input.rs index 5d318470d..0e29e79c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput, -) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput { +) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput +{ crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput::GetBranchKeyVersionInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), branchKeyVersion: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_version) .Extract(), @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput { @@ -59,10 +60,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_output.rs index f43f2863c..a67438e0c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_branch_key_version_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput, -) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput { +) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput{ crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput::GetBranchKeyVersionOutput { branchKeyMaterials: crate::deps::aws_cryptography_keyStore::conversions::branch_key_materials::to_dafny(&value.branch_key_materials.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info.rs index 8f9769903..f9cdfe834 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_key_store_info_output; +pub mod _get_key_store_info_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info/_get_key_store_info_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info/_get_key_store_info_output.rs index 12fba0dcc..d128f67bc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info/_get_key_store_info_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info/_get_key_store_info_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput::GetKeyStoreInfoOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput::GetKeyStoreInfoOutput { keyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_id) .Extract(), keyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_name) .Extract(), logicalKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.logical_key_store_name) .Extract(), @@ -19,9 +19,9 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info_output.rs index 4a280c09c..39615e259 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/get_key_store_info_output.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput, -) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput { +) -> crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput +{ crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput::GetKeyStoreInfoOutput { keyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_id) .Extract(), keyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_name) .Extract(), @@ -30,20 +31,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput { @@ -73,7 +74,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/key_store_config/_key_store_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/key_store_config/_key_store_config.rs index b34d90b55..f8d71ff42 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/key_store_config/_key_store_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/key_store_config/_key_store_config.rs @@ -5,22 +5,21 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::KeyStoreConfig, > { - ::std::rc::Rc::new(to_dafny_plain(value)) + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::KeyStoreConfig, >, ) -> crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig { plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig, @@ -31,7 +30,7 @@ pub fn to_dafny_plain( , logicalKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.logical_key_store_name) .Extract(), id: crate::standard_library_conversions::ostring_to_dafny(&value.id), - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -40,12 +39,12 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ddbClient: ::std::rc::Rc::new(match &value.ddb_client { + ddbClient: ::dafny_runtime::Rc::new(match &value.ddb_client { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::client::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - kmsClient: ::std::rc::Rc::new(match &value.kms_client { + kmsClient: ::dafny_runtime::Rc::new(match &value.kms_client { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/kms_configuration.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/kms_configuration.rs index b7f30c699..778531022 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/kms_configuration.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/kms_configuration.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration, > { - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(x) => crate::r#software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration::kmsKeyArn { kmsKeyArn: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&x), @@ -32,11 +32,11 @@ crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(x) #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration, >, ) -> crate::deps::aws_cryptography_keyStore::types::KmsConfiguration { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration::kmsKeyArn { kmsKeyArn: x @ _, } => crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(x)), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/mr_discovery.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/mr_discovery.rs index b10d3e6fb..768ac9234 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/mr_discovery.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/mr_discovery.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::MRDiscovery, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -21,21 +21,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::keystore::internaldafny::types::MRDiscovery, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::MRDiscovery, >, ) -> crate::deps::aws_cryptography_keyStore::types::MrDiscovery { @@ -57,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key.rs index 409d38974..ff2b3d5ba 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _version_key_input; +pub mod _version_key_input; - pub mod _version_key_output; +pub mod _version_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_input.rs index b00fe6769..7b6dfce87 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_input.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput::VersionKeyInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput::VersionKeyInput { branchKeyIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_identifier) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput { crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput::builder() - .set_branch_key_identifier(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyIdentifier()) )) + .set_branch_key_identifier(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.branchKeyIdentifier(), + ), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_output.rs index 005b7c7db..ab797528e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key/_version_key_output.rs @@ -4,21 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput::VersionKeyOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput::VersionKeyOutput { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput { crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput::builder() - .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_input.rs index ba653b0ea..34cf2a870 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::VersionKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput, >, ) -> crate::deps::aws_cryptography_keyStore::types::VersionKeyInput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_output.rs index 4595d75e7..f5bafcae5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/conversions/version_key_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput, >, ) -> crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key.rs index 7fd1886b1..d17c6a666 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key.rs @@ -20,7 +20,7 @@ impl CreateKey { > { crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_for_KeyStore_CreateKey(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::create_key::_create_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::create_key::_create_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl CreateKey { crate::deps::aws_cryptography_keyStore::conversions::create_key::_create_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_input.rs index 12e4eadc7..f8dbdf9a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_input.rs @@ -6,23 +6,29 @@ #[allow(missing_docs)] pub struct CreateKeyInput { /// The identifier for the created Branch Key. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl CreateKeyInput { /// The identifier for the created Branch Key. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } } impl CreateKeyInput { /// Creates a new builder-style object to manufacture [`CreateKeyInput`](crate::operation::create_key::builders::CreateKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyInputBuilder::default() } } @@ -34,37 +40,59 @@ impl CreateKeyInput { )] pub struct CreateKeyInputBuilder { pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl CreateKeyInputBuilder { /// The identifier for the created Branch Key. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the created Branch Key. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the created Branch Key. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the created Branch Key. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the created Branch Key. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } /// Consumes the builder and constructs a [`CreateKeyInput`](crate::operation::operation::CreateKeyInput). pub fn build( self, @@ -72,9 +100,11 @@ pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collection crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput { - branch_key_identifier: self.branch_key_identifier, -encryption_context: self.encryption_context, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput { + branch_key_identifier: self.branch_key_identifier, + encryption_context: self.encryption_context, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_output.rs index 97077f30d..8687a56e6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/_create_key_output.rs @@ -6,17 +6,17 @@ /// Outputs for Branch Key creation. pub struct CreateKeyOutput { /// A identifier for the created Branch Key. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl CreateKeyOutput { /// A identifier for the created Branch Key. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl CreateKeyOutput { /// Creates a new builder-style object to manufacture [`CreateKeyOutput`](crate::operation::create_key::builders::CreateKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyOutputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct CreateKeyOutputBuilder { } impl CreateKeyOutputBuilder { /// A identifier for the created Branch Key. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// A identifier for the created Branch Key. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// A identifier for the created Branch Key. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// A identifier for the created Branch Key. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// A identifier for the created Branch Key. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`CreateKeyOutput`](crate::operation::operation::CreateKeyOutput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/builders.rs index d20f83f93..35e07f613 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key/builders.rs @@ -36,7 +36,7 @@ impl CreateKeyFluentBuilder { } } /// Access the CreateKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::create_key::builders::CreateKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -54,40 +54,65 @@ impl CreateKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKey::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKey::send( + &self.client, + input, + ) + .await } /// The identifier for the created Branch Key. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_identifier(input.into()); - self -} -/// The identifier for the created Branch Key. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_identifier(input); - self -} -/// The identifier for the created Branch Key. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_identifier() -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_identifier(input.into()); + self + } + /// The identifier for the created Branch Key. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_identifier(input); + self + } + /// The identifier for the created Branch Key. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_identifier() + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store.rs index 876d7abd7..42c7f1439 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store.rs @@ -20,7 +20,7 @@ impl CreateKeyStore { > { crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput_for_KeyStore_CreateKeyStore(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::create_key_store::_create_key_store_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::create_key_store::_create_key_store_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateKeyStore(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl CreateKeyStore { crate::deps::aws_cryptography_keyStore::conversions::create_key_store::_create_key_store_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_input.rs index 312b9020e..d640649ee 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_input.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct CreateKeyStoreInput { - -} -impl CreateKeyStoreInput { - -} +pub struct CreateKeyStoreInput {} +impl CreateKeyStoreInput {} impl CreateKeyStoreInput { /// Creates a new builder-style object to manufacture [`CreateKeyStoreInput`](crate::operation::create_key_store::builders::CreateKeyStoreInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreInputBuilder::default() } } @@ -22,11 +18,8 @@ impl CreateKeyStoreInput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct CreateKeyStoreInputBuilder { - -} +pub struct CreateKeyStoreInputBuilder {} impl CreateKeyStoreInputBuilder { - /// Consumes the builder and constructs a [`CreateKeyStoreInput`](crate::operation::operation::CreateKeyStoreInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_output.rs index c5df84240..cb8836754 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/_create_key_store_output.rs @@ -6,17 +6,17 @@ /// Outputs for Key Store DynamoDB table creation. pub struct CreateKeyStoreOutput { /// The ARN of the DynamoDB table that backs this Key Store. -pub table_arn: ::std::option::Option<::std::string::String>, + pub table_arn: ::std::option::Option<::std::string::String>, } impl CreateKeyStoreOutput { /// The ARN of the DynamoDB table that backs this Key Store. -pub fn table_arn(&self) -> &::std::option::Option<::std::string::String> { - &self.table_arn -} + pub fn table_arn(&self) -> &::std::option::Option<::std::string::String> { + &self.table_arn + } } impl CreateKeyStoreOutput { /// Creates a new builder-style object to manufacture [`CreateKeyStoreOutput`](crate::operation::create_key_store::builders::CreateKeyStoreOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct CreateKeyStoreOutputBuilder { } impl CreateKeyStoreOutputBuilder { /// The ARN of the DynamoDB table that backs this Key Store. -pub fn table_arn(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_arn = ::std::option::Option::Some(input.into()); - self -} -/// The ARN of the DynamoDB table that backs this Key Store. -pub fn set_table_arn(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_arn = input; - self -} -/// The ARN of the DynamoDB table that backs this Key Store. -pub fn get_table_arn(&self) -> &::std::option::Option<::std::string::String> { - &self.table_arn -} + pub fn table_arn(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_arn = ::std::option::Option::Some(input.into()); + self + } + /// The ARN of the DynamoDB table that backs this Key Store. + pub fn set_table_arn(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_arn = input; + self + } + /// The ARN of the DynamoDB table that backs this Key Store. + pub fn get_table_arn(&self) -> &::std::option::Option<::std::string::String> { + &self.table_arn + } /// Consumes the builder and constructs a [`CreateKeyStoreOutput`](crate::operation::operation::CreateKeyStoreOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/builders.rs index 413090db2..82504f41a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/create_key_store/builders.rs @@ -36,7 +36,7 @@ impl CreateKeyStoreFluentBuilder { } } /// Access the CreateKeyStore as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::create_key_store::builders::CreateKeyStoreInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -54,13 +54,16 @@ impl CreateKeyStoreFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStore::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStore::send( + &self.client, + input, + ) + .await } - - } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key.rs index 48327c275..cf735687b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key.rs @@ -17,10 +17,10 @@ impl GetActiveBranchKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_for_KeyStore_GetActiveBranchKey(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_active_branch_key::_get_active_branch_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_active_branch_key::_get_active_branch_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetActiveBranchKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GetActiveBranchKey { crate::deps::aws_cryptography_keyStore::conversions::get_active_branch_key::_get_active_branch_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_input.rs index c0e9a041c..37feb4c9a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_input.rs @@ -6,17 +6,17 @@ /// Inputs for getting a Branch Key's ACTIVE version. pub struct GetActiveBranchKeyInput { /// The identifier for the Branch Key to get the ACTIVE version for. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl GetActiveBranchKeyInput { /// The identifier for the Branch Key to get the ACTIVE version for. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl GetActiveBranchKeyInput { /// Creates a new builder-style object to manufacture [`GetActiveBranchKeyInput`](crate::operation::get_active_branch_key::builders::GetActiveBranchKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetActiveBranchKeyInputBuilder { } impl GetActiveBranchKeyInputBuilder { /// The identifier for the Branch Key to get the ACTIVE version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`GetActiveBranchKeyInput`](crate::operation::operation::GetActiveBranchKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput { branch_key_identifier: self.branch_key_identifier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_output.rs index 099cb8ca6..b32086f31 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/_get_active_branch_key_output.rs @@ -6,17 +6,21 @@ /// Outputs for getting a Branch Key's ACTIVE version. pub struct GetActiveBranchKeyOutput { /// The materials for the Branch Key. -pub branch_key_materials: ::std::option::Option, + pub branch_key_materials: + ::std::option::Option, } impl GetActiveBranchKeyOutput { /// The materials for the Branch Key. -pub fn branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } } impl GetActiveBranchKeyOutput { /// Creates a new builder-style object to manufacture [`GetActiveBranchKeyOutput`](crate::operation::get_active_branch_key::builders::GetActiveBranchKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyOutputBuilder::default() } } @@ -27,30 +31,44 @@ impl GetActiveBranchKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetActiveBranchKeyOutputBuilder { - pub(crate) branch_key_materials: ::std::option::Option, + pub(crate) branch_key_materials: + ::std::option::Option, } impl GetActiveBranchKeyOutputBuilder { /// The materials for the Branch Key. -pub fn branch_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Branch Key. -pub fn set_branch_key_materials(mut self, input: ::std::option::Option) -> Self { - self.branch_key_materials = input; - self -} -/// The materials for the Branch Key. -pub fn get_branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Branch Key. + pub fn set_branch_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = input; + self + } + /// The materials for the Branch Key. + pub fn get_branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } /// Consumes the builder and constructs a [`GetActiveBranchKeyOutput`](crate::operation::operation::GetActiveBranchKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput { branch_key_materials: self.branch_key_materials, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/builders.rs index ce8d6f507..3252e2d5d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_active_branch_key/builders.rs @@ -13,7 +13,7 @@ impl GetActiveBranchKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let mut fluent_builder = client.get_active_branch_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -36,7 +36,7 @@ impl GetActiveBranchKeyFluentBuilder { } } /// Access the GetActiveBranchKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::builders::GetActiveBranchKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +45,7 @@ impl GetActiveBranchKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let input = self .inner .build() @@ -54,26 +54,33 @@ impl GetActiveBranchKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKey::send(&self.client, input).await } /// The identifier for the Branch Key to get the ACTIVE version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_identifier(input.into()); - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_identifier(input); - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_identifier() -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_identifier(input.into()); + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_identifier(input); + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key.rs index 2ecfe1736..eda72e261 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key.rs @@ -20,7 +20,7 @@ impl GetBeaconKey { > { crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_for_KeyStore_GetBeaconKey(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_beacon_key::_get_beacon_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_beacon_key::_get_beacon_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetBeaconKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GetBeaconKey { crate::deps::aws_cryptography_keyStore::conversions::get_beacon_key::_get_beacon_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_input.rs index 39f9a41f1..7115fce32 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_input.rs @@ -6,17 +6,17 @@ /// Inputs for getting a Beacon Key pub struct GetBeaconKeyInput { /// The identifier of the Branch Key the Beacon Key is associated with. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl GetBeaconKeyInput { /// The identifier of the Branch Key the Beacon Key is associated with. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl GetBeaconKeyInput { /// Creates a new builder-style object to manufacture [`GetBeaconKeyInput`](crate::operation::get_beacon_key::builders::GetBeaconKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyInputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct GetBeaconKeyInputBuilder { } impl GetBeaconKeyInputBuilder { /// The identifier of the Branch Key the Beacon Key is associated with. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`GetBeaconKeyInput`](crate::operation::operation::GetBeaconKeyInput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_output.rs index 24648e27e..f497539a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/_get_beacon_key_output.rs @@ -6,17 +6,21 @@ /// Outputs for getting a Beacon Key pub struct GetBeaconKeyOutput { /// The materials for the Beacon Key. -pub beacon_key_materials: ::std::option::Option, + pub beacon_key_materials: + ::std::option::Option, } impl GetBeaconKeyOutput { /// The materials for the Beacon Key. -pub fn beacon_key_materials(&self) -> &::std::option::Option { - &self.beacon_key_materials -} + pub fn beacon_key_materials( + &self, + ) -> &::std::option::Option + { + &self.beacon_key_materials + } } impl GetBeaconKeyOutput { /// Creates a new builder-style object to manufacture [`GetBeaconKeyOutput`](crate::operation::get_beacon_key::builders::GetBeaconKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyOutputBuilder::default() } } @@ -27,23 +31,37 @@ impl GetBeaconKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBeaconKeyOutputBuilder { - pub(crate) beacon_key_materials: ::std::option::Option, + pub(crate) beacon_key_materials: + ::std::option::Option, } impl GetBeaconKeyOutputBuilder { /// The materials for the Beacon Key. -pub fn beacon_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.beacon_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Beacon Key. -pub fn set_beacon_key_materials(mut self, input: ::std::option::Option) -> Self { - self.beacon_key_materials = input; - self -} -/// The materials for the Beacon Key. -pub fn get_beacon_key_materials(&self) -> &::std::option::Option { - &self.beacon_key_materials -} + pub fn beacon_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + >, + ) -> Self { + self.beacon_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Beacon Key. + pub fn set_beacon_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + >, + ) -> Self { + self.beacon_key_materials = input; + self + } + /// The materials for the Beacon Key. + pub fn get_beacon_key_materials( + &self, + ) -> &::std::option::Option + { + &self.beacon_key_materials + } /// Consumes the builder and constructs a [`GetBeaconKeyOutput`](crate::operation::operation::GetBeaconKeyOutput). pub fn build( self, @@ -51,8 +69,10 @@ pub fn get_beacon_key_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput { - beacon_key_materials: self.beacon_key_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput { + beacon_key_materials: self.beacon_key_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/builders.rs index 5d49bcb77..e949b7dd8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_beacon_key/builders.rs @@ -36,7 +36,7 @@ impl GetBeaconKeyFluentBuilder { } } /// Access the GetBeaconKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::builders::GetBeaconKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -54,26 +54,37 @@ impl GetBeaconKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKey::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKey::send( + &self.client, + input, + ) + .await } /// The identifier of the Branch Key the Beacon Key is associated with. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_identifier(input.into()); - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_identifier(input); - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_identifier() -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_identifier(input.into()); + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_identifier(input); + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version.rs index 1d3aba8ac..2d6c7e7d1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version.rs @@ -17,10 +17,10 @@ impl GetBranchKeyVersion { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_for_KeyStore_GetBranchKeyVersion(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_branch_key_version::_get_branch_key_version_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::get_branch_key_version::_get_branch_key_version_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetBranchKeyVersion(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GetBranchKeyVersion { crate::deps::aws_cryptography_keyStore::conversions::get_branch_key_version::_get_branch_key_version_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_input.rs index 4f7f88728..181bb44cd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_input.rs @@ -6,23 +6,23 @@ /// Inputs for getting a version of a Branch Key. pub struct GetBranchKeyVersionInput { /// The identifier for the Branch Key to get a particular version for. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, -/// The version to get. -pub branch_key_version: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, + /// The version to get. + pub branch_key_version: ::std::option::Option<::std::string::String>, } impl GetBranchKeyVersionInput { /// The identifier for the Branch Key to get a particular version for. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// The version to get. -pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// The version to get. + pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } } impl GetBranchKeyVersionInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyVersionInput`](crate::operation::get_branch_key_version::builders::GetBranchKeyVersionInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionInputBuilder::default() } } @@ -34,44 +34,56 @@ impl GetBranchKeyVersionInput { )] pub struct GetBranchKeyVersionInputBuilder { pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, + pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, } impl GetBranchKeyVersionInputBuilder { /// The identifier for the Branch Key to get a particular version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// The version to get. -pub fn branch_key_version(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_version = ::std::option::Option::Some(input.into()); - self -} -/// The version to get. -pub fn set_branch_key_version(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_version = input; - self -} -/// The version to get. -pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// The version to get. + pub fn branch_key_version( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_version = ::std::option::Option::Some(input.into()); + self + } + /// The version to get. + pub fn set_branch_key_version( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_version = input; + self + } + /// The version to get. + pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } /// Consumes the builder and constructs a [`GetBranchKeyVersionInput`](crate::operation::operation::GetBranchKeyVersionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput { branch_key_identifier: self.branch_key_identifier, branch_key_version: self.branch_key_version, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_output.rs index f59a85092..e3a9e8d8a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/_get_branch_key_version_output.rs @@ -6,17 +6,21 @@ /// Outputs for getting a version of a Branch Key. pub struct GetBranchKeyVersionOutput { /// The materials for the Branch Key. -pub branch_key_materials: ::std::option::Option, + pub branch_key_materials: + ::std::option::Option, } impl GetBranchKeyVersionOutput { /// The materials for the Branch Key. -pub fn branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } } impl GetBranchKeyVersionOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyVersionOutput`](crate::operation::get_branch_key_version::builders::GetBranchKeyVersionOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionOutputBuilder::default() } } @@ -27,30 +31,44 @@ impl GetBranchKeyVersionOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyVersionOutputBuilder { - pub(crate) branch_key_materials: ::std::option::Option, + pub(crate) branch_key_materials: + ::std::option::Option, } impl GetBranchKeyVersionOutputBuilder { /// The materials for the Branch Key. -pub fn branch_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Branch Key. -pub fn set_branch_key_materials(mut self, input: ::std::option::Option) -> Self { - self.branch_key_materials = input; - self -} -/// The materials for the Branch Key. -pub fn get_branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Branch Key. + pub fn set_branch_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = input; + self + } + /// The materials for the Branch Key. + pub fn get_branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } /// Consumes the builder and constructs a [`GetBranchKeyVersionOutput`](crate::operation::operation::GetBranchKeyVersionOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput { branch_key_materials: self.branch_key_materials, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/builders.rs index 2106362ce..6ad157005 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_branch_key_version/builders.rs @@ -13,7 +13,7 @@ impl GetBranchKeyVersionInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let mut fluent_builder = client.get_branch_key_version(); fluent_builder.inner = self; fluent_builder.send().await @@ -36,7 +36,7 @@ impl GetBranchKeyVersionFluentBuilder { } } /// Access the GetBranchKeyVersion as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::builders::GetBranchKeyVersionInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +45,7 @@ impl GetBranchKeyVersionFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let input = self .inner .build() @@ -54,40 +54,53 @@ impl GetBranchKeyVersionFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersion::send(&self.client, input).await } /// The identifier for the Branch Key to get a particular version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_identifier(input.into()); - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_identifier(input); - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_identifier() -} -/// The version to get. -pub fn branch_key_version(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_version(input.into()); - self -} -/// The version to get. -pub fn set_branch_key_version(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_version(input); - self -} -/// The version to get. -pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_version() -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_identifier(input.into()); + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_identifier(input); + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_identifier() + } + /// The version to get. + pub fn branch_key_version( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_version(input.into()); + self + } + /// The version to get. + pub fn set_branch_key_version( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_version(input); + self + } + /// The version to get. + pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_version() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info.rs index 72abebb3a..4fc42bd03 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info.rs @@ -17,12 +17,11 @@ impl GetKeyStoreInfo { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ crate::deps::aws_cryptography_keyStore::validation::validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = (); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).GetKeyStoreInfo(); + let inner_input = (); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetKeyStoreInfo(); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -31,9 +30,11 @@ impl GetKeyStoreInfo { crate::deps::aws_cryptography_keyStore::conversions::get_key_store_info::_get_key_store_info_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_get_key_store_info_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_get_key_store_info_output.rs index 224a79d9d..274bb4a94 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_get_key_store_info_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_get_key_store_info_output.rs @@ -6,41 +6,45 @@ /// The configuration information for a Key Store. pub struct GetKeyStoreInfoOutput { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// An identifier for this Key Store. -pub key_store_id: ::std::option::Option<::std::string::String>, -/// The DynamoDB table name that backs this Key Store. -pub key_store_name: ::std::option::Option<::std::string::String>, -/// Configures Key Store's KMS Key ARN restrictions. -pub kms_configuration: ::std::option::Option, -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub logical_key_store_name: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// An identifier for this Key Store. + pub key_store_id: ::std::option::Option<::std::string::String>, + /// The DynamoDB table name that backs this Key Store. + pub key_store_name: ::std::option::Option<::std::string::String>, + /// Configures Key Store's KMS Key ARN restrictions. + pub kms_configuration: + ::std::option::Option, + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub logical_key_store_name: ::std::option::Option<::std::string::String>, } impl GetKeyStoreInfoOutput { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn key_store_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_id -} -/// The DynamoDB table name that backs this Key Store. -pub fn key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_name -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn key_store_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_id + } + /// The DynamoDB table name that backs this Key Store. + pub fn key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_name + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } } impl GetKeyStoreInfoOutput { /// Creates a new builder-style object to manufacture [`GetKeyStoreInfoOutput`](crate::operation::get_key_store_info::builders::GetKeyStoreInfoOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::GetKeyStoreInfoOutputBuilder::default() } } @@ -52,89 +56,123 @@ impl GetKeyStoreInfoOutput { )] pub struct GetKeyStoreInfoOutputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) key_store_id: ::std::option::Option<::std::string::String>, -pub(crate) key_store_name: ::std::option::Option<::std::string::String>, -pub(crate) kms_configuration: ::std::option::Option, -pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, + pub(crate) key_store_id: ::std::option::Option<::std::string::String>, + pub(crate) key_store_name: ::std::option::Option<::std::string::String>, + pub(crate) kms_configuration: + ::std::option::Option, + pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, } impl GetKeyStoreInfoOutputBuilder { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn key_store_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_store_id = ::std::option::Option::Some(input.into()); - self -} -/// An identifier for this Key Store. -pub fn set_key_store_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_store_id = input; - self -} -/// An identifier for this Key Store. -pub fn get_key_store_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_id -} -/// The DynamoDB table name that backs this Key Store. -pub fn key_store_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_store_name = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn set_key_store_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_store_name = input; - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn get_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_name -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_configuration = ::std::option::Option::Some(input.into()); - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn set_kms_configuration(mut self, input: ::std::option::Option) -> Self { - self.kms_configuration = input; - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn get_kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn logical_key_store_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.logical_key_store_name = ::std::option::Option::Some(input.into()); - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn set_logical_key_store_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.logical_key_store_name = input; - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn key_store_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_store_id = ::std::option::Option::Some(input.into()); + self + } + /// An identifier for this Key Store. + pub fn set_key_store_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_store_id = input; + self + } + /// An identifier for this Key Store. + pub fn get_key_store_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_id + } + /// The DynamoDB table name that backs this Key Store. + pub fn key_store_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_store_name = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn set_key_store_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_store_name = input; + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn get_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_name + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = ::std::option::Option::Some(input.into()); + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn set_kms_configuration( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = input; + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn get_kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn logical_key_store_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.logical_key_store_name = ::std::option::Option::Some(input.into()); + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn set_logical_key_store_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.logical_key_store_name = input; + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } /// Consumes the builder and constructs a [`GetKeyStoreInfoOutput`](crate::operation::operation::GetKeyStoreInfoOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput { grant_tokens: self.grant_tokens, key_store_id: self.key_store_id, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_unit.rs index fed8d2a2b..a70efcfa1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/_unit.rs @@ -4,15 +4,13 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::get_key_store_info::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::UnitBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::UnitBuilder + { crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::UnitBuilder::default() } } @@ -22,11 +20,8 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, @@ -34,8 +29,8 @@ impl UnitBuilder { crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/builders.rs index 867d8cc6c..988b4dbe4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/get_key_store_info/builders.rs @@ -13,7 +13,7 @@ impl UnitBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let mut fluent_builder = client.get_key_store_info(); fluent_builder.inner = self; fluent_builder.send().await @@ -36,7 +36,10 @@ impl GetKeyStoreInfoFluentBuilder { } } /// Access the GetKeyStoreInfo as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::UnitBuilder { + pub fn as_input( + &self, + ) -> &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::builders::UnitBuilder + { &self.inner } /// Sends the request and returns the response. @@ -45,7 +48,7 @@ impl GetKeyStoreInfoFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, crate::deps::aws_cryptography_keyStore::types::error::Error, - > { + >{ let input = self .inner .build() @@ -54,13 +57,12 @@ impl GetKeyStoreInfoFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfo::send(&self.client, input).await } - - } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key.rs index 057f4fb87..e866afdb5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key.rs @@ -20,7 +20,7 @@ impl VersionKey { > { crate::deps::aws_cryptography_keyStore::validation::validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_for_KeyStore_VersionKey(&input) .map_err(crate::deps::aws_cryptography_keyStore::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_keyStore::conversions::version_key::_version_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_keyStore::conversions::version_key::_version_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).VersionKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl VersionKey { crate::deps::aws_cryptography_keyStore::conversions::version_key::_version_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_keyStore::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_input.rs index e622a3e4d..9a4aebb69 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_input.rs @@ -6,17 +6,17 @@ /// Inputs for versioning a Branch Key. pub struct VersionKeyInput { /// The identifier for the Branch Key to be versioned. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl VersionKeyInput { /// The identifier for the Branch Key to be versioned. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl VersionKeyInput { /// Creates a new builder-style object to manufacture [`VersionKeyInput`](crate::operation::version_key::builders::VersionKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyInputBuilder{ crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyInputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct VersionKeyInputBuilder { } impl VersionKeyInputBuilder { /// The identifier for the Branch Key to be versioned. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to be versioned. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to be versioned. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to be versioned. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to be versioned. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`VersionKeyInput`](crate::operation::operation::VersionKeyInput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_output.rs index 90bed9ee3..c1ff4e7ba 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/_version_key_output.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// Outputs for versioning a Branch Key. -pub struct VersionKeyOutput { - -} -impl VersionKeyOutput { - -} +pub struct VersionKeyOutput {} +impl VersionKeyOutput {} impl VersionKeyOutput { /// Creates a new builder-style object to manufacture [`VersionKeyOutput`](crate::operation::version_key::builders::VersionKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyOutputBuilder{ crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyOutputBuilder::default() } } @@ -22,11 +18,8 @@ impl VersionKeyOutput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct VersionKeyOutputBuilder { - -} +pub struct VersionKeyOutputBuilder {} impl VersionKeyOutputBuilder { - /// Consumes the builder and constructs a [`VersionKeyOutput`](crate::operation::operation::VersionKeyOutput). pub fn build( self, @@ -34,8 +27,8 @@ impl VersionKeyOutputBuilder { crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/builders.rs index 1ea008c78..1f0c08304 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/operation/version_key/builders.rs @@ -36,7 +36,7 @@ impl VersionKeyFluentBuilder { } } /// Access the VersionKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_keyStore::operation::version_key::builders::VersionKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -54,26 +54,37 @@ impl VersionKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKey::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_keyStore::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKey::send( + &self.client, + input, + ) + .await } /// The identifier for the Branch Key to be versioned. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_identifier(input.into()); - self -} -/// The identifier for the Branch Key to be versioned. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_identifier(input); - self -} -/// The identifier for the Branch Key to be versioned. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_identifier() -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_identifier(input.into()); + self + } + /// The identifier for the Branch Key to be versioned. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_identifier(input); + self + } + /// The identifier for the Branch Key to be versioned. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types.rs index ec5a4cbf8..15081c57f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types.rs @@ -7,8 +7,6 @@ pub use crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStor pub mod builders; - - mod _beacon_key_materials; pub use crate::deps::aws_cryptography_keyStore::types::_beacon_key_materials::BeaconKeyMaterials; mod _branch_key_materials; @@ -46,7 +44,5 @@ pub use crate::deps::aws_cryptography_keyStore::types::_version_key_output::Vers pub mod error; - - mod _kms_configuration; pub use crate::deps::aws_cryptography_keyStore::types::_kms_configuration::KmsConfiguration; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_beacon_key_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_beacon_key_materials.rs index fa84ab695..b71d9705c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_beacon_key_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_beacon_key_materials.rs @@ -6,36 +6,50 @@ #[allow(missing_docs)] pub struct BeaconKeyMaterials { #[allow(missing_docs)] -pub beacon_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub beacon_key_identifier: ::std::option::Option<::std::string::String>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub hmac_keys: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>, + pub beacon_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub beacon_key_identifier: ::std::option::Option<::std::string::String>, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub hmac_keys: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, } impl BeaconKeyMaterials { #[allow(missing_docs)] -pub fn beacon_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.beacon_key -} -#[allow(missing_docs)] -pub fn beacon_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.beacon_key_identifier -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn hmac_keys(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>> { - &self.hmac_keys -} + pub fn beacon_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.beacon_key + } + #[allow(missing_docs)] + pub fn beacon_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.beacon_key_identifier + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn hmac_keys( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + > { + &self.hmac_keys + } } impl BeaconKeyMaterials { /// Creates a new builder-style object to manufacture [`BeaconKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::BeaconKeyMaterialsBuilder { - crate::deps::aws_cryptography_keyStore::types::builders::BeaconKeyMaterialsBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::BeaconKeyMaterialsBuilder { + crate::deps::aws_cryptography_keyStore::types::builders::BeaconKeyMaterialsBuilder::default( + ) } } @@ -46,67 +60,111 @@ impl BeaconKeyMaterials { )] pub struct BeaconKeyMaterialsBuilder { pub(crate) beacon_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) beacon_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) hmac_keys: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>, + pub(crate) beacon_key_identifier: ::std::option::Option<::std::string::String>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) hmac_keys: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, } impl BeaconKeyMaterialsBuilder { #[allow(missing_docs)] -pub fn beacon_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.beacon_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_beacon_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.beacon_key = input; - self -} -#[allow(missing_docs)] -pub fn get_beacon_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.beacon_key -} -#[allow(missing_docs)] -pub fn beacon_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.beacon_key_identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_beacon_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.beacon_key_identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_beacon_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.beacon_key_identifier -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn hmac_keys(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>) -> Self { - self.hmac_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_hmac_keys(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>) -> Self { - self.hmac_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_hmac_keys(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>> { - &self.hmac_keys -} + pub fn beacon_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.beacon_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_beacon_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.beacon_key = input; + self + } + #[allow(missing_docs)] + pub fn get_beacon_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.beacon_key + } + #[allow(missing_docs)] + pub fn beacon_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.beacon_key_identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_beacon_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.beacon_key_identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_beacon_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.beacon_key_identifier + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn hmac_keys( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, + ) -> Self { + self.hmac_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_hmac_keys( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, + ) -> Self { + self.hmac_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_hmac_keys( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + > { + &self.hmac_keys + } /// Consumes the builder and constructs a [`BeaconKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials). pub fn build( self, @@ -114,11 +172,13 @@ pub fn get_hmac_keys(&self) -> &::std::option::Option<::std::collections::HashMa crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials { - beacon_key: self.beacon_key, -beacon_key_identifier: self.beacon_key_identifier, -encryption_context: self.encryption_context, -hmac_keys: self.hmac_keys, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials { + beacon_key: self.beacon_key, + beacon_key_identifier: self.beacon_key_identifier, + encryption_context: self.encryption_context, + hmac_keys: self.hmac_keys, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_branch_key_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_branch_key_materials.rs index ddc026275..86c2e9632 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_branch_key_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_branch_key_materials.rs @@ -6,36 +6,44 @@ #[allow(missing_docs)] pub struct BranchKeyMaterials { #[allow(missing_docs)] -pub branch_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub branch_key_identifier: ::std::option::Option<::std::string::String>, -#[allow(missing_docs)] -pub branch_key_version: ::std::option::Option<::std::string::String>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub branch_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub branch_key_identifier: ::std::option::Option<::std::string::String>, + #[allow(missing_docs)] + pub branch_key_version: ::std::option::Option<::std::string::String>, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl BranchKeyMaterials { #[allow(missing_docs)] -pub fn branch_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.branch_key -} -#[allow(missing_docs)] -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -#[allow(missing_docs)] -pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.branch_key + } + #[allow(missing_docs)] + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + #[allow(missing_docs)] + pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } } impl BranchKeyMaterials { /// Creates a new builder-style object to manufacture [`BranchKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::BranchKeyMaterialsBuilder { - crate::deps::aws_cryptography_keyStore::types::builders::BranchKeyMaterialsBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::BranchKeyMaterialsBuilder { + crate::deps::aws_cryptography_keyStore::types::builders::BranchKeyMaterialsBuilder::default( + ) } } @@ -46,67 +54,101 @@ impl BranchKeyMaterials { )] pub struct BranchKeyMaterialsBuilder { pub(crate) branch_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, + pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl BranchKeyMaterialsBuilder { #[allow(missing_docs)] -pub fn branch_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.branch_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_branch_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.branch_key = input; - self -} -#[allow(missing_docs)] -pub fn get_branch_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.branch_key -} -#[allow(missing_docs)] -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -#[allow(missing_docs)] -pub fn branch_key_version(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_version = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_branch_key_version(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_version = input; - self -} -#[allow(missing_docs)] -pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.branch_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_branch_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.branch_key = input; + self + } + #[allow(missing_docs)] + pub fn get_branch_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.branch_key + } + #[allow(missing_docs)] + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + #[allow(missing_docs)] + pub fn branch_key_version( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_version = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_branch_key_version( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_version = input; + self + } + #[allow(missing_docs)] + pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } /// Consumes the builder and constructs a [`BranchKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials). pub fn build( self, @@ -114,11 +156,13 @@ pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collection crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials { - branch_key: self.branch_key, -branch_key_identifier: self.branch_key_identifier, -branch_key_version: self.branch_key_version, -encryption_context: self.encryption_context, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials { + branch_key: self.branch_key, + branch_key_identifier: self.branch_key_identifier, + branch_key_version: self.branch_key_version, + encryption_context: self.encryption_context, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_input.rs index 42b6f6120..fcc7765ae 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_input.rs @@ -6,23 +6,30 @@ #[allow(missing_docs)] pub struct CreateKeyInput { /// The identifier for the created Branch Key. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl CreateKeyInput { /// The identifier for the created Branch Key. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } } impl CreateKeyInput { /// Creates a new builder-style object to manufacture [`CreateKeyInput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyInputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyInputBuilder::default() } } @@ -34,37 +41,59 @@ impl CreateKeyInput { )] pub struct CreateKeyInputBuilder { pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl CreateKeyInputBuilder { /// The identifier for the created Branch Key. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the created Branch Key. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the created Branch Key. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -/// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the created Branch Key. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the created Branch Key. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + /// Custom encryption context for the Branch Key. Required if branchKeyIdentifier is set. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } /// Consumes the builder and constructs a [`CreateKeyInput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyInput). pub fn build( self, @@ -72,9 +101,11 @@ pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collection crate::deps::aws_cryptography_keyStore::types::CreateKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::CreateKeyInput { - branch_key_identifier: self.branch_key_identifier, -encryption_context: self.encryption_context, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::CreateKeyInput { + branch_key_identifier: self.branch_key_identifier, + encryption_context: self.encryption_context, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_output.rs index 13dc72671..2a137746e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_output.rs @@ -6,17 +6,18 @@ /// Outputs for Branch Key creation. pub struct CreateKeyOutput { /// A identifier for the created Branch Key. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl CreateKeyOutput { /// A identifier for the created Branch Key. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl CreateKeyOutput { /// Creates a new builder-style object to manufacture [`CreateKeyOutput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyOutputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyOutputBuilder::default() } } @@ -31,19 +32,25 @@ pub struct CreateKeyOutputBuilder { } impl CreateKeyOutputBuilder { /// A identifier for the created Branch Key. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// A identifier for the created Branch Key. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// A identifier for the created Branch Key. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// A identifier for the created Branch Key. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// A identifier for the created Branch Key. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`CreateKeyOutput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput). pub fn build( self, @@ -51,8 +58,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_input.rs index 4ead13969..62687d276 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_input.rs @@ -4,16 +4,14 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct CreateKeyStoreInput { - -} -impl CreateKeyStoreInput { - -} +pub struct CreateKeyStoreInput {} +impl CreateKeyStoreInput {} impl CreateKeyStoreInput { /// Creates a new builder-style object to manufacture [`CreateKeyStoreInput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreInputBuilder { - crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreInputBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreInputBuilder { + crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreInputBuilder::default( + ) } } @@ -22,11 +20,8 @@ impl CreateKeyStoreInput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct CreateKeyStoreInputBuilder { - -} +pub struct CreateKeyStoreInputBuilder {} impl CreateKeyStoreInputBuilder { - /// Consumes the builder and constructs a [`CreateKeyStoreInput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput). pub fn build( self, @@ -34,8 +29,8 @@ impl CreateKeyStoreInputBuilder { crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_output.rs index 9531e7de0..845cf8d69 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_create_key_store_output.rs @@ -6,17 +6,18 @@ /// Outputs for Key Store DynamoDB table creation. pub struct CreateKeyStoreOutput { /// The ARN of the DynamoDB table that backs this Key Store. -pub table_arn: ::std::option::Option<::std::string::String>, + pub table_arn: ::std::option::Option<::std::string::String>, } impl CreateKeyStoreOutput { /// The ARN of the DynamoDB table that backs this Key Store. -pub fn table_arn(&self) -> &::std::option::Option<::std::string::String> { - &self.table_arn -} + pub fn table_arn(&self) -> &::std::option::Option<::std::string::String> { + &self.table_arn + } } impl CreateKeyStoreOutput { /// Creates a new builder-style object to manufacture [`CreateKeyStoreOutput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreOutputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::CreateKeyStoreOutputBuilder::default() } } @@ -31,19 +32,19 @@ pub struct CreateKeyStoreOutputBuilder { } impl CreateKeyStoreOutputBuilder { /// The ARN of the DynamoDB table that backs this Key Store. -pub fn table_arn(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.table_arn = ::std::option::Option::Some(input.into()); - self -} -/// The ARN of the DynamoDB table that backs this Key Store. -pub fn set_table_arn(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.table_arn = input; - self -} -/// The ARN of the DynamoDB table that backs this Key Store. -pub fn get_table_arn(&self) -> &::std::option::Option<::std::string::String> { - &self.table_arn -} + pub fn table_arn(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.table_arn = ::std::option::Option::Some(input.into()); + self + } + /// The ARN of the DynamoDB table that backs this Key Store. + pub fn set_table_arn(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.table_arn = input; + self + } + /// The ARN of the DynamoDB table that backs this Key Store. + pub fn get_table_arn(&self) -> &::std::option::Option<::std::string::String> { + &self.table_arn + } /// Consumes the builder and constructs a [`CreateKeyStoreOutput`](crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput). pub fn build( self, @@ -51,8 +52,10 @@ pub fn get_table_arn(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput { - table_arn: self.table_arn, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput { + table_arn: self.table_arn, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_discovery.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_discovery.rs index ead61262a..b2e75cee2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_discovery.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_discovery.rs @@ -4,12 +4,8 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Discovery { - -} -impl Discovery { - -} +pub struct Discovery {} +impl Discovery {} impl Discovery { /// Creates a new builder-style object to manufacture [`Discovery`](crate::deps::aws_cryptography_keyStore::types::Discovery). pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::DiscoveryBuilder { @@ -22,11 +18,8 @@ impl Discovery { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct DiscoveryBuilder { - -} +pub struct DiscoveryBuilder {} impl DiscoveryBuilder { - /// Consumes the builder and constructs a [`Discovery`](crate::deps::aws_cryptography_keyStore::types::Discovery). pub fn build( self, @@ -34,8 +27,6 @@ impl DiscoveryBuilder { crate::deps::aws_cryptography_keyStore::types::Discovery, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::Discovery { - - }) + ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::Discovery {}) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_input.rs index f5cb6fa03..a1f33ed30 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_input.rs @@ -6,17 +6,19 @@ /// Inputs for getting a Branch Key's ACTIVE version. pub struct GetActiveBranchKeyInput { /// The identifier for the Branch Key to get the ACTIVE version for. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl GetActiveBranchKeyInput { /// The identifier for the Branch Key to get the ACTIVE version for. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl GetActiveBranchKeyInput { /// Creates a new builder-style object to manufacture [`GetActiveBranchKeyInput`](crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyInputBuilder + { crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyInputBuilder::default() } } @@ -31,19 +33,25 @@ pub struct GetActiveBranchKeyInputBuilder { } impl GetActiveBranchKeyInputBuilder { /// The identifier for the Branch Key to get the ACTIVE version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to get the ACTIVE version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to get the ACTIVE version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`GetActiveBranchKeyInput`](crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_output.rs index 14f1653ea..83c00ba01 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_active_branch_key_output.rs @@ -6,17 +6,23 @@ /// Outputs for getting a Branch Key's ACTIVE version. pub struct GetActiveBranchKeyOutput { /// The materials for the Branch Key. -pub branch_key_materials: ::std::option::Option, + pub branch_key_materials: + ::std::option::Option, } impl GetActiveBranchKeyOutput { /// The materials for the Branch Key. -pub fn branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } } impl GetActiveBranchKeyOutput { /// Creates a new builder-style object to manufacture [`GetActiveBranchKeyOutput`](crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyOutputBuilder + { crate::deps::aws_cryptography_keyStore::types::builders::GetActiveBranchKeyOutputBuilder::default() } } @@ -27,23 +33,37 @@ impl GetActiveBranchKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetActiveBranchKeyOutputBuilder { - pub(crate) branch_key_materials: ::std::option::Option, + pub(crate) branch_key_materials: + ::std::option::Option, } impl GetActiveBranchKeyOutputBuilder { /// The materials for the Branch Key. -pub fn branch_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Branch Key. -pub fn set_branch_key_materials(mut self, input: ::std::option::Option) -> Self { - self.branch_key_materials = input; - self -} -/// The materials for the Branch Key. -pub fn get_branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Branch Key. + pub fn set_branch_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = input; + self + } + /// The materials for the Branch Key. + pub fn get_branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } /// Consumes the builder and constructs a [`GetActiveBranchKeyOutput`](crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput). pub fn build( self, @@ -51,8 +71,10 @@ pub fn get_branch_key_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput { - branch_key_materials: self.branch_key_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput { + branch_key_materials: self.branch_key_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_input.rs index 07c09e254..c2895ac3b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_input.rs @@ -6,17 +6,18 @@ /// Inputs for getting a Beacon Key pub struct GetBeaconKeyInput { /// The identifier of the Branch Key the Beacon Key is associated with. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl GetBeaconKeyInput { /// The identifier of the Branch Key the Beacon Key is associated with. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl GetBeaconKeyInput { /// Creates a new builder-style object to manufacture [`GetBeaconKeyInput`](crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyInputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyInputBuilder::default() } } @@ -31,19 +32,25 @@ pub struct GetBeaconKeyInputBuilder { } impl GetBeaconKeyInputBuilder { /// The identifier of the Branch Key the Beacon Key is associated with. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier of the Branch Key the Beacon Key is associated with. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier of the Branch Key the Beacon Key is associated with. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`GetBeaconKeyInput`](crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput). pub fn build( self, @@ -51,8 +58,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_output.rs index a6e5b641e..6c0488d65 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_beacon_key_output.rs @@ -6,18 +6,24 @@ /// Outputs for getting a Beacon Key pub struct GetBeaconKeyOutput { /// The materials for the Beacon Key. -pub beacon_key_materials: ::std::option::Option, + pub beacon_key_materials: + ::std::option::Option, } impl GetBeaconKeyOutput { /// The materials for the Beacon Key. -pub fn beacon_key_materials(&self) -> &::std::option::Option { - &self.beacon_key_materials -} + pub fn beacon_key_materials( + &self, + ) -> &::std::option::Option + { + &self.beacon_key_materials + } } impl GetBeaconKeyOutput { /// Creates a new builder-style object to manufacture [`GetBeaconKeyOutput`](crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyOutputBuilder { - crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyOutputBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyOutputBuilder { + crate::deps::aws_cryptography_keyStore::types::builders::GetBeaconKeyOutputBuilder::default( + ) } } @@ -27,23 +33,37 @@ impl GetBeaconKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBeaconKeyOutputBuilder { - pub(crate) beacon_key_materials: ::std::option::Option, + pub(crate) beacon_key_materials: + ::std::option::Option, } impl GetBeaconKeyOutputBuilder { /// The materials for the Beacon Key. -pub fn beacon_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.beacon_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Beacon Key. -pub fn set_beacon_key_materials(mut self, input: ::std::option::Option) -> Self { - self.beacon_key_materials = input; - self -} -/// The materials for the Beacon Key. -pub fn get_beacon_key_materials(&self) -> &::std::option::Option { - &self.beacon_key_materials -} + pub fn beacon_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + >, + ) -> Self { + self.beacon_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Beacon Key. + pub fn set_beacon_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + >, + ) -> Self { + self.beacon_key_materials = input; + self + } + /// The materials for the Beacon Key. + pub fn get_beacon_key_materials( + &self, + ) -> &::std::option::Option + { + &self.beacon_key_materials + } /// Consumes the builder and constructs a [`GetBeaconKeyOutput`](crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput). pub fn build( self, @@ -51,8 +71,10 @@ pub fn get_beacon_key_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput { - beacon_key_materials: self.beacon_key_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput { + beacon_key_materials: self.beacon_key_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_input.rs index 858f8a81a..9427fc5f3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_input.rs @@ -6,23 +6,25 @@ /// Inputs for getting a version of a Branch Key. pub struct GetBranchKeyVersionInput { /// The identifier for the Branch Key to get a particular version for. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, -/// The version to get. -pub branch_key_version: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, + /// The version to get. + pub branch_key_version: ::std::option::Option<::std::string::String>, } impl GetBranchKeyVersionInput { /// The identifier for the Branch Key to get a particular version for. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// The version to get. -pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// The version to get. + pub fn branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } } impl GetBranchKeyVersionInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyVersionInput`](crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionInputBuilder + { crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionInputBuilder::default() } } @@ -34,37 +36,49 @@ impl GetBranchKeyVersionInput { )] pub struct GetBranchKeyVersionInputBuilder { pub(crate) branch_key_identifier: ::std::option::Option<::std::string::String>, -pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, + pub(crate) branch_key_version: ::std::option::Option<::std::string::String>, } impl GetBranchKeyVersionInputBuilder { /// The identifier for the Branch Key to get a particular version for. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to get a particular version for. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} -/// The version to get. -pub fn branch_key_version(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_version = ::std::option::Option::Some(input.into()); - self -} -/// The version to get. -pub fn set_branch_key_version(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_version = input; - self -} -/// The version to get. -pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_version -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to get a particular version for. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } + /// The version to get. + pub fn branch_key_version( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_version = ::std::option::Option::Some(input.into()); + self + } + /// The version to get. + pub fn set_branch_key_version( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_version = input; + self + } + /// The version to get. + pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_version + } /// Consumes the builder and constructs a [`GetBranchKeyVersionInput`](crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput). pub fn build( self, @@ -72,9 +86,11 @@ pub fn get_branch_key_version(&self) -> &::std::option::Option<::std::string::St crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput { - branch_key_identifier: self.branch_key_identifier, -branch_key_version: self.branch_key_version, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput { + branch_key_identifier: self.branch_key_identifier, + branch_key_version: self.branch_key_version, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_output.rs index dd67e2029..b3281b59c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_branch_key_version_output.rs @@ -6,17 +6,23 @@ /// Outputs for getting a version of a Branch Key. pub struct GetBranchKeyVersionOutput { /// The materials for the Branch Key. -pub branch_key_materials: ::std::option::Option, + pub branch_key_materials: + ::std::option::Option, } impl GetBranchKeyVersionOutput { /// The materials for the Branch Key. -pub fn branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } } impl GetBranchKeyVersionOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyVersionOutput`](crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionOutputBuilder + { crate::deps::aws_cryptography_keyStore::types::builders::GetBranchKeyVersionOutputBuilder::default() } } @@ -27,23 +33,37 @@ impl GetBranchKeyVersionOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyVersionOutputBuilder { - pub(crate) branch_key_materials: ::std::option::Option, + pub(crate) branch_key_materials: + ::std::option::Option, } impl GetBranchKeyVersionOutputBuilder { /// The materials for the Branch Key. -pub fn branch_key_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_materials = ::std::option::Option::Some(input.into()); - self -} -/// The materials for the Branch Key. -pub fn set_branch_key_materials(mut self, input: ::std::option::Option) -> Self { - self.branch_key_materials = input; - self -} -/// The materials for the Branch Key. -pub fn get_branch_key_materials(&self) -> &::std::option::Option { - &self.branch_key_materials -} + pub fn branch_key_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = ::std::option::Option::Some(input.into()); + self + } + /// The materials for the Branch Key. + pub fn set_branch_key_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, + ) -> Self { + self.branch_key_materials = input; + self + } + /// The materials for the Branch Key. + pub fn get_branch_key_materials( + &self, + ) -> &::std::option::Option + { + &self.branch_key_materials + } /// Consumes the builder and constructs a [`GetBranchKeyVersionOutput`](crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput). pub fn build( self, @@ -51,8 +71,10 @@ pub fn get_branch_key_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput { - branch_key_materials: self.branch_key_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput { + branch_key_materials: self.branch_key_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_key_store_info_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_key_store_info_output.rs index fcde43780..8023f785d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_key_store_info_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_get_key_store_info_output.rs @@ -6,41 +6,46 @@ /// The configuration information for a Key Store. pub struct GetKeyStoreInfoOutput { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// An identifier for this Key Store. -pub key_store_id: ::std::option::Option<::std::string::String>, -/// The DynamoDB table name that backs this Key Store. -pub key_store_name: ::std::option::Option<::std::string::String>, -/// Configures Key Store's KMS Key ARN restrictions. -pub kms_configuration: ::std::option::Option, -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub logical_key_store_name: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// An identifier for this Key Store. + pub key_store_id: ::std::option::Option<::std::string::String>, + /// The DynamoDB table name that backs this Key Store. + pub key_store_name: ::std::option::Option<::std::string::String>, + /// Configures Key Store's KMS Key ARN restrictions. + pub kms_configuration: + ::std::option::Option, + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub logical_key_store_name: ::std::option::Option<::std::string::String>, } impl GetKeyStoreInfoOutput { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn key_store_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_id -} -/// The DynamoDB table name that backs this Key Store. -pub fn key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_name -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn key_store_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_id + } + /// The DynamoDB table name that backs this Key Store. + pub fn key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_name + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } } impl GetKeyStoreInfoOutput { /// Creates a new builder-style object to manufacture [`GetKeyStoreInfoOutput`](crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::GetKeyStoreInfoOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::GetKeyStoreInfoOutputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::GetKeyStoreInfoOutputBuilder::default() } } @@ -52,82 +57,116 @@ impl GetKeyStoreInfoOutput { )] pub struct GetKeyStoreInfoOutputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) key_store_id: ::std::option::Option<::std::string::String>, -pub(crate) key_store_name: ::std::option::Option<::std::string::String>, -pub(crate) kms_configuration: ::std::option::Option, -pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, + pub(crate) key_store_id: ::std::option::Option<::std::string::String>, + pub(crate) key_store_name: ::std::option::Option<::std::string::String>, + pub(crate) kms_configuration: + ::std::option::Option, + pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, } impl GetKeyStoreInfoOutputBuilder { /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn key_store_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_store_id = ::std::option::Option::Some(input.into()); - self -} -/// An identifier for this Key Store. -pub fn set_key_store_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_store_id = input; - self -} -/// An identifier for this Key Store. -pub fn get_key_store_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_id -} -/// The DynamoDB table name that backs this Key Store. -pub fn key_store_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_store_name = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn set_key_store_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_store_name = input; - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn get_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_store_name -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_configuration = ::std::option::Option::Some(input.into()); - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn set_kms_configuration(mut self, input: ::std::option::Option) -> Self { - self.kms_configuration = input; - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn get_kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn logical_key_store_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.logical_key_store_name = ::std::option::Option::Some(input.into()); - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn set_logical_key_store_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.logical_key_store_name = input; - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. -pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn key_store_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_store_id = ::std::option::Option::Some(input.into()); + self + } + /// An identifier for this Key Store. + pub fn set_key_store_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_store_id = input; + self + } + /// An identifier for this Key Store. + pub fn get_key_store_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_id + } + /// The DynamoDB table name that backs this Key Store. + pub fn key_store_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_store_name = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn set_key_store_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_store_name = input; + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn get_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_store_name + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = ::std::option::Option::Some(input.into()); + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn set_kms_configuration( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = input; + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn get_kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn logical_key_store_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.logical_key_store_name = ::std::option::Option::Some(input.into()); + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn set_logical_key_store_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.logical_key_store_name = input; + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. + pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } /// Consumes the builder and constructs a [`GetKeyStoreInfoOutput`](crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput). pub fn build( self, @@ -135,12 +174,14 @@ pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput { - grant_tokens: self.grant_tokens, -key_store_id: self.key_store_id, -key_store_name: self.key_store_name, -kms_configuration: self.kms_configuration, -logical_key_store_name: self.logical_key_store_name, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput { + grant_tokens: self.grant_tokens, + key_store_id: self.key_store_id, + key_store_name: self.key_store_name, + kms_configuration: self.kms_configuration, + logical_key_store_name: self.logical_key_store_name, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_kms_configuration.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_kms_configuration.rs index eb91186fd..fc6492679 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_kms_configuration.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_kms_configuration.rs @@ -6,13 +6,13 @@ /// Configures Key Store's KMS Key ARN restrictions. pub enum KmsConfiguration { /// Key Store is restricted to only this KMS Key ARN. If a different KMS Key ARN is encountered when creating, versioning, or getting a Branch Key or Beacon Key, KMS is never called and an exception is thrown. While a Multi-Region Key (MKR) may be provided, the whole ARN, including the Region, is persisted in Branch Keys and MUST strictly equal this value to be considered valid. -KmsKeyArn(::std::string::String), -/// If an MRK ARN is provided, and the Key Store table holds an MRK ARN, then those two ARNs may differ in region, although they must be otherwise equal. If either ARN is not an MRK ARN, then mrkKmsKeyArn behaves exactly as kmsKeyArn. -KmsMrKeyArn(::std::string::String), -/// The Key Store can use the KMS Key ARNs already persisted in the Backing Table. The VersionKey and CreateKey Operations are NOT supported and will fail with a runtime exception. There is no Multi-Region logic with this configuration; if a Multi-Region Key is encountered, and the region in the ARN is not the region of the KMS Client, requests will Fail with KMS Exceptions. -Discovery(crate::deps::aws_cryptography_keyStore::types::Discovery), -/// The Key Store can use the KMS Key ARNs already persisted in the Backing Table. The VersionKey and CreateKey Operations are NOT supported and will fail with a runtime exception. If a Multi-Region Key is encountered, the region in the ARN is changed to the configured region. -MrDiscovery(crate::deps::aws_cryptography_keyStore::types::MrDiscovery), + KmsKeyArn(::std::string::String), + /// If an MRK ARN is provided, and the Key Store table holds an MRK ARN, then those two ARNs may differ in region, although they must be otherwise equal. If either ARN is not an MRK ARN, then mrkKmsKeyArn behaves exactly as kmsKeyArn. + KmsMrKeyArn(::std::string::String), + /// The Key Store can use the KMS Key ARNs already persisted in the Backing Table. The VersionKey and CreateKey Operations are NOT supported and will fail with a runtime exception. There is no Multi-Region logic with this configuration; if a Multi-Region Key is encountered, and the region in the ARN is not the region of the KMS Client, requests will Fail with KMS Exceptions. + Discovery(crate::deps::aws_cryptography_keyStore::types::Discovery), + /// The Key Store can use the KMS Key ARNs already persisted in the Backing Table. The VersionKey and CreateKey Operations are NOT supported and will fail with a runtime exception. If a Multi-Region Key is encountered, the region in the ARN is changed to the configured region. + MrDiscovery(crate::deps::aws_cryptography_keyStore::types::MrDiscovery), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -25,57 +25,71 @@ MrDiscovery(crate::deps::aws_cryptography_keyStore::types::MrDiscovery), } impl KmsConfiguration { /// Tries to convert the enum instance into [`KmsKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn), extracting the inner [`::std::string::String`](::std::string::String). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_kms_key_arn(&self) -> ::std::result::Result<&::std::string::String, &Self> { - if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_kms_key_arn(&self) -> ::std::result::Result<&::std::string::String, &Self> { + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`KmsMrKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn), extracting the inner [`::std::string::String`](::std::string::String). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_kms_mr_key_arn(&self) -> ::std::result::Result<&::std::string::String, &Self> { - if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`KmsMrKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn), extracting the inner [`::std::string::String`](::std::string::String). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_kms_mr_key_arn(&self) -> ::std::result::Result<&::std::string::String, &Self> { + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Discovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::Discovery`](crate::deps::aws_cryptography_keyStore::types::Discovery). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_discovery(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::Discovery, &Self> { - if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Discovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::Discovery`](crate::deps::aws_cryptography_keyStore::types::Discovery). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_discovery( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::Discovery, &Self> + { + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::MrDiscovery). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_mr_discovery(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::MrDiscovery, &Self> { - if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::MrDiscovery). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_mr_discovery( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::MrDiscovery, &Self> + { + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`KmsKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn). -pub fn is_kms_key_arn(&self) -> ::std::primitive::bool { - self.as_kms_key_arn().is_ok() -} -/// Returns true if this is a [`KmsMrKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn). -pub fn is_kms_mr_key_arn(&self) -> ::std::primitive::bool { - self.as_kms_mr_key_arn().is_ok() -} -/// Returns true if this is a [`Discovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery). -pub fn is_discovery(&self) -> ::std::primitive::bool { - self.as_discovery().is_ok() -} -/// Returns true if this is a [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery). -pub fn is_mr_discovery(&self) -> ::std::primitive::bool { - self.as_mr_discovery().is_ok() -} + pub fn is_kms_key_arn(&self) -> ::std::primitive::bool { + self.as_kms_key_arn().is_ok() + } + /// Returns true if this is a [`KmsMrKeyArn`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn). + pub fn is_kms_mr_key_arn(&self) -> ::std::primitive::bool { + self.as_kms_mr_key_arn().is_ok() + } + /// Returns true if this is a [`Discovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery). + pub fn is_discovery(&self) -> ::std::primitive::bool { + self.as_discovery().is_ok() + } + /// Returns true if this is a [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery). + pub fn is_mr_discovery(&self) -> ::std::primitive::bool { + self.as_mr_discovery().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_mr_discovery.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_mr_discovery.rs index 8182d8aca..f771e088a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_mr_discovery.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_mr_discovery.rs @@ -6,17 +6,18 @@ #[allow(missing_docs)] pub struct MrDiscovery { /// Any MRK ARN discovered will have its region replaced with this. -pub region: ::std::option::Option<::std::string::String>, + pub region: ::std::option::Option<::std::string::String>, } impl MrDiscovery { /// Any MRK ARN discovered will have its region replaced with this. -pub fn region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } } impl MrDiscovery { /// Creates a new builder-style object to manufacture [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::MrDiscovery). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::MrDiscoveryBuilder { + pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::MrDiscoveryBuilder + { crate::deps::aws_cryptography_keyStore::types::builders::MrDiscoveryBuilder::default() } } @@ -31,19 +32,19 @@ pub struct MrDiscoveryBuilder { } impl MrDiscoveryBuilder { /// Any MRK ARN discovered will have its region replaced with this. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.region = ::std::option::Option::Some(input.into()); - self -} -/// Any MRK ARN discovered will have its region replaced with this. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.region = input; - self -} -/// Any MRK ARN discovered will have its region replaced with this. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.region = ::std::option::Option::Some(input.into()); + self + } + /// Any MRK ARN discovered will have its region replaced with this. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.region = input; + self + } + /// Any MRK ARN discovered will have its region replaced with this. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } /// Consumes the builder and constructs a [`MrDiscovery`](crate::deps::aws_cryptography_keyStore::types::MrDiscovery). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_input.rs index 03b736bb2..8d317eb88 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_input.rs @@ -6,17 +6,18 @@ /// Inputs for versioning a Branch Key. pub struct VersionKeyInput { /// The identifier for the Branch Key to be versioned. -pub branch_key_identifier: ::std::option::Option<::std::string::String>, + pub branch_key_identifier: ::std::option::Option<::std::string::String>, } impl VersionKeyInput { /// The identifier for the Branch Key to be versioned. -pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } } impl VersionKeyInput { /// Creates a new builder-style object to manufacture [`VersionKeyInput`](crate::deps::aws_cryptography_keyStore::types::VersionKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyInputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyInputBuilder::default() } } @@ -31,19 +32,25 @@ pub struct VersionKeyInputBuilder { } impl VersionKeyInputBuilder { /// The identifier for the Branch Key to be versioned. -pub fn branch_key_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_identifier = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the Branch Key to be versioned. -pub fn set_branch_key_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_identifier = input; - self -} -/// The identifier for the Branch Key to be versioned. -pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_identifier -} + pub fn branch_key_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_identifier = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the Branch Key to be versioned. + pub fn set_branch_key_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_identifier = input; + self + } + /// The identifier for the Branch Key to be versioned. + pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_identifier + } /// Consumes the builder and constructs a [`VersionKeyInput`](crate::deps::aws_cryptography_keyStore::types::VersionKeyInput). pub fn build( self, @@ -51,8 +58,10 @@ pub fn get_branch_key_identifier(&self) -> &::std::option::Option<::std::string: crate::deps::aws_cryptography_keyStore::types::VersionKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::VersionKeyInput { - branch_key_identifier: self.branch_key_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::VersionKeyInput { + branch_key_identifier: self.branch_key_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_output.rs index f49019b46..9d6ad44a6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/_version_key_output.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// Outputs for versioning a Branch Key. -pub struct VersionKeyOutput { - -} -impl VersionKeyOutput { - -} +pub struct VersionKeyOutput {} +impl VersionKeyOutput {} impl VersionKeyOutput { /// Creates a new builder-style object to manufacture [`VersionKeyOutput`](crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyOutputBuilder { crate::deps::aws_cryptography_keyStore::types::builders::VersionKeyOutputBuilder::default() } } @@ -22,11 +19,8 @@ impl VersionKeyOutput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct VersionKeyOutputBuilder { - -} +pub struct VersionKeyOutputBuilder {} impl VersionKeyOutputBuilder { - /// Consumes the builder and constructs a [`VersionKeyOutput`](crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput). pub fn build( self, @@ -34,8 +28,8 @@ impl VersionKeyOutputBuilder { crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/error.rs index b01c396f6..803f43139 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/error.rs @@ -4,27 +4,27 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -KeyStoreException { - message: ::std::string::String, -}, + KeyStoreException { + message: ::std::string::String, + }, -DynamoDB_20120810Error { - error: crate::deps::com_amazonaws_dynamodb::types::error::Error, -}, + DynamoDB_20120810Error { + error: crate::deps::com_amazonaws_dynamodb::types::error::Error, + }, -TrentServiceError { - error: crate::deps::com_amazonaws_kms::types::error::Error, -}, + TrentServiceError { + error: crate::deps::com_amazonaws_kms::types::error::Error, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -52,18 +52,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/key_store_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/key_store_config.rs index ab4058505..ec384e2d1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/key_store_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/types/key_store_config.rs @@ -6,53 +6,63 @@ #[allow(missing_docs)] pub struct KeyStoreConfig { /// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub ddb_client: ::std::option::Option, -/// The DynamoDB table name that backs this Key Store. -pub ddb_table_name: ::std::option::Option<::std::string::String>, -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// An identifier for this Key Store. -pub id: ::std::option::Option<::std::string::String>, -/// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub kms_client: ::std::option::Option, -/// Configures Key Store's KMS Key ARN restrictions. -pub kms_configuration: ::std::option::Option, -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. -pub logical_key_store_name: ::std::option::Option<::std::string::String>, + pub ddb_client: ::std::option::Option, + /// The DynamoDB table name that backs this Key Store. + pub ddb_table_name: ::std::option::Option<::std::string::String>, + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// An identifier for this Key Store. + pub id: ::std::option::Option<::std::string::String>, + /// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub kms_client: ::std::option::Option, + /// Configures Key Store's KMS Key ARN restrictions. + pub kms_configuration: + ::std::option::Option, + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. + pub logical_key_store_name: ::std::option::Option<::std::string::String>, } impl KeyStoreConfig { /// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn ddb_client(&self) -> &::std::option::Option { - &self.ddb_client -} -/// The DynamoDB table name that backs this Key Store. -pub fn ddb_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.ddb_table_name -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn id(&self) -> &::std::option::Option<::std::string::String> { - &self.id -} -/// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. -pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn ddb_client( + &self, + ) -> &::std::option::Option { + &self.ddb_client + } + /// The DynamoDB table name that backs this Key Store. + pub fn ddb_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.ddb_table_name + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn id(&self) -> &::std::option::Option<::std::string::String> { + &self.id + } + /// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. + pub fn logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } } impl KeyStoreConfig { /// Creates a new builder-style object to manufacture [`KeyStoreConfig`](crate::deps::aws_cryptography_keyStore::types::KeyStoreConfig). - pub fn builder() -> crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfigBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfigBuilder + { crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfigBuilder::default() } } @@ -63,113 +73,164 @@ impl KeyStoreConfig { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct KeyStoreConfigBuilder { - pub(crate) ddb_client: ::std::option::Option, -pub(crate) ddb_table_name: ::std::option::Option<::std::string::String>, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) id: ::std::option::Option<::std::string::String>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_configuration: ::std::option::Option, -pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, + pub(crate) ddb_client: + ::std::option::Option, + pub(crate) ddb_table_name: ::std::option::Option<::std::string::String>, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) id: ::std::option::Option<::std::string::String>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_configuration: + ::std::option::Option, + pub(crate) logical_key_store_name: ::std::option::Option<::std::string::String>, } impl KeyStoreConfigBuilder { /// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn ddb_client(mut self, input: impl ::std::convert::Into) -> Self { - self.ddb_client = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn set_ddb_client(mut self, input: ::std::option::Option) -> Self { - self.ddb_client = input; - self -} -/// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn get_ddb_client(&self) -> &::std::option::Option { - &self.ddb_client -} -/// The DynamoDB table name that backs this Key Store. -pub fn ddb_table_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.ddb_table_name = ::std::option::Option::Some(input.into()); - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn set_ddb_table_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.ddb_table_name = input; - self -} -/// The DynamoDB table name that backs this Key Store. -pub fn get_ddb_table_name(&self) -> &::std::option::Option<::std::string::String> { - &self.ddb_table_name -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// An identifier for this Key Store. -pub fn id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.id = ::std::option::Option::Some(input.into()); - self -} -/// An identifier for this Key Store. -pub fn set_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.id = input; - self -} -/// An identifier for this Key Store. -pub fn get_id(&self) -> &::std::option::Option<::std::string::String> { - &self.id -} -/// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn kms_configuration(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_configuration = ::std::option::Option::Some(input.into()); - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn set_kms_configuration(mut self, input: ::std::option::Option) -> Self { - self.kms_configuration = input; - self -} -/// Configures Key Store's KMS Key ARN restrictions. -pub fn get_kms_configuration(&self) -> &::std::option::Option { - &self.kms_configuration -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. -pub fn logical_key_store_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.logical_key_store_name = ::std::option::Option::Some(input.into()); - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. -pub fn set_logical_key_store_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.logical_key_store_name = input; - self -} -/// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. -pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { - &self.logical_key_store_name -} + pub fn ddb_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ddb_client = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn set_ddb_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.ddb_client = input; + self + } + /// The DynamoDB client this Key Store uses to call Amazon DynamoDB. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn get_ddb_client( + &self, + ) -> &::std::option::Option { + &self.ddb_client + } + /// The DynamoDB table name that backs this Key Store. + pub fn ddb_table_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.ddb_table_name = ::std::option::Option::Some(input.into()); + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn set_ddb_table_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.ddb_table_name = input; + self + } + /// The DynamoDB table name that backs this Key Store. + pub fn get_ddb_table_name(&self) -> &::std::option::Option<::std::string::String> { + &self.ddb_table_name + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// The AWS KMS grant tokens that are used when this Key Store calls to AWS KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// An identifier for this Key Store. + pub fn id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.id = ::std::option::Option::Some(input.into()); + self + } + /// An identifier for this Key Store. + pub fn set_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.id = input; + self + } + /// An identifier for this Key Store. + pub fn get_id(&self) -> &::std::option::Option<::std::string::String> { + &self.id + } + /// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS client this Key Store uses to call AWS KMS. If None is provided and the KMS ARN is, the KMS ARN is used to determine the Region of the default client. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn kms_configuration( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = ::std::option::Option::Some(input.into()); + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn set_kms_configuration( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, + >, + ) -> Self { + self.kms_configuration = input; + self + } + /// Configures Key Store's KMS Key ARN restrictions. + pub fn get_kms_configuration( + &self, + ) -> &::std::option::Option + { + &self.kms_configuration + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. + pub fn logical_key_store_name( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.logical_key_store_name = ::std::option::Option::Some(input.into()); + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. + pub fn set_logical_key_store_name( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.logical_key_store_name = input; + self + } + /// The logical name for this Key Store, which is cryptographically bound to the keys it holds. This appears in the Encryption Context of KMS requests as `tablename`. + pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string::String> { + &self.logical_key_store_name + } /// Consumes the builder and constructs a [`KeyStoreConfig`](crate::deps::aws_cryptography_keyStore::types::KeyStoreConfig). pub fn build( self, @@ -177,14 +238,16 @@ pub fn get_logical_key_store_name(&self) -> &::std::option::Option<::std::string crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig { - ddb_client: self.ddb_client, -ddb_table_name: self.ddb_table_name, -grant_tokens: self.grant_tokens, -id: self.id, -kms_client: self.kms_client, -kms_configuration: self.kms_configuration, -logical_key_store_name: self.logical_key_store_name, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig { + ddb_client: self.ddb_client, + ddb_table_name: self.ddb_table_name, + grant_tokens: self.grant_tokens, + id: self.id, + kms_client: self.kms_client, + kms_configuration: self.kms_configuration, + logical_key_store_name: self.logical_key_store_name, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/validation.rs index 96a4c7230..06e92fb9d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_keyStore/validation.rs @@ -1,861 +1,1023 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(&input.beacon_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.beacon_key)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.hmac_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "beacon_key_identifier", - "beacon_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(&input.branch_key_version)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.branch_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key", - "branch_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_version", - "branch_key_version is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput(input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_for_KeyStore_CreateKey(input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput(input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_for_KeyStore_CreateKey(input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput(input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput_for_KeyStore_CreateKeyStore(input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput(input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.table_arn)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_for_KeyStore_CreateKeyStore(input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.table_arn)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "table_arn", - "table_arn is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=1024).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials( + input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier( + &input.r#beacon_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.r#beacon_key)?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.r#hmac_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "beacon_key_identifier", + "beacon_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials( + input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion( + &input.r#branch_key_version, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.r#branch_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key", + "branch_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_version", + "branch_key_version is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput( + input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext( + &input.r#encryption_context, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_for_KeyStore_CreateKey( + input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext( + &input.r#encryption_context, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput( + input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_for_KeyStore_CreateKey( + input: &crate::deps::aws_cryptography_keyStore::operation::create_key::CreateKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyOutput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput( + input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreInput_for_KeyStore_CreateKeyStore( + input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput( + input: &crate::deps::aws_cryptography_keyStore::types::CreateKeyStoreOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_for_KeyStore_CreateKeyStore( + input: &crate::deps::aws_cryptography_keyStore::operation::create_key_store::CreateKeyStoreOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn(&input.r#table_arn)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HCreateKeyStoreOutput_DtableArn( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "table_arn", + "table_arn is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=1024).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "table_arn", "table_arn failed to satisfy constraint: Member must have length between 1 and 1024, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDdbClientReference(input: &crate::deps::com_amazonaws_dynamodb::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDiscovery(input: &crate::deps::aws_cryptography_keyStore::types::Discovery) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input: &::std::collections::HashMap<::std::string::String, ::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?; - validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput(input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_for_KeyStore_GetActiveBranchKey(input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput(input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(&input.branch_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_for_KeyStore_GetActiveBranchKey(input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(&input.branch_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_materials", - "branch_key_materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput(input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_for_KeyStore_GetBeaconKey(input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput(input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(&input.beacon_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_for_KeyStore_GetBeaconKey(input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(&input.beacon_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "beacon_key_materials", - "beacon_key_materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput(input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(&input.branch_key_version)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_for_KeyStore_GetBranchKeyVersion(input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(&input.branch_key_version)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_version", - "branch_key_version is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput(input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(&input.branch_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_for_KeyStore_GetBranchKeyVersion(input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(&input.branch_key_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_materials", - "branch_key_materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput(input: &crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.key_store_id)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(&input.key_store_name)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(&input.logical_key_store_name)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(&input.grant_tokens)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(&input.kms_configuration)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_for_KeyStore_GetKeyStoreInfo(input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.key_store_id)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(&input.key_store_name)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(&input.logical_key_store_name)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(&input.grant_tokens)?; -validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(&input.kms_configuration)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "grant_tokens", - "grant_tokens is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_store_id", - "key_store_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_store_name", - "key_store_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(3..=255).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDdbClientReference( + input: &crate::deps::com_amazonaws_dynamodb::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HDiscovery( + input: &crate::deps::aws_cryptography_keyStore::types::Discovery, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext( + input: &::std::collections::HashMap<::std::string::String, ::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?; + validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput( + input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_for_KeyStore_GetActiveBranchKey( + input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyInput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput( + input: &crate::deps::aws_cryptography_keyStore::types::GetActiveBranchKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials( + &input.r#branch_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_for_KeyStore_GetActiveBranchKey( + input: &crate::deps::aws_cryptography_keyStore::operation::get_active_branch_key::GetActiveBranchKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials( + &input.r#branch_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetActiveBranchKeyOutput_DbranchKeyMaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_materials", + "branch_key_materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput( + input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_for_KeyStore_GetBeaconKey( + input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyInput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput( + input: &crate::deps::aws_cryptography_keyStore::types::GetBeaconKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials( + &input.r#beacon_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_for_KeyStore_GetBeaconKey( + input: &crate::deps::aws_cryptography_keyStore::operation::get_beacon_key::GetBeaconKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials( + &input.r#beacon_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBeaconKeyOutput_DbeaconKeyMaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "beacon_key_materials", + "beacon_key_materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput( + input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion( + &input.r#branch_key_version, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_for_KeyStore_GetBranchKeyVersion( + input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion( + &input.r#branch_key_version, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionInput_DbranchKeyVersion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_version", + "branch_key_version is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput( + input: &crate::deps::aws_cryptography_keyStore::types::GetBranchKeyVersionOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials( + &input.r#branch_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_for_KeyStore_GetBranchKeyVersion( + input: &crate::deps::aws_cryptography_keyStore::operation::get_branch_key_version::GetBranchKeyVersionOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials( + &input.r#branch_key_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetBranchKeyVersionOutput_DbranchKeyMaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_materials", + "branch_key_materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput( + input: &crate::deps::aws_cryptography_keyStore::types::GetKeyStoreInfoOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName( + &input.r#key_store_name, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName( + &input.r#logical_key_store_name, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens( + &input.r#grant_tokens, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration( + &input.r#kms_configuration, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_for_KeyStore_GetKeyStoreInfo( + input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::GetKeyStoreInfoOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId(&input.r#key_store_id)?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName( + &input.r#key_store_name, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName( + &input.r#logical_key_store_name, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens( + &input.r#grant_tokens, + )?; + validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration( + &input.r#kms_configuration, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "grant_tokens", + "grant_tokens is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_store_id", + "key_store_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkeyStoreName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_store_name", + "key_store_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(3..=255).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key_store_name", "key_store_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_configuration", - "kms_configuration is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "logical_key_store_name", - "logical_key_store_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?; - validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig(input: &crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(&input.ddb_table_name)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(&input.kms_configuration)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(&input.logical_key_store_name)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(&input.id)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(&input.grant_tokens)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(&input.ddb_client)?; -validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(&input.kms_client)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HDdbClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ddb_table_name", - "ddb_table_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(3..=255).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DkmsConfiguration( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_configuration", + "kms_configuration is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGetKeyStoreInfoOutput_DlogicalKeyStoreName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "logical_key_store_name", + "logical_key_store_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HGrantTokenList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap( + input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?; + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig( + input: &crate::deps::aws_cryptography_keyStore::types::key_store_config::KeyStoreConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName(&input.r#ddb_table_name)?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration( + &input.r#kms_configuration, + )?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName( + &input.r#logical_key_store_name, + )?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(&input.r#id)?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(&input.r#grant_tokens)?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient(&input.r#ddb_client)?; + validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(&input.r#kms_client)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HDdbClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DddbTableName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ddb_table_name", + "ddb_table_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(3..=255).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "ddb_table_name", "ddb_table_name failed to satisfy constraint: Member must have length between 3 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_configuration", - "kms_configuration is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "logical_key_store_name", - "logical_key_store_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKmsClientReference(input: &crate::deps::com_amazonaws_kms::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input: &crate::deps::aws_cryptography_keyStore::types::KmsConfiguration) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(ref inner) = &input { - validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(inner)?; -} -if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(ref inner) = &input { - validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(inner)?; -} -if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(ref inner) = &input { - validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(inner)?; -} -if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(ref inner) = &input { - validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(input: &crate::deps::aws_cryptography_keyStore::types::Discovery) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HDiscovery(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(1..=2048).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_Did( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DkmsConfiguration( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_configuration", + "kms_configuration is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKeyStoreConfig_DlogicalKeyStoreName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "logical_key_store_name", + "logical_key_store_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKmsClientReference( + input: &crate::deps::com_amazonaws_kms::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration( + input: &crate::deps::aws_cryptography_keyStore::types::KmsConfiguration, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsKeyArn(ref inner) = + &input + { + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn(inner)?; + } + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::KmsMrKeyArn(ref inner) = + &input + { + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(inner)?; + } + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::Discovery(ref inner) = + &input + { + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery(inner)?; + } + if let crate::deps::aws_cryptography_keyStore::types::KmsConfiguration::MrDiscovery(ref inner) = + &input + { + validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_Ddiscovery( + input: &crate::deps::aws_cryptography_keyStore::types::Discovery, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HDiscovery(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsKeyArn( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(1..=2048).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "kms_key_arn", "kms_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if !(1..=2048).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DkmsMRKeyArn( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if !(1..=2048).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "kms_mr_key_arn", "kms_mr_key_arn failed to satisfy constraint: Member must have length between 1 and 2048, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery(input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HMRDiscovery(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery(input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(&input.region)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "region", - "region is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=32).contains(&input.chars().map(::std::primitive::char::len_utf16).fold(0usize, ::std::ops::Add::add)) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HKMSConfiguration_DmrDiscovery( + input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HMRDiscovery(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery( + input: &crate::deps::aws_cryptography_keyStore::types::MrDiscovery, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion(&input.r#region)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HMRDiscovery_Dregion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "region", + "region is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=32).contains( + &input + .chars() + .map(::std::primitive::char::len_utf16) + .fold(0usize, ::std::ops::Add::add), + ) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "region", "region failed to satisfy constraint: Member must have length between 1 and 32, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput(input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_for_KeyStore_VersionKey(input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(&input.branch_key_identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput(input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput_for_KeyStore_VersionKey(input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_smithy_Papi_HUnit(input: &()) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo(input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput( + input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_for_KeyStore_VersionKey( + input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyInput_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput( + input: &crate::deps::aws_cryptography_keyStore::types::VersionKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HVersionKeyOutput_for_KeyStore_VersionKey( + input: &crate::deps::aws_cryptography_keyStore::operation::version_key::VersionKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_smithy_Papi_HUnit( + input: &(), +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo( + input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client.rs index 7c44301a8..1af66fd6c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client.rs @@ -25,10 +25,14 @@ impl Client { inner.as_ref(), crate::_Wrappers_Compile::Result::Failure { .. } ) { - return Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny(inner.as_ref().error().clone())); + return Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner.as_ref().error().clone(), + ), + ); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_keyring.rs index 2795b091e..39ebc37f4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_keyring.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_discovery_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_discovery_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringError) - pub fn create_aws_kms_discovery_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringFluentBuilder { + pub fn create_aws_kms_discovery_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_multi_keyring.rs index fcbff7c04..3b6461842 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_discovery_multi_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_discovery_multi_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_discovery_multi_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringError) - pub fn create_aws_kms_discovery_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringFluentBuilder { + pub fn create_aws_kms_discovery_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_ecdh_keyring.rs index 8436f6dc0..7570fdb24 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_ecdh_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_ecdh_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_ecdh_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringError) - pub fn create_aws_kms_ecdh_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringFluentBuilder { + pub fn create_aws_kms_ecdh_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_hierarchical_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_hierarchical_keyring.rs index d52d2d253..aa9b4337b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_hierarchical_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_hierarchical_keyring.rs @@ -14,7 +14,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_hierarchical_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_hierarchical_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringError) - pub fn create_aws_kms_hierarchical_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringFluentBuilder { + pub fn create_aws_kms_hierarchical_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_keyring.rs index 53dbd176e..4a2dade5a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_keyring.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_keyring::CreateAwsKmsKeyringError) - pub fn create_aws_kms_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringFluentBuilder { + pub fn create_aws_kms_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_keyring.rs index fffce3b33..e1cb07275 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_discovery_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_mrk_discovery_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringError) - pub fn create_aws_kms_mrk_discovery_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringFluentBuilder { + pub fn create_aws_kms_mrk_discovery_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_multi_keyring.rs index 8085d5f0e..0bdb7d714 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_discovery_multi_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringError) - pub fn create_aws_kms_mrk_discovery_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder { + pub fn create_aws_kms_mrk_discovery_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_keyring.rs index 6130e600c..fca93e750 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_keyring.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_mrk_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringError) - pub fn create_aws_kms_mrk_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringFluentBuilder { + pub fn create_aws_kms_mrk_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_multi_keyring.rs index 306ee0765..934e73922 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_mrk_multi_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_multi_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_mrk_multi_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringError) - pub fn create_aws_kms_mrk_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringFluentBuilder { + pub fn create_aws_kms_mrk_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_multi_keyring.rs index a18850f2b..6c15ce6d8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_multi_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_multi_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_multi_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringError) - pub fn create_aws_kms_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringFluentBuilder { + pub fn create_aws_kms_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_rsa_keyring.rs index 13fdcf673..fe54f8388 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_aws_kms_rsa_keyring.rs @@ -13,7 +13,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_aws_kms_rsa_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_aws_kms_rsa_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringError) - pub fn create_aws_kms_rsa_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringFluentBuilder { + pub fn create_aws_kms_rsa_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_cryptographic_materials_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_cryptographic_materials_cache.rs index f0748e205..b63f63cbc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_cryptographic_materials_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_cryptographic_materials_cache.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateCryptographicMaterialsCacheOutput`](crate::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheOutput) with field(s): /// - [`materials_cache(Option)`](crate::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheOutput::materials_cache): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheError) - pub fn create_cryptographic_materials_cache(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheFluentBuilder { + pub fn create_cryptographic_materials_cache(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_client_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_client_supplier.rs index b6e602c59..a47c16f34 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_client_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_client_supplier.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateDefaultClientSupplierOutput`](crate::operation::create_default_client_supplier::CreateDefaultClientSupplierOutput) with field(s): /// - [`client(Option)`](crate::operation::create_default_client_supplier::CreateDefaultClientSupplierOutput::client): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_default_client_supplier::CreateDefaultClientSupplierError) - pub fn create_default_client_supplier(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierFluentBuilder { + pub fn create_default_client_supplier(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_cryptographic_materials_manager.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_cryptographic_materials_manager.rs index d5fd521ae..f034b23ab 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_cryptographic_materials_manager.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_default_cryptographic_materials_manager.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateCryptographicMaterialsManagerOutput`](crate::operation::create_default_cryptographic_materials_manager::CreateCryptographicMaterialsManagerOutput) with field(s): /// - [`materials_manager(Option)`](crate::operation::create_default_cryptographic_materials_manager::CreateCryptographicMaterialsManagerOutput::materials_manager): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerError) - pub fn create_default_cryptographic_materials_manager(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerFluentBuilder { + pub fn create_default_cryptographic_materials_manager(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_multi_keyring.rs index c53e0cedc..d19e14c6e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_multi_keyring.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_multi_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_multi_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_multi_keyring::CreateMultiKeyringError) - pub fn create_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringFluentBuilder { + pub fn create_multi_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_aes_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_aes_keyring.rs index 7c5edc157..be125780a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_aes_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_aes_keyring.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_raw_aes_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_raw_aes_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_raw_aes_keyring::CreateRawAesKeyringError) - pub fn create_raw_aes_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringFluentBuilder { + pub fn create_raw_aes_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_ecdh_keyring.rs index 3896843d7..e8885a974 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_ecdh_keyring.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_raw_ecdh_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_raw_ecdh_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringError) - pub fn create_raw_ecdh_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringFluentBuilder { + pub fn create_raw_ecdh_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_rsa_keyring.rs index cae547348..baf4e0288 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_raw_rsa_keyring.rs @@ -13,7 +13,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateKeyringOutput`](crate::operation::create_raw_rsa_keyring::CreateKeyringOutput) with field(s): /// - [`keyring(Option)`](crate::operation::create_raw_rsa_keyring::CreateKeyringOutput::keyring): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_raw_rsa_keyring::CreateRawRsaKeyringError) - pub fn create_raw_rsa_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringFluentBuilder { + pub fn create_raw_rsa_keyring(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_required_encryption_context_cmm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_required_encryption_context_cmm.rs index af6338a5d..dbad58a79 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_required_encryption_context_cmm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/create_required_encryption_context_cmm.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`CreateRequiredEncryptionContextCmmOutput`](crate::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmOutput) with field(s): /// - [`materials_manager(Option)`](crate::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCMMOutput::materials_manager): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmError) - pub fn create_required_encryption_context_cmm(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmFluentBuilder { + pub fn create_required_encryption_context_cmm(&self) -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/decryption_materials_with_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/decryption_materials_with_plaintext_data_key.rs index cc3904b47..4220939c4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/decryption_materials_with_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/decryption_materials_with_plaintext_data_key.rs @@ -14,7 +14,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::decryption_materials_with_plaintext_data_key::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterialsWithPlaintextDataKeyError) - pub fn decryption_materials_with_plaintext_data_key(&self) -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsWithPlaintextDataKeyFluentBuilder { + pub fn decryption_materials_with_plaintext_data_key(&self) -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsWithPlaintextDataKeyFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsWithPlaintextDataKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/encryption_materials_has_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/encryption_materials_has_plaintext_data_key.rs index 4e796baa8..f692a0df4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/encryption_materials_has_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/encryption_materials_has_plaintext_data_key.rs @@ -15,7 +15,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::encryption_materials_has_plaintext_data_key::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterialsHasPlaintextDataKeyError) - pub fn encryption_materials_has_plaintext_data_key(&self) -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsHasPlaintextDataKeyFluentBuilder { + pub fn encryption_materials_has_plaintext_data_key(&self) -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsHasPlaintextDataKeyFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsHasPlaintextDataKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/get_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/get_algorithm_suite_info.rs index 3201df319..cddb5349d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/get_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/get_algorithm_suite_info.rs @@ -17,7 +17,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - [`signature(Option)`](crate::operation::get_algorithm_suite_info::AlgorithmSuiteInfo::signature): (undocumented) /// - [`symmetric_signature(Option)`](crate::operation::get_algorithm_suite_info::AlgorithmSuiteInfo::symmetric_signature): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfoError) - pub fn get_algorithm_suite_info(&self) -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoFluentBuilder { + pub fn get_algorithm_suite_info(&self) -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_decryption_materials.rs index bb0a43582..6fe56d118 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_decryption_materials.rs @@ -16,7 +16,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - [`symmetric_signing_key(Option<::aws_smithy_types::Blob>)`](crate::operation::initialize_decryption_materials::DecryptionMaterials::symmetric_signing_key): (undocumented) /// - [`verification_key(Option<::aws_smithy_types::Blob>)`](crate::operation::initialize_decryption_materials::DecryptionMaterials::verification_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::initialize_decryption_materials::InitializeDecryptionMaterialsError) - pub fn initialize_decryption_materials(&self) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsFluentBuilder { + pub fn initialize_decryption_materials(&self) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_encryption_materials.rs index 8ba955b0f..8c0006717 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/initialize_encryption_materials.rs @@ -19,7 +19,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - [`signing_key(Option<::aws_smithy_types::Blob>)`](crate::operation::initialize_encryption_materials::EncryptionMaterials::signing_key): (undocumented) /// - [`symmetric_signing_keys(Option<::std::vec::Vec<::aws_smithy_types::Blob>>)`](crate::operation::initialize_encryption_materials::EncryptionMaterials::symmetric_signing_keys): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::initialize_encryption_materials::InitializeEncryptionMaterialsError) - pub fn initialize_encryption_materials(&self) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsFluentBuilder { + pub fn initialize_encryption_materials(&self) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_algorithm_suite_info.rs index 2087d6bad..ac64ef102 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_algorithm_suite_info.rs @@ -17,7 +17,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::valid_algorithm_suite_info::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::valid_algorithm_suite_info::ValidAlgorithmSuiteInfoError) - pub fn valid_algorithm_suite_info(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::ValidAlgorithmSuiteInfoFluentBuilder { + pub fn valid_algorithm_suite_info(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::ValidAlgorithmSuiteInfoFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::ValidAlgorithmSuiteInfoFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_decryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_decryption_materials_transition.rs index 72e743336..d1bac75eb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_decryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_decryption_materials_transition.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::valid_decryption_materials_transition::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionError) - pub fn valid_decryption_materials_transition(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionFluentBuilder { + pub fn valid_decryption_materials_transition(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_encryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_encryption_materials_transition.rs index 52e9f7394..fdf7bb719 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_encryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/valid_encryption_materials_transition.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::valid_encryption_materials_transition::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionError) - pub fn valid_encryption_materials_transition(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionFluentBuilder { + pub fn valid_encryption_materials_transition(&self) -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_decrypt.rs index 6fe37a089..935218a37 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_decrypt.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::validate_commitment_policy_on_decrypt::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptError) - pub fn validate_commitment_policy_on_decrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptFluentBuilder { + pub fn validate_commitment_policy_on_decrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_encrypt.rs index ebc3db779..6c10ef6a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/client/validate_commitment_policy_on_encrypt.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::client::Client { /// - On success, responds with [`Unit`](crate::operation::validate_commitment_policy_on_encrypt::Unit) with field(s): /// - On failure, responds with [`SdkError`](crate::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptError) - pub fn validate_commitment_policy_on_encrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptFluentBuilder { + pub fn validate_commitment_policy_on_encrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions.rs index 214ad84e5..95ae5f86f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions.rs @@ -3,258 +3,258 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod aes_wrapping_alg; - pub mod algorithm_suite_id; +pub mod algorithm_suite_id; - pub mod algorithm_suite_info; +pub mod algorithm_suite_info; - pub mod branch_key_id_supplier; +pub mod branch_key_id_supplier; - pub mod cache_type; +pub mod cache_type; - pub mod client; +pub mod client; - pub mod client_supplier; +pub mod client_supplier; - pub mod commitment_policy; +pub mod commitment_policy; - pub mod create_aws_kms_discovery_keyring; +pub mod create_aws_kms_discovery_keyring; - pub mod create_aws_kms_discovery_keyring_input; +pub mod create_aws_kms_discovery_keyring_input; - pub mod create_aws_kms_discovery_multi_keyring; +pub mod create_aws_kms_discovery_multi_keyring; - pub mod create_aws_kms_discovery_multi_keyring_input; +pub mod create_aws_kms_discovery_multi_keyring_input; - pub mod create_aws_kms_ecdh_keyring; +pub mod create_aws_kms_ecdh_keyring; - pub mod create_aws_kms_ecdh_keyring_input; +pub mod create_aws_kms_ecdh_keyring_input; - pub mod create_aws_kms_hierarchical_keyring; +pub mod create_aws_kms_hierarchical_keyring; - pub mod create_aws_kms_hierarchical_keyring_input; +pub mod create_aws_kms_hierarchical_keyring_input; - pub mod create_aws_kms_keyring; +pub mod create_aws_kms_keyring; - pub mod create_aws_kms_keyring_input; +pub mod create_aws_kms_keyring_input; - pub mod create_aws_kms_mrk_discovery_keyring; +pub mod create_aws_kms_mrk_discovery_keyring; - pub mod create_aws_kms_mrk_discovery_keyring_input; +pub mod create_aws_kms_mrk_discovery_keyring_input; - pub mod create_aws_kms_mrk_discovery_multi_keyring; +pub mod create_aws_kms_mrk_discovery_multi_keyring; - pub mod create_aws_kms_mrk_discovery_multi_keyring_input; +pub mod create_aws_kms_mrk_discovery_multi_keyring_input; - pub mod create_aws_kms_mrk_keyring; +pub mod create_aws_kms_mrk_keyring; - pub mod create_aws_kms_mrk_keyring_input; +pub mod create_aws_kms_mrk_keyring_input; - pub mod create_aws_kms_mrk_multi_keyring; +pub mod create_aws_kms_mrk_multi_keyring; - pub mod create_aws_kms_mrk_multi_keyring_input; +pub mod create_aws_kms_mrk_multi_keyring_input; - pub mod create_aws_kms_multi_keyring; +pub mod create_aws_kms_multi_keyring; - pub mod create_aws_kms_multi_keyring_input; +pub mod create_aws_kms_multi_keyring_input; - pub mod create_aws_kms_rsa_keyring; +pub mod create_aws_kms_rsa_keyring; - pub mod create_aws_kms_rsa_keyring_input; +pub mod create_aws_kms_rsa_keyring_input; - pub mod create_cryptographic_materials_cache; +pub mod create_cryptographic_materials_cache; - pub mod create_cryptographic_materials_cache_input; +pub mod create_cryptographic_materials_cache_input; - pub mod create_default_client_supplier; +pub mod create_default_client_supplier; - pub mod create_default_client_supplier_input; +pub mod create_default_client_supplier_input; - pub mod create_default_cryptographic_materials_manager; +pub mod create_default_cryptographic_materials_manager; - pub mod create_default_cryptographic_materials_manager_input; +pub mod create_default_cryptographic_materials_manager_input; - pub mod create_multi_keyring; +pub mod create_multi_keyring; - pub mod create_multi_keyring_input; +pub mod create_multi_keyring_input; - pub mod create_raw_aes_keyring; +pub mod create_raw_aes_keyring; - pub mod create_raw_aes_keyring_input; +pub mod create_raw_aes_keyring_input; - pub mod create_raw_ecdh_keyring; +pub mod create_raw_ecdh_keyring; - pub mod create_raw_ecdh_keyring_input; +pub mod create_raw_ecdh_keyring_input; - pub mod create_raw_rsa_keyring; +pub mod create_raw_rsa_keyring; - pub mod create_raw_rsa_keyring_input; +pub mod create_raw_rsa_keyring_input; - pub mod create_required_encryption_context_cmm; +pub mod create_required_encryption_context_cmm; - pub mod create_required_encryption_context_cmm_input; +pub mod create_required_encryption_context_cmm_input; - pub mod cryptographic_materials_cache; +pub mod cryptographic_materials_cache; - pub mod cryptographic_materials_manager; +pub mod cryptographic_materials_manager; - pub mod dbe_algorithm_suite_id; +pub mod dbe_algorithm_suite_id; - pub mod dbe_commitment_policy; +pub mod dbe_commitment_policy; - pub mod decrypt_materials; +pub mod decrypt_materials; - pub mod decrypt_materials_input; +pub mod decrypt_materials_input; - pub mod decrypt_materials_output; +pub mod decrypt_materials_output; - pub mod decryption_materials; +pub mod decryption_materials; - pub mod decryption_materials_with_plaintext_data_key; +pub mod decryption_materials_with_plaintext_data_key; - pub mod default_cache; +pub mod default_cache; - pub mod delete_cache_entry; +pub mod delete_cache_entry; - pub mod delete_cache_entry_input; +pub mod delete_cache_entry_input; - pub mod derivation_algorithm; +pub mod derivation_algorithm; - pub mod direct_key_wrapping; +pub mod direct_key_wrapping; - pub mod discovery_filter; +pub mod discovery_filter; - pub mod ecdsa; +pub mod ecdsa; - pub mod edk_wrapping_algorithm; +pub mod edk_wrapping_algorithm; - pub mod encrypt; +pub mod encrypt; - pub mod encrypted_data_key; +pub mod encrypted_data_key; - pub mod encryption_materials; +pub mod encryption_materials; - pub mod encryption_materials_has_plaintext_data_key; +pub mod encryption_materials_has_plaintext_data_key; - pub mod ephemeral_private_key_to_static_public_key_input; +pub mod ephemeral_private_key_to_static_public_key_input; - pub mod error; +pub mod error; - pub mod esdk_algorithm_suite_id; +pub mod esdk_algorithm_suite_id; - pub mod esdk_commitment_policy; +pub mod esdk_commitment_policy; - pub mod get_algorithm_suite_info; +pub mod get_algorithm_suite_info; - pub mod get_branch_key_id; +pub mod get_branch_key_id; - pub mod get_branch_key_id_input; +pub mod get_branch_key_id_input; - pub mod get_branch_key_id_output; +pub mod get_branch_key_id_output; - pub mod get_cache_entry; +pub mod get_cache_entry; - pub mod get_cache_entry_input; +pub mod get_cache_entry_input; - pub mod get_cache_entry_output; +pub mod get_cache_entry_output; - pub mod get_client; +pub mod get_client; - pub mod get_client_input; +pub mod get_client_input; - pub mod get_encryption_materials; +pub mod get_encryption_materials; - pub mod get_encryption_materials_input; +pub mod get_encryption_materials_input; - pub mod get_encryption_materials_output; +pub mod get_encryption_materials_output; - pub mod hkdf; +pub mod hkdf; - pub mod identity; +pub mod identity; - pub mod initialize_decryption_materials; +pub mod initialize_decryption_materials; - pub mod initialize_decryption_materials_input; +pub mod initialize_decryption_materials_input; - pub mod initialize_encryption_materials; +pub mod initialize_encryption_materials; - pub mod initialize_encryption_materials_input; +pub mod initialize_encryption_materials_input; - pub mod intermediate_key_wrapping; +pub mod intermediate_key_wrapping; - pub mod key_agreement_scheme; +pub mod key_agreement_scheme; - pub mod keyring; +pub mod keyring; - pub mod kms_ecdh_static_configurations; +pub mod kms_ecdh_static_configurations; - pub mod kms_private_key_to_static_public_key_input; +pub mod kms_private_key_to_static_public_key_input; - pub mod kms_public_key_discovery_input; +pub mod kms_public_key_discovery_input; - pub mod materials; +pub mod materials; - pub mod multi_threaded_cache; +pub mod multi_threaded_cache; - pub mod no_cache; +pub mod no_cache; - pub mod none; +pub mod none; - pub mod on_decrypt; +pub mod on_decrypt; - pub mod on_decrypt_input; +pub mod on_decrypt_input; - pub mod on_decrypt_output; +pub mod on_decrypt_output; - pub mod on_encrypt; +pub mod on_encrypt; - pub mod on_encrypt_input; +pub mod on_encrypt_input; - pub mod on_encrypt_output; +pub mod on_encrypt_output; - pub mod padding_scheme; +pub mod padding_scheme; - pub mod public_key_discovery_input; +pub mod public_key_discovery_input; - pub mod put_cache_entry; +pub mod put_cache_entry; - pub mod put_cache_entry_input; +pub mod put_cache_entry_input; - pub mod raw_ecdh_static_configurations; +pub mod raw_ecdh_static_configurations; - pub mod raw_private_key_to_static_public_key_input; +pub mod raw_private_key_to_static_public_key_input; - pub mod signature_algorithm; +pub mod signature_algorithm; - pub mod single_threaded_cache; +pub mod single_threaded_cache; - pub mod static_configurations; +pub mod static_configurations; - pub mod storm_tracking_cache; +pub mod storm_tracking_cache; - pub mod symmetric_signature_algorithm; +pub mod symmetric_signature_algorithm; - pub mod time_units; +pub mod time_units; - pub mod update_usage_metadata; +pub mod update_usage_metadata; - pub mod update_usage_metadata_input; +pub mod update_usage_metadata_input; - pub mod valid_algorithm_suite_info; +pub mod valid_algorithm_suite_info; - pub mod valid_decryption_materials_transition; +pub mod valid_decryption_materials_transition; - pub mod valid_decryption_materials_transition_input; +pub mod valid_decryption_materials_transition_input; - pub mod valid_encryption_materials_transition; +pub mod valid_encryption_materials_transition; - pub mod valid_encryption_materials_transition_input; +pub mod valid_encryption_materials_transition_input; - pub mod validate_commitment_policy_on_decrypt; +pub mod validate_commitment_policy_on_decrypt; - pub mod validate_commitment_policy_on_decrypt_input; +pub mod validate_commitment_policy_on_decrypt_input; - pub mod validate_commitment_policy_on_encrypt; +pub mod validate_commitment_policy_on_encrypt; - pub mod validate_commitment_policy_on_encrypt_input; +pub mod validate_commitment_policy_on_encrypt_input; pub mod material_providers_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/aes_wrapping_alg.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/aes_wrapping_alg.rs index 5ad0ac1c4..71f81565a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/aes_wrapping_alg.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/aes_wrapping_alg.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg::AlgAes128GcmIv12Tag16 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16 {}, crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg::AlgAes192GcmIv12Tag16 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16 {}, crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg::AlgAes256GcmIv12Tag16 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AesWrappingAlg, ) -> crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_id.rs index 3e2ba7c29..93c75922b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_id.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId::ESDK { ESDK: crate::deps::aws_cryptography_materialProviders::conversions::esdk_algorithm_suite_id::to_dafny(x.clone()), @@ -22,11 +22,11 @@ crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe(x) #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId, >, ) -> crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId::ESDK { ESDK: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk(crate::deps::aws_cryptography_materialProviders::conversions::esdk_algorithm_suite_id::from_dafny(x)), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_info.rs index ab8fd12b3..840c0f1f8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/algorithm_suite_info.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo::AlgorithmSuiteInfo { id: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.id.clone().unwrap()) , @@ -37,20 +37,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, >, ) -> crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo { @@ -87,10 +87,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/branch_key_id_supplier.rs index eb2923e81..0744614f8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/branch_key_id_supplier.rs @@ -6,20 +6,18 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier, -> { - let wrap = BranchKeyIdSupplierWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = BranchKeyIdSupplierWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct BranchKeyIdSupplierWrapper { obj: crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef, } -impl ::dafny_runtime::UpcastObject for BranchKeyIdSupplierWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for BranchKeyIdSupplierWrapper { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -27,12 +25,12 @@ pub fn from_dafny( dafny_value: ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier, >, -) -> crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef { +) -> crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef{ let wrap = IBranchKeyIdSupplierDafnyWrapper { obj: dafny_value.clone(), }; crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)) } } @@ -48,16 +46,16 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty { fn r#_GetBranchKeyId_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_branch_key_id::_get_branch_key_id_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().get_branch_key_id(inner_input); + let inner_result = self.obj.inner.lock().unwrap().get_branch_key_id(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::get_branch_key_id::_get_branch_key_id_output::to_dafny(x.clone()), @@ -66,7 +64,7 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cache_type.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cache_type.rs index 246b26a5a..71715e40e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cache_type.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cache_type.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CacheType, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CacheType, > { - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CacheType::Default { Default: crate::deps::aws_cryptography_materialProviders::conversions::default_cache::to_dafny(&x.clone()) @@ -44,11 +44,11 @@ crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared(x) => #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CacheType, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CacheType { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CacheType::Default { Default: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(crate::deps::aws_cryptography_materialProviders::conversions::default_cache::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client.rs index 83406d8aa..15c7cd444 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient >, ) -> crate::deps::aws_cryptography_materialProviders::client::Client { - crate::deps::aws_cryptography_materialProviders::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_materialProviders::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client_supplier.rs index d3d6c9674..b8564bca4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/client_supplier.rs @@ -6,20 +6,18 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier, -> { - let wrap = ClientSupplierWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = ClientSupplierWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct ClientSupplierWrapper { - obj: crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + obj: crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, } -impl ::dafny_runtime::UpcastObject for ClientSupplierWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for ClientSupplierWrapper { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -32,7 +30,7 @@ pub fn from_dafny( obj: dafny_value.clone(), }; crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)), } } @@ -44,56 +42,60 @@ pub struct IClientSupplierDafnyWrapper { } impl crate::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier - for ClientSupplierWrapper + for ClientSupplierWrapper { - fn r#_GetClient_k( + fn r#_GetClient_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< ::dafny_runtime::Object, - ::std::rc::Rc, + ::dafny_runtime::Rc, >, > { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_client::_get_client_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().get_client(inner_input); - let result = match inner_result { - Ok(x) => crate::r#_Wrappers_Compile::Result::Success { - value: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&x.clone()) -, - }, - Err(x) => crate::r#_Wrappers_Compile::Result::Failure { - error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), - }, - }; - ::std::rc::Rc::new(result) -} + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_client::_get_client_input::from_dafny(input.clone()); + let inner_result = self.obj.inner.lock().unwrap().get_client(inner_input); + let result = match inner_result { + Ok(x) => crate::r#_Wrappers_Compile::Result::Success { + value: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&x.clone()), + }, + Err(x) => crate::r#_Wrappers_Compile::Result::Failure { + error: + crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), + }, + }; + ::dafny_runtime::Rc::new(result) + } } -impl crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplier for IClientSupplierDafnyWrapper +impl crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplier + for IClientSupplierDafnyWrapper { - fn get_client( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, -) -> Result< - crate::deps::com_amazonaws_kms::client::Client, - crate::deps::aws_cryptography_materialProviders::types::error::Error, -> { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_client::_get_client_input::to_dafny(input); - let inner_result = ::dafny_runtime::md!(self.obj.clone()).GetClient(&inner_input); - if matches!( - inner_result.as_ref(), - crate::r#_Wrappers_Compile::Result::Success { .. } - ) { - Ok( - crate::deps::com_amazonaws_kms::conversions::client::from_dafny(inner_result.value().clone()) -, - ) - } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) - } -} + fn get_client( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, + ) -> Result< + crate::deps::com_amazonaws_kms::client::Client, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + > { + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_client::_get_client_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(self.obj.clone()).GetClient(&inner_input); + if matches!( + inner_result.as_ref(), + crate::r#_Wrappers_Compile::Result::Success { .. } + ) { + Ok( + crate::deps::com_amazonaws_kms::conversions::client::from_dafny( + inner_result.value().clone(), + ), + ) + } else { + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) + } + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/commitment_policy.rs index 4d7f5a1c3..410e2d981 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/commitment_policy.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CommitmentPolicy, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CommitmentPolicy::ESDK { ESDK: crate::deps::aws_cryptography_materialProviders::conversions::esdk_commitment_policy::to_dafny(x.clone()), @@ -22,11 +22,11 @@ crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe(x) #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CommitmentPolicy, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CommitmentPolicy::ESDK { ESDK: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk(crate::deps::aws_cryptography_materialProviders::conversions::esdk_commitment_policy::from_dafny(x)), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring.rs index 19f1a9d79..66ec5549c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_discovery_keyring_input; +pub mod _create_aws_kms_discovery_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs index e2532d787..4dc4aaf52 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput { kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -26,12 +26,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput::builder() .set_kms_client(Some( crate::deps::com_amazonaws_kms::conversions::client::from_dafny(dafny_value.kmsClient().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring_input.rs index 7605ceda6..6a78e8b9f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_keyring_input.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput { kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -37,20 +37,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput { @@ -89,10 +89,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring.rs index 42ff6cb31..fa08019e6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_discovery_multi_keyring_input; +pub mod _create_aws_kms_discovery_multi_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs index deba1957e..4b978f96e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput { regions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.regions.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), ) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,12 +33,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput::builder() .set_regions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.regions(), |e: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(e), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring_input.rs index d8a2b2b79..42553430d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_discovery_multi_keyring_input.rs @@ -4,32 +4,32 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput { regions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.regions.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), ) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -44,30 +44,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput {..} => crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput::builder() @@ -104,10 +106,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring.rs index 70809c81b..c144a835a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_ecdh_keyring_input; +pub mod _create_aws_kms_ecdh_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs index a8f710140..cf8657626 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput { KeyAgreementScheme: crate::deps::aws_cryptography_materialProviders::conversions::kms_ecdh_static_configurations::to_dafny(&value.key_agreement_scheme.clone().unwrap()) , curveSpec: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.curve_spec.clone().unwrap()), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -24,12 +24,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput::builder() .set_key_agreement_scheme(Some( crate::deps::aws_cryptography_materialProviders::conversions::kms_ecdh_static_configurations::from_dafny(dafny_value.KeyAgreementScheme().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring_input.rs index b46d8f6d1..d20c622d8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_ecdh_keyring_input.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput { KeyAgreementScheme: crate::deps::aws_cryptography_materialProviders::conversions::kms_ecdh_static_configurations::to_dafny(&value.key_agreement_scheme.clone().unwrap()) , curveSpec: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.curve_spec.clone().unwrap()), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -35,20 +35,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput { @@ -84,10 +84,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring.rs index 5bcc049e4..146df6587 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_hierarchical_keyring_input; +pub mod _create_aws_kms_hierarchical_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs index a1917746a..b31e56924 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id), - branchKeyIdSupplier: ::std::rc::Rc::new(match &value.branch_key_id_supplier { + branchKeyIdSupplier: ::dafny_runtime::Rc::new(match &value.branch_key_id_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::branch_key_id_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -17,7 +17,7 @@ pub fn to_dafny( keyStore: crate::deps::aws_cryptography_keyStore::conversions::client::to_dafny(&value.key_store.clone().unwrap()) , ttlSeconds: value.ttl_seconds.clone().unwrap(), - cache: ::std::rc::Rc::new(match &value.cache { + cache: ::dafny_runtime::Rc::new(match &value.cache { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -25,12 +25,12 @@ pub fn to_dafny( partitionId: crate::standard_library_conversions::ostring_to_dafny(&value.partition_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput::builder() .set_branch_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.branchKeyId().clone())) .set_branch_key_id_supplier(match (*dafny_value.branchKeyIdSupplier()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring_input.rs index ea4f2066f..b272096be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_hierarchical_keyring_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id), - branchKeyIdSupplier: ::std::rc::Rc::new(match &value.branch_key_id_supplier { + branchKeyIdSupplier: ::dafny_runtime::Rc::new(match &value.branch_key_id_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::branch_key_id_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -24,7 +24,7 @@ pub fn to_dafny_plain( keyStore: crate::deps::aws_cryptography_keyStore::conversions::client::to_dafny(&value.key_store.clone().unwrap()) , ttlSeconds: value.ttl_seconds.clone().unwrap(), - cache: ::std::rc::Rc::new(match &value.cache { + cache: ::dafny_runtime::Rc::new(match &value.cache { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -36,20 +36,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput { @@ -87,10 +87,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring.rs index 0af0a7b57..326ff3414 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_keyring_input; +pub mod _create_aws_kms_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs index 09b7b7143..22be48b6c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput { kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -22,12 +22,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput::builder() .set_kms_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.kmsKeyId()) )) .set_kms_client(Some( crate::deps::com_amazonaws_kms::conversions::client::from_dafny(dafny_value.kmsClient().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring_input.rs index 3a6fbe990..306e8d8d0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_keyring_input.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput { kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,20 +33,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput { @@ -80,10 +80,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring.rs index 220a689e6..7e31f49cb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_mrk_discovery_keyring_input; +pub mod _create_aws_kms_mrk_discovery_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs index b4fd1068d..a8eca81fb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput { kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -27,12 +27,12 @@ pub fn to_dafny( region: crate::standard_library_conversions::ostring_to_dafny(&value.region) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput::builder() .set_kms_client(Some( crate::deps::com_amazonaws_kms::conversions::client::from_dafny(dafny_value.kmsClient().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring_input.rs index e9a44afca..d6ae4dacc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_keyring_input.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput { kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -38,20 +38,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput { @@ -91,10 +91,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring.rs index 4d76fedf6..4b11e57c3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_mrk_discovery_multi_keyring_input; +pub mod _create_aws_kms_mrk_discovery_multi_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs index ed56fed9a..caf51fad0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput { regions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.regions.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), ) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,12 +33,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput::builder() .set_regions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.regions(), |e: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(e), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring_input.rs index 0014b4978..6d8c869b1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_discovery_multi_keyring_input.rs @@ -4,32 +4,32 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput { regions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.regions.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), ) , - discoveryFilter: ::std::rc::Rc::new(match &value.discovery_filter { + discoveryFilter: ::dafny_runtime::Rc::new(match &value.discovery_filter { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::discovery_filter::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -44,30 +44,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput {..} => crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput::builder() @@ -104,10 +106,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring.rs index 70ab68e36..e4191a1e1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_mrk_keyring_input; +pub mod _create_aws_kms_mrk_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs index f0449ee1f..e52628cac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput { kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -22,12 +22,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput::builder() .set_kms_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.kmsKeyId()) )) .set_kms_client(Some( crate::deps::com_amazonaws_kms::conversions::client::from_dafny(dafny_value.kmsClient().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring_input.rs index 0a285c5e5..bfc608920 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_keyring_input.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput { kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), kmsClient: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&value.kms_client.clone().unwrap()) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,20 +33,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput { @@ -80,10 +80,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring.rs index e17a31692..76cb2c0df 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_mrk_multi_keyring_input; +pub mod _create_aws_kms_mrk_multi_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs index 352590699..cde2616d4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput { generator: crate::standard_library_conversions::ostring_to_dafny(&value.generator), - kmsKeyIds: ::std::rc::Rc::new(match &value.kms_key_ids { + kmsKeyIds: ::dafny_runtime::Rc::new(match &value.kms_key_ids { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -18,12 +18,12 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -34,12 +34,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput::builder() .set_generator(crate::standard_library_conversions::ostring_from_dafny(dafny_value.generator().clone())) .set_kms_key_ids(match (*dafny_value.kmsKeyIds()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring_input.rs index 254c6a16f..485f55427 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_mrk_multi_keyring_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput { generator: crate::standard_library_conversions::ostring_to_dafny(&value.generator), - kmsKeyIds: ::std::rc::Rc::new(match &value.kms_key_ids { + kmsKeyIds: ::dafny_runtime::Rc::new(match &value.kms_key_ids { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -25,12 +25,12 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -45,20 +45,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput { @@ -106,10 +106,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring.rs index 48bb6fb46..02bbe7b1b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_multi_keyring_input; +pub mod _create_aws_kms_multi_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs index 0ef98d0e6..639277f8c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput { generator: crate::standard_library_conversions::ostring_to_dafny(&value.generator), - kmsKeyIds: ::std::rc::Rc::new(match &value.kms_key_ids { + kmsKeyIds: ::dafny_runtime::Rc::new(match &value.kms_key_ids { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -18,12 +18,12 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -34,12 +34,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput::builder() .set_generator(crate::standard_library_conversions::ostring_from_dafny(dafny_value.generator().clone())) .set_kms_key_ids(match (*dafny_value.kmsKeyIds()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring_input.rs index 2de505318..50adc8e8c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_multi_keyring_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput { generator: crate::standard_library_conversions::ostring_to_dafny(&value.generator), - kmsKeyIds: ::std::rc::Rc::new(match &value.kms_key_ids { + kmsKeyIds: ::dafny_runtime::Rc::new(match &value.kms_key_ids { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -25,12 +25,12 @@ pub fn to_dafny_plain( None => crate::r#_Wrappers_Compile::Option::None {} }) , - clientSupplier: ::std::rc::Rc::new(match &value.client_supplier { + clientSupplier: ::dafny_runtime::Rc::new(match &value.client_supplier { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::client_supplier::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -45,20 +45,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput { @@ -106,10 +106,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring.rs index 3ceb3074e..c7a93c3e6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_aws_kms_rsa_keyring_input; +pub mod _create_aws_kms_rsa_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs index cde046b8c..e07e325e4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput { publicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), encryptionAlgorithm: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(value.encryption_algorithm.clone().unwrap()), - kmsClient: ::std::rc::Rc::new(match &value.kms_client { + kmsClient: ::dafny_runtime::Rc::new(match &value.kms_client { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -27,12 +27,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput::builder() .set_public_key(crate::standard_library_conversions::oblob_from_dafny(dafny_value.publicKey().clone())) .set_kms_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.kmsKeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring_input.rs index f46ccdca7..2bf42ea8c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_aws_kms_rsa_keyring_input.rs @@ -4,26 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput { publicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), kmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_key_id) .Extract(), encryptionAlgorithm: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(value.encryption_algorithm.clone().unwrap()), - kmsClient: ::std::rc::Rc::new(match &value.kms_client { + kmsClient: ::dafny_runtime::Rc::new(match &value.kms_client { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::client::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - grantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + grantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -38,20 +38,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput { @@ -91,10 +91,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache.rs index 507ff105e..92fc6f990 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_cryptographic_materials_cache_input; +pub mod _create_cryptographic_materials_cache_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs index d5a1202cf..2b9ca480f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput { cache: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&value.cache.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput{ crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput::builder() .set_cache(Some( crate::deps::aws_cryptography_materialProviders::conversions::cache_type::from_dafny(dafny_value.cache().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache_input.rs index 8b15d6fa0..159397004 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_cryptographic_materials_cache_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput { cache: crate::deps::aws_cryptography_materialProviders::conversions::cache_type::to_dafny(&value.cache.clone().unwrap()) , @@ -23,30 +23,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput {..} => crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput::builder() @@ -59,10 +61,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier.rs index 96c239d0d..361c81f0f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_default_client_supplier_input; +pub mod _create_default_client_supplier_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier/_create_default_client_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier/_create_default_client_supplier_input.rs index 5bf9266f1..3efc1edef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier/_create_default_client_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier/_create_default_client_supplier_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput{ crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput::builder() .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier_input.rs index b0dd1065a..918f3bed3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_client_supplier_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput { } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager.rs index d0b952b64..ce246f6e5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_default_cryptographic_materials_manager_input; +pub mod _create_default_cryptographic_materials_manager_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs index c0aba493b..eb4c68d62 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { keyring: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&value.keyring.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput{ crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput::builder() .set_keyring(Some( crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(dafny_value.keyring().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager_input.rs index f866922e2..1f1e0d660 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_default_cryptographic_materials_manager_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { keyring: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&value.keyring.clone().unwrap()) , @@ -23,30 +23,30 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput {..} => crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput::builder() @@ -59,10 +59,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring.rs index 88ed88005..6d7296d32 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_multi_keyring_input; +pub mod _create_multi_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring/_create_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring/_create_multi_keyring_input.rs index 218a5d866..7921bae2b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring/_create_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring/_create_multi_keyring_input.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput::CreateMultiKeyringInput { - generator: ::std::rc::Rc::new(match &value.generator { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput::CreateMultiKeyringInput { + generator: ::dafny_runtime::Rc::new(match &value.generator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -20,12 +20,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput::builder() .set_generator(match (*dafny_value.generator()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring_input.rs index aaea76c8d..5945c2a92 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_multi_keyring_input.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput::CreateMultiKeyringInput { - generator: ::std::rc::Rc::new(match &value.generator { + generator: ::dafny_runtime::Rc::new(match &value.generator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -31,20 +31,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput { @@ -76,10 +76,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring.rs index c91560014..84680bc69 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_raw_aes_keyring_input; +pub mod _create_raw_aes_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs index eb07fd7f7..38ef85c52 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput::CreateRawAesKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput::CreateRawAesKeyringInput { keyNamespace: crate::standard_library_conversions::ostring_to_dafny(&value.key_namespace) .Extract(), keyName: crate::standard_library_conversions::ostring_to_dafny(&value.key_name) .Extract(), wrappingKey: crate::standard_library_conversions::blob_to_dafny(&value.wrapping_key.unwrap()), wrappingAlg: crate::deps::aws_cryptography_materialProviders::conversions::aes_wrapping_alg::to_dafny(value.wrapping_alg.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput::builder() .set_key_namespace(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.keyNamespace()) )) .set_key_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.keyName()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring_input.rs index 0a116c6c1..8a22a742a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_aes_keyring_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput::CreateRawAesKeyringInput { keyNamespace: crate::standard_library_conversions::ostring_to_dafny(&value.key_namespace) .Extract(), keyName: crate::standard_library_conversions::ostring_to_dafny(&value.key_name) .Extract(), @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput { @@ -63,10 +63,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring.rs index dc06a49b0..3ddb358d8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_raw_ecdh_keyring_input; +pub mod _create_raw_ecdh_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs index 9b179528d..729092160 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput { KeyAgreementScheme: crate::deps::aws_cryptography_materialProviders::conversions::raw_ecdh_static_configurations::to_dafny(&value.key_agreement_scheme.clone().unwrap()) , curveSpec: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.curve_spec.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput::builder() .set_key_agreement_scheme(Some( crate::deps::aws_cryptography_materialProviders::conversions::raw_ecdh_static_configurations::from_dafny(dafny_value.KeyAgreementScheme().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring_input.rs index 09d2f7f0d..4289ccef8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_ecdh_keyring_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput { KeyAgreementScheme: crate::deps::aws_cryptography_materialProviders::conversions::raw_ecdh_static_configurations::to_dafny(&value.key_agreement_scheme.clone().unwrap()) , @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput { @@ -61,10 +61,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring.rs index 345616d80..c1c4035d2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_raw_rsa_keyring_input; +pub mod _create_raw_rsa_keyring_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs index 260a5983c..3371adc75 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput::CreateRawRsaKeyringInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput::CreateRawRsaKeyringInput { keyNamespace: crate::standard_library_conversions::ostring_to_dafny(&value.key_namespace) .Extract(), keyName: crate::standard_library_conversions::ostring_to_dafny(&value.key_name) .Extract(), paddingScheme: crate::deps::aws_cryptography_materialProviders::conversions::padding_scheme::to_dafny(value.padding_scheme.clone().unwrap()), @@ -15,12 +15,12 @@ pub fn to_dafny( privateKey: crate::standard_library_conversions::oblob_to_dafny(&value.private_key), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput::builder() .set_key_namespace(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.keyNamespace()) )) .set_key_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.keyName()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring_input.rs index 1f5d8e495..e3187cc9c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_raw_rsa_keyring_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput::CreateRawRsaKeyringInput { keyNamespace: crate::standard_library_conversions::ostring_to_dafny(&value.key_namespace) .Extract(), keyName: crate::standard_library_conversions::ostring_to_dafny(&value.key_name) .Extract(), @@ -26,20 +26,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput { @@ -65,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm.rs index 785b75474..b54e941a9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _create_required_encryption_context_cmm_input; +pub mod _create_required_encryption_context_cmm_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs index 0823ae24c..b6f26296e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: ::std::rc::Rc::new(match &value.underlying_cmm { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { + underlyingCMM: ::dafny_runtime::Rc::new(match &value.underlying_cmm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - keyring: ::std::rc::Rc::new(match &value.keyring { + keyring: ::dafny_runtime::Rc::new(match &value.keyring { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -24,12 +24,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput{ crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput::builder() .set_underlying_cmm(match (*dafny_value.underlyingCMM()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm_input.rs index 9a87bb8ee..e416c8fb5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/create_required_encryption_context_cmm_input.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: ::std::rc::Rc::new(match &value.underlying_cmm { + underlyingCMM: ::dafny_runtime::Rc::new(match &value.underlying_cmm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::cryptographic_materials_manager::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - keyring: ::std::rc::Rc::new(match &value.keyring { + keyring: ::dafny_runtime::Rc::new(match &value.keyring { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::keyring::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -35,30 +35,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput, -) -> crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput { +) -> crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput {..} => crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput::builder() @@ -85,10 +87,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_cache.rs index c91eba6d2..885254ec8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_cache.rs @@ -6,20 +6,18 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache, -> { - let wrap = CryptographicMaterialsCacheWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = CryptographicMaterialsCacheWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct CryptographicMaterialsCacheWrapper { obj: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, } -impl ::dafny_runtime::UpcastObject for CryptographicMaterialsCacheWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for CryptographicMaterialsCacheWrapper { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -27,12 +25,12 @@ pub fn from_dafny( dafny_value: ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache, >, -) -> crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef { +) -> crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef{ let wrap = ICryptographicMaterialsCacheDafnyWrapper { obj: dafny_value.clone(), }; crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)) } } @@ -48,16 +46,16 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty { fn r#_PutCacheEntry_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< (), - ::std::rc::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::put_cache_entry::_put_cache_entry_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().put_cache_entry(inner_input); + let inner_result = self.obj.inner.lock().unwrap().put_cache_entry(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: (), @@ -66,21 +64,21 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } fn r#_UpdateUsageMetadata_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< (), - ::std::rc::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::update_usage_metadata::_update_usage_metadata_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().update_usage_metadata(inner_input); + let inner_result = self.obj.inner.lock().unwrap().update_usage_metadata(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: (), @@ -89,21 +87,21 @@ fn r#_UpdateUsageMetadata_k( error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } fn r#_GetCacheEntry_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_cache_entry::_get_cache_entry_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().get_cache_entry(inner_input); + let inner_result = self.obj.inner.lock().unwrap().get_cache_entry(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::get_cache_entry::_get_cache_entry_output::to_dafny(x.clone()), @@ -112,21 +110,21 @@ fn r#_GetCacheEntry_k( error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } fn r#_DeleteCacheEntry_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< (), - ::std::rc::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::delete_cache_entry::_delete_cache_entry_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().delete_cache_entry(inner_input); + let inner_result = self.obj.inner.lock().unwrap().delete_cache_entry(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: (), @@ -135,7 +133,7 @@ fn r#_DeleteCacheEntry_k( error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_manager.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_manager.rs index 91746b2d7..9c28f73c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_manager.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/cryptographic_materials_manager.rs @@ -6,20 +6,20 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, ) -> ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager, -> { - let wrap = CryptographicMaterialsManagerWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) +>{ + let wrap = CryptographicMaterialsManagerWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct CryptographicMaterialsManagerWrapper { obj: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, } -impl ::dafny_runtime::UpcastObject for CryptographicMaterialsManagerWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> + for CryptographicMaterialsManagerWrapper +{ + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -27,12 +27,12 @@ pub fn from_dafny( dafny_value: ::dafny_runtime::Object< dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager, >, -) -> crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef { +) -> crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef{ let wrap = ICryptographicMaterialsManagerDafnyWrapper { obj: dafny_value.clone(), }; crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)) } } @@ -48,16 +48,16 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty { fn r#_GetEncryptionMaterials_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::get_encryption_materials::_get_encryption_materials_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().get_encryption_materials(inner_input); + let inner_result = self.obj.inner.lock().unwrap().get_encryption_materials(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::get_encryption_materials::_get_encryption_materials_output::to_dafny(x.clone()), @@ -66,21 +66,21 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } fn r#_DecryptMaterials_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::decrypt_materials::_decrypt_materials_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().decrypt_materials(inner_input); + let inner_result = self.obj.inner.lock().unwrap().decrypt_materials(inner_input); let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::decrypt_materials::_decrypt_materials_output::to_dafny(x.clone()), @@ -89,7 +89,7 @@ fn r#_DecryptMaterials_k( error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) + ::dafny_runtime::Rc::new(result) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_algorithm_suite_id.rs index 2669e43b5..fb9c09ff7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_algorithm_suite_id.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeySymsigHmacSha384 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}, crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeyEcdsaP384SymsigHmacSha384 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId, ) -> crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_commitment_policy.rs index 68c428e2f..56872bb88 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/dbe_commitment_policy.rs @@ -5,13 +5,13 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy::RequireEncryptRequireDecrypt => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DBECommitmentPolicy, ) -> crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials.rs index 822e6d67c..3bd1787df 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decrypt_materials_input; +pub mod _decrypt_materials_input; - pub mod _decrypt_materials_output; +pub mod _decrypt_materials_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_input.rs index f147397cd..8abd4bd0a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput::DecryptMaterialsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput::DecryptMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , commitmentPolicy: crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::to_dafny(&value.commitment_policy.clone().unwrap()) @@ -23,7 +23,7 @@ pub fn to_dafny( ) , reproducedEncryptionContext: -::std::rc::Rc::new(match &value.reproduced_encryption_context { +::dafny_runtime::Rc::new(match &value.reproduced_encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -35,19 +35,19 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput{ crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput::builder() .set_algorithm_suite_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.algorithmSuiteId().clone()) )) .set_commitment_policy(Some( crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::from_dafny(dafny_value.commitmentPolicy().clone()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_output.rs index 043584068..ea7cdf0e0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials/_decrypt_materials_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput::DecryptMaterialsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput::DecryptMaterialsOutput { decryptionMaterials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.decryption_materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput { +) -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput{ crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput::builder() .set_decryption_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::from_dafny(dafny_value.decryptionMaterials().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_input.rs index 36ef6a366..5f2019a70 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput::DecryptMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , @@ -30,7 +30,7 @@ pub fn to_dafny_plain( ) , reproducedEncryptionContext: -::std::rc::Rc::new(match &value.reproduced_encryption_context { +::dafny_runtime::Rc::new(match &value.reproduced_encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -46,20 +46,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput { @@ -78,7 +78,7 @@ pub fn plain_from_dafny( .set_commitment_policy(Some( crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::from_dafny(dafny_value.commitmentPolicy().clone()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) @@ -105,10 +105,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_output.rs index 0cc07714f..0ef2a9d84 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decrypt_materials_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput::DecryptMaterialsOutput { decryptionMaterials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.decryption_materials.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials.rs index 9b0347ff3..b23c49754 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials::DecryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , @@ -35,20 +35,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials { @@ -83,10 +83,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key.rs index 55f72bbd5..41cec6027 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decryption_materials_with_plaintext_data_key_input; +pub mod _decryption_materials_with_plaintext_data_key_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key/_decryption_materials_with_plaintext_data_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key/_decryption_materials_with_plaintext_data_key_input.rs index 6c8b3d75e..3e128588f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key/_decryption_materials_with_plaintext_data_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/decryption_materials_with_plaintext_data_key/_decryption_materials_with_plaintext_data_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials::DecryptionMaterials { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials::DecryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -24,12 +24,12 @@ pub fn to_dafny( symmetricSigningKey: crate::standard_library_conversions::oblob_to_dafny(&value.symmetric_signing_key), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials { +) -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials{ crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials::builder() .set_algorithm_suite(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::from_dafny(dafny_value.algorithmSuite().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/default_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/default_cache.rs index 8f2423b68..f768a8511 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/default_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/default_cache.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DefaultCache, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DefaultCache, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DefaultCache, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DefaultCache { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DefaultCache +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DefaultCache::DefaultCache { entryCapacity: value.entry_capacity.clone().unwrap(), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DefaultCache, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DefaultCache { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry.rs index a83b92feb..351634c20 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _delete_cache_entry_input; +pub mod _delete_cache_entry_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry/_delete_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry/_delete_cache_entry_input.rs index b195cd07d..c17c8ffda 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry/_delete_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry/_delete_cache_entry_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput::DeleteCacheEntryInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput::DeleteCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput{ crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput::builder() .set_identifier(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.identifier().clone()))) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry_input.rs index d44427c55..8a92099dc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/delete_cache_entry_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput::DeleteCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DeleteCacheEntryInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/derivation_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/derivation_algorithm.rs index 6a1f37a29..66ae2aeda 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/derivation_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/derivation_algorithm.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF { HKDF: crate::deps::aws_cryptography_materialProviders::conversions::hkdf::to_dafny(&x.clone()) @@ -29,11 +29,11 @@ crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Non #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF { HKDF: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf(crate::deps::aws_cryptography_materialProviders::conversions::hkdf::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/direct_key_wrapping.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/direct_key_wrapping.rs index 0136f112b..48e0d185e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/direct_key_wrapping.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/direct_key_wrapping.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING { } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/discovery_filter.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/discovery_filter.rs index 20d2120d1..c19dde43c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/discovery_filter.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/discovery_filter.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DiscoveryFilter, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DiscoveryFilter { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DiscoveryFilter +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DiscoveryFilter::DiscoveryFilter { accountIds: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.account_ids.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -26,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DiscoveryFilter, >, ) -> crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter { @@ -65,10 +66,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ecdsa.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ecdsa.rs index 5350cfe1f..1dc5ff326 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ecdsa.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ecdsa.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::Ecdsa, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -21,21 +21,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA, >, ) -> crate::deps::aws_cryptography_materialProviders::types::Ecdsa { @@ -57,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/edk_wrapping_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/edk_wrapping_algorithm.rs index 2bacfa0d8..784f450ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/edk_wrapping_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/edk_wrapping_algorithm.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { DIRECT_KEY_WRAPPING: crate::deps::aws_cryptography_materialProviders::conversions::direct_key_wrapping::to_dafny(&x.clone()) @@ -24,11 +24,11 @@ crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::In #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm, >, ) -> crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { DIRECT_KEY_WRAPPING: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(crate::deps::aws_cryptography_materialProviders::conversions::direct_key_wrapping::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypt.rs index d16d98d41..3320959a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypt.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::Encrypt, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt, > { - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt::AES_GCM { AES_GCM: crate::deps::aws_cryptography_primitives::conversions::aes_gcm::to_dafny(&x.clone()) @@ -19,11 +19,11 @@ pub fn to_dafny( #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt, >, ) -> crate::deps::aws_cryptography_materialProviders::types::Encrypt { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt::AES_GCM { AES_GCM: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(crate::deps::aws_cryptography_primitives::conversions::aes_gcm::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypted_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypted_data_key.rs index 4ed9523c2..9d31cc874 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypted_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encrypted_data_key.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey::EncryptedDataKey { - keyProviderId: std::rc::Rc::new(match value.key_provider_id { + keyProviderId: dafny_runtime::Rc::new(match value.key_provider_id { Some(s) => crate::_Wrappers_Compile::Option::Some { value: dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&s.as_bytes().to_vec(), |b| *b) }, None => crate::_Wrappers_Compile::Option::None {}, }).Extract(), @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey, >, ) -> crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey { @@ -64,10 +64,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials.rs index 678b1fe51..a645087a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials::EncryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , @@ -33,7 +33,7 @@ pub fn to_dafny_plain( , plaintextDataKey: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext_data_key), signingKey: crate::standard_library_conversions::oblob_to_dafny(&value.signing_key), - symmetricSigningKeys: ::std::rc::Rc::new(match &value.symmetric_signing_keys { + symmetricSigningKeys: ::dafny_runtime::Rc::new(match &value.symmetric_signing_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::standard_library_conversions::blob_to_dafny(&e), @@ -48,20 +48,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, >, ) -> crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials { @@ -83,7 +83,7 @@ pub fn plain_from_dafny( ) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) @@ -110,10 +110,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key.rs index 1acd68adf..9aa44257d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _encryption_materials_has_plaintext_data_key_input; +pub mod _encryption_materials_has_plaintext_data_key_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key/_encryption_materials_has_plaintext_data_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key/_encryption_materials_has_plaintext_data_key_input.rs index 402b9c03b..624bb745e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key/_encryption_materials_has_plaintext_data_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/encryption_materials_has_plaintext_data_key/_encryption_materials_has_plaintext_data_key_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials::EncryptionMaterials { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials::EncryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -26,7 +26,7 @@ pub fn to_dafny( , plaintextDataKey: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext_data_key), signingKey: crate::standard_library_conversions::oblob_to_dafny(&value.signing_key), - symmetricSigningKeys: ::std::rc::Rc::new(match &value.symmetric_signing_keys { + symmetricSigningKeys: ::dafny_runtime::Rc::new(match &value.symmetric_signing_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::standard_library_conversions::blob_to_dafny(&e), @@ -37,12 +37,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials { +) -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials{ crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials::builder() .set_algorithm_suite(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::from_dafny(dafny_value.algorithmSuite().clone()) )) @@ -52,7 +52,7 @@ pub fn from_dafny( ) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ephemeral_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ephemeral_private_key_to_static_public_key_input.rs index ef7dfba6e..057152251 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ephemeral_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/ephemeral_private_key_to_static_public_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput { recipientPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.recipient_public_key.unwrap()), } @@ -22,30 +22,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput { +) -> crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput, -) -> crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput { +) -> crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput {..} => crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput::builder() @@ -57,10 +59,10 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/error.rs index 79b6e0be2..9745100c2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/error.rs @@ -2,15 +2,21 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -19,22 +25,26 @@ pub fn to_opaque_error(value: String) -> } /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure -pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< - crate::_Wrappers_Compile::Result< - T, - ::std::rc::Rc - > - > -{ - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { +pub fn to_opaque_error_result( + value: String, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Result< + T, + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error, + >, + >, +> { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::error::Error::AwsCryptographicMaterialProvidersException { message } => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error::AwsCryptographicMaterialProvidersException { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -103,7 +113,7 @@ crate::deps::aws_cryptography_materialProviders::types::error::Error::KeyStoreEr crate::deps::aws_cryptography_materialProviders::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -124,7 +134,7 @@ crate::deps::aws_cryptography_materialProviders::types::error::Error::KeyStoreEr #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_materialProviders::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_algorithm_suite_id.rs index 7829f31b6..5fd160065 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_algorithm_suite_id.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16NoKdf => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}, crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16NoKdf => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}, crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16NoKdf => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}, @@ -21,7 +21,7 @@ crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId::Al _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId, ) -> crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_commitment_policy.rs index d1b51e99f..0914b06cc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/esdk_commitment_policy.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy::ForbidEncryptAllowDecrypt => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT {}, crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy::RequireEncryptAllowDecrypt => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT {}, crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy::RequireEncryptRequireDecrypt => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ESDKCommitmentPolicy, ) -> crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info.rs index 8af150eab..9fd77618e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_algorithm_suite_info_output; +pub mod _get_algorithm_suite_info_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info/_get_algorithm_suite_info_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info/_get_algorithm_suite_info_output.rs index 2890a5ee7..f06379b11 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info/_get_algorithm_suite_info_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_algorithm_suite_info/_get_algorithm_suite_info_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo::AlgorithmSuiteInfo { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo::AlgorithmSuiteInfo { id: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.id.clone().unwrap()) , binaryId: crate::standard_library_conversions::blob_to_dafny(&value.binary_id.unwrap()), @@ -26,12 +26,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo{ crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo::builder() .set_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.id().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id.rs index ec37422a6..1ee5575f1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_branch_key_id_input; +pub mod _get_branch_key_id_input; - pub mod _get_branch_key_id_output; +pub mod _get_branch_key_id_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_input.rs index 72435a649..fa1551792 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput::GetBranchKeyIdInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput::GetBranchKeyIdInput { encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), |v| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&v.as_bytes().to_vec(), |b| *b), @@ -15,12 +15,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput{ crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput::builder() .set_encryption_context(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptionContext(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| ::std::string::String::from_utf8(dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(&::std::borrow::Borrow::borrow(k), |b| *b)).unwrap(), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_output.rs index 81d11b172..271e3a6be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id/_get_branch_key_id_output.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput::GetBranchKeyIdOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput::GetBranchKeyIdOutput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput{ crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput::builder() .set_branch_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.branchKeyId()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_input.rs index 903ae5401..f04d90745 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput::GetBranchKeyIdInput { encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -26,20 +26,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput { @@ -65,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_output.rs index 773d5bd21..e5e5d7f27 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_branch_key_id_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput::GetBranchKeyIdOutput { branchKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.branch_key_id) .Extract(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetBranchKeyIdOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry.rs index b9f551530..214068b5b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_cache_entry_input; +pub mod _get_cache_entry_input; - pub mod _get_cache_entry_output; +pub mod _get_cache_entry_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_input.rs index 09aaa472a..8b40afef4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_input.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput::GetCacheEntryInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput::GetCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), bytesUsed: crate::standard_library_conversions::olong_to_dafny(&value.bytes_used), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput +{ crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput::builder() .set_identifier(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.identifier().clone()))) .set_bytes_used(crate::standard_library_conversions::olong_from_dafny(dafny_value.bytesUsed().clone())) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_output.rs index c4e8b39ad..63397bdb4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry/_get_cache_entry_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput::GetCacheEntryOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput::GetCacheEntryOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::materials::to_dafny(&value.materials.clone().unwrap()) , creationTime: value.creation_time.clone().unwrap(), @@ -16,12 +16,13 @@ pub fn to_dafny( bytesUsed: value.bytes_used.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput +{ crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput::builder() .set_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::materials::from_dafny(dafny_value.materials().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_input.rs index d7b65a5cf..331b7078c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput::GetCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), bytesUsed: crate::standard_library_conversions::olong_to_dafny(&value.bytes_used), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_output.rs index 702380c1e..69f89a501 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_cache_entry_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput::GetCacheEntryOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::materials::to_dafny(&value.materials.clone().unwrap()) , @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput { @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client.rs index 671a7a84d..6051cb8f2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_client_input; +pub mod _get_client_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client/_get_client_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client/_get_client_input.rs index 8b43e1085..b091c6c95 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client/_get_client_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client/_get_client_input.rs @@ -4,21 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput::GetClientInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput::GetClientInput { region: crate::standard_library_conversions::ostring_to_dafny(&value.region) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput, >, ) -> crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput { - crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput::builder() - .set_region(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.region()) )) - .build() - .unwrap() + crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput::builder( + ) + .set_region(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.region(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client_input.rs index b9045823f..3d0702b49 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_client_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetClientInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetClientInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput::GetClientInput { region: crate::standard_library_conversions::ostring_to_dafny(&value.region) .Extract(), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetClientInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetClientInput { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials.rs index 40b2ebe43..7d2642f2f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_encryption_materials_input; +pub mod _get_encryption_materials_input; - pub mod _get_encryption_materials_output; +pub mod _get_encryption_materials_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_input.rs index c5561945a..89e0d11d5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), |v| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&v.as_bytes().to_vec(), |b| *b), @@ -15,13 +15,13 @@ pub fn to_dafny( , commitmentPolicy: crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::to_dafny(&value.commitment_policy.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , maxPlaintextLength: crate::standard_library_conversions::olong_to_dafny(&value.max_plaintext_length), - requiredEncryptionContextKeys: ::std::rc::Rc::new(match &value.required_encryption_context_keys { + requiredEncryptionContextKeys: ::dafny_runtime::Rc::new(match &value.required_encryption_context_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&e.as_bytes().to_vec(), |b| *b), @@ -32,12 +32,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput{ crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput::builder() .set_encryption_context(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.encryptionContext(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence| ::std::string::String::from_utf8(dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(&::std::borrow::Borrow::borrow(k), |b| *b)).unwrap(), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_output.rs index a166a0890..2e331ae53 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials/_get_encryption_materials_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput { encryptionMaterials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.encryption_materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput { +) -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput{ crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput::builder() .set_encryption_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::from_dafny(dafny_value.encryptionMaterials().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_input.rs index d492ab870..4d53d782f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&k.as_bytes().to_vec(), |b| *b), @@ -22,13 +22,13 @@ pub fn to_dafny_plain( , commitmentPolicy: crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::to_dafny(&value.commitment_policy.clone().unwrap()) , - algorithmSuiteId: ::std::rc::Rc::new(match &value.algorithm_suite_id { + algorithmSuiteId: ::dafny_runtime::Rc::new(match &value.algorithm_suite_id { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , maxPlaintextLength: crate::standard_library_conversions::olong_to_dafny(&value.max_plaintext_length), - requiredEncryptionContextKeys: ::std::rc::Rc::new(match &value.required_encryption_context_keys { + requiredEncryptionContextKeys: ::dafny_runtime::Rc::new(match &value.required_encryption_context_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&e.as_bytes().to_vec(), |b| *b), @@ -43,20 +43,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput { @@ -101,10 +101,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_output.rs index 430a47ef0..7a01bec9f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/get_encryption_materials_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput { encryptionMaterials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.encryption_materials.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/hkdf.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/hkdf.rs index cc1a37e58..955e8f2bf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/hkdf.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/hkdf.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::Hkdf, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::HKDF, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -15,30 +15,36 @@ pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::Hkdf, ) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::HKDF { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { - hmac: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.hmac.clone().unwrap()), - saltLength: value.salt_length.clone().unwrap(), - inputKeyLength: value.input_key_length.clone().unwrap(), - outputKeyLength: value.output_key_length.clone().unwrap(), + hmac: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny( + value.hmac.clone().unwrap(), + ), + saltLength: value.salt_length.clone().unwrap(), + inputKeyLength: value.input_key_length.clone().unwrap(), + outputKeyLength: value.output_key_length.clone().unwrap(), } } #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::HKDF, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::HKDF, >, ) -> crate::deps::aws_cryptography_materialProviders::types::Hkdf { @@ -63,7 +69,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/identity.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/identity.rs index 846a77bab..8bf56cbb2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/identity.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/identity.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::Identity, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY, >, ) -> crate::deps::aws_cryptography_materialProviders::types::Identity { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials.rs index bac3c925f..dd4e0c7a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _initialize_decryption_materials_input; +pub mod _initialize_decryption_materials_input; - pub mod _initialize_decryption_materials_output; +pub mod _initialize_decryption_materials_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_input.rs index fcd87e2df..7150d511a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -21,12 +21,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput{ crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput::builder() .set_algorithm_suite_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.algorithmSuiteId().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_output.rs index fb2372e38..15a0a842c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials/_initialize_decryption_materials_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials::DecryptionMaterials { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials::DecryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -24,12 +24,12 @@ pub fn to_dafny( symmetricSigningKey: crate::standard_library_conversions::oblob_to_dafny(&value.symmetric_signing_key), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials { +) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials{ crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials::builder() .set_algorithm_suite(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::from_dafny(dafny_value.algorithmSuite().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials_input.rs index 869aa0997..f5dfc7216 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_decryption_materials_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , @@ -32,20 +32,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput { @@ -77,10 +77,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials.rs index f68441c69..75793e643 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _initialize_encryption_materials_input; +pub mod _initialize_encryption_materials_input; - pub mod _initialize_encryption_materials_output; +pub mod _initialize_encryption_materials_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_input.rs index 0874e40ec..5848b904c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -23,12 +23,12 @@ pub fn to_dafny( verificationKey: crate::standard_library_conversions::oblob_to_dafny(&value.verification_key), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput{ crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput::builder() .set_algorithm_suite_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.algorithmSuiteId().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_output.rs index 5a391ad47..da9d8ac0e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials/_initialize_encryption_materials_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials::EncryptionMaterials { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials::EncryptionMaterials { algorithmSuite: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::to_dafny(&value.algorithm_suite.clone().unwrap()) , encryptionContext: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.encryption_context.clone().unwrap(), @@ -26,7 +26,7 @@ pub fn to_dafny( , plaintextDataKey: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext_data_key), signingKey: crate::standard_library_conversions::oblob_to_dafny(&value.signing_key), - symmetricSigningKeys: ::std::rc::Rc::new(match &value.symmetric_signing_keys { + symmetricSigningKeys: ::dafny_runtime::Rc::new(match &value.symmetric_signing_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::standard_library_conversions::blob_to_dafny(&e), @@ -37,12 +37,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials { +) -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials{ crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials::builder() .set_algorithm_suite(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_info::from_dafny(dafny_value.algorithmSuite().clone()) )) @@ -52,7 +52,7 @@ pub fn from_dafny( ) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials_input.rs index a3391ba02..5a1eda2c6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/initialize_encryption_materials_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput { algorithmSuiteId: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm_suite_id.clone().unwrap()) , @@ -34,20 +34,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput { @@ -81,10 +81,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/intermediate_key_wrapping.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/intermediate_key_wrapping.rs index c1e12b854..4c49a70f7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/intermediate_key_wrapping.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/intermediate_key_wrapping.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping::IntermediateKeyWrapping { keyEncryptionKeyKdf: crate::deps::aws_cryptography_materialProviders::conversions::derivation_algorithm::to_dafny(&value.key_encryption_key_kdf.clone().unwrap()) , @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping, >, ) -> crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping { @@ -67,10 +67,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/key_agreement_scheme.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/key_agreement_scheme.rs index 15d87cb3a..2fa7ebd13 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/key_agreement_scheme.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/key_agreement_scheme.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KeyAgreementScheme, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KeyAgreementScheme::StaticConfiguration { StaticConfiguration: crate::deps::aws_cryptography_materialProviders::conversions::static_configurations::to_dafny(&x.clone()) @@ -19,11 +19,11 @@ pub fn to_dafny( #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KeyAgreementScheme, >, ) -> crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KeyAgreementScheme::StaticConfiguration { StaticConfiguration: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration(crate::deps::aws_cryptography_materialProviders::conversions::static_configurations::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/keyring.rs index 3b716149d..6c1a0c540 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/keyring.rs @@ -5,21 +5,19 @@ pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, ) -> ::dafny_runtime::Object< - dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring, + dyn crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring, > { - let wrap = KeyringWrapper { - obj: value.clone(), - }; - let inner = ::std::rc::Rc::new(::std::cell::UnsafeCell::new(wrap)); - ::dafny_runtime::Object (Some(inner) ) + let wrap = KeyringWrapper { obj: value.clone() }; + let inner = ::dafny_runtime::Rc::new(::dafny_runtime::UnsafeCell::new(wrap)); + ::dafny_runtime::Object(Some(inner)) } pub struct KeyringWrapper { - obj: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + obj: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, } -impl ::dafny_runtime::UpcastObject for KeyringWrapper { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl ::dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for KeyringWrapper { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } #[allow(dead_code)] @@ -32,7 +30,7 @@ pub fn from_dafny( obj: dafny_value.clone(), }; crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef { - inner: ::std::rc::Rc::new(::std::cell::RefCell::new(wrap)) + inner: ::dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(wrap)), } } @@ -44,21 +42,21 @@ pub struct IKeyringDafnyWrapper { } impl crate::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring - for KeyringWrapper + for KeyringWrapper { - fn r#_OnEncrypt_k( + fn r#_OnEncrypt_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().on_encrypt(inner_input); - let result = match inner_result { + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_input::from_dafny(input.clone()); + let inner_result = self.obj.inner.lock().unwrap().on_encrypt(inner_input); + let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_output::to_dafny(x.clone()), }, @@ -66,22 +64,22 @@ impl crate::software::amazon::cryptography::materialproviders::internaldafny::ty error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) -} + ::dafny_runtime::Rc::new(result) + } fn r#_OnDecrypt_k( &self, - input: &::std::rc::Rc, -) -> ::std::rc::Rc< + input: &::dafny_runtime::Rc, +) -> ::dafny_runtime::Rc< crate::r#_Wrappers_Compile::Result< - ::std::rc::Rc, - ::std::rc::Rc, + ::dafny_runtime::Rc, + ::dafny_runtime::Rc, >, > { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_input::from_dafny(input.clone()); - let inner_result = self.obj.inner.borrow_mut().on_decrypt(inner_input); - let result = match inner_result { + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_input::from_dafny(input.clone()); + let inner_result = self.obj.inner.lock().unwrap().on_decrypt(inner_input); + let result = match inner_result { Ok(x) => crate::r#_Wrappers_Compile::Result::Success { value: crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_output::to_dafny(x.clone()), }, @@ -89,55 +87,60 @@ fn r#_OnDecrypt_k( error: crate::deps::aws_cryptography_materialProviders::conversions::error::to_dafny(x), }, }; - ::std::rc::Rc::new(result) -} + ::dafny_runtime::Rc::new(result) + } } -impl crate::deps::aws_cryptography_materialProviders::types::keyring::Keyring for IKeyringDafnyWrapper +impl crate::deps::aws_cryptography_materialProviders::types::keyring::Keyring + for IKeyringDafnyWrapper { - fn on_encrypt( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, -) -> Result< - crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, - crate::deps::aws_cryptography_materialProviders::types::error::Error, -> { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_input::to_dafny(input); - let inner_result = ::dafny_runtime::md!(self.obj.clone()).OnEncrypt(&inner_input); - if matches!( - inner_result.as_ref(), - crate::r#_Wrappers_Compile::Result::Success { .. } - ) { - Ok( + fn on_encrypt( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, + ) -> Result< + crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + > { + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(self.obj.clone()).OnEncrypt(&inner_input); + if matches!( + inner_result.as_ref(), + crate::r#_Wrappers_Compile::Result::Success { .. } + ) { + Ok( crate::deps::aws_cryptography_materialProviders::conversions::on_encrypt::_on_encrypt_output::from_dafny(inner_result.value().clone()), ) - } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) - } -} + } else { + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) + } + } -fn on_decrypt( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, -) -> Result< - crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, - crate::deps::aws_cryptography_materialProviders::types::error::Error, -> { - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_input::to_dafny(input); - let inner_result = ::dafny_runtime::md!(self.obj.clone()).OnDecrypt(&inner_input); - if matches!( - inner_result.as_ref(), - crate::r#_Wrappers_Compile::Result::Success { .. } - ) { - Ok( + fn on_decrypt( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, + ) -> Result< + crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + > { + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(self.obj.clone()).OnDecrypt(&inner_input); + if matches!( + inner_result.as_ref(), + crate::r#_Wrappers_Compile::Result::Success { .. } + ) { + Ok( crate::deps::aws_cryptography_materialProviders::conversions::on_decrypt::_on_decrypt_output::from_dafny(inner_result.value().clone()), ) - } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) - } -} + } else { + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) + } + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_ecdh_static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_ecdh_static_configurations.rs index f738f8456..5333e4978 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_ecdh_static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_ecdh_static_configurations.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsEcdhStaticConfigurations, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery { KmsPublicKeyDiscovery: crate::deps::aws_cryptography_materialProviders::conversions::kms_public_key_discovery_input::to_dafny(&x.clone()) @@ -24,11 +24,11 @@ crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurati #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsEcdhStaticConfigurations, >, ) -> crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery { KmsPublicKeyDiscovery: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(crate::deps::aws_cryptography_materialProviders::conversions::kms_public_key_discovery_input::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_private_key_to_static_public_key_input.rs index 0a08cdb66..b68624d1c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_private_key_to_static_public_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPrivateKeyToStaticPublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPrivateKeyToStaticPublicKeyInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPrivateKeyToStaticPublicKeyInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput { senderKmsIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.sender_kms_identifier) .Extract(), senderPublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.sender_public_key), @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPrivateKeyToStaticPublicKeyInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput { @@ -61,10 +61,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_public_key_discovery_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_public_key_discovery_input.rs index 5b1b38b00..29f62ec7a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_public_key_discovery_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/kms_public_key_discovery_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPublicKeyDiscoveryInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPublicKeyDiscoveryInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPublicKeyDiscoveryInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput { recipientKmsIdentifier: crate::standard_library_conversions::ostring_to_dafny(&value.recipient_kms_identifier) .Extract(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::KmsPublicKeyDiscoveryInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/material_providers_config/_material_providers_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/material_providers_config/_material_providers_config.rs index 4cce835c1..bc3168961 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/material_providers_config/_material_providers_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/material_providers_config/_material_providers_config.rs @@ -5,26 +5,25 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig, -> { - ::std::rc::Rc::new(to_dafny_plain(value)) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig, >, -) -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig { +) -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig{ plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig::MaterialProvidersConfig { } @@ -33,7 +32,7 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig, -) -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig { +) -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig::MaterialProvidersConfig {..} => crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig::builder() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/materials.rs index f3f343986..ebe47e89c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/materials.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::Materials, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Materials, > { - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Materials::Encryption { Encryption: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&x.clone()) @@ -34,11 +34,11 @@ crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey(x) #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Materials, >, ) -> crate::deps::aws_cryptography_materialProviders::types::Materials { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::Materials::Encryption { Encryption: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption(crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/multi_threaded_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/multi_threaded_cache.rs index d42f46523..f2fd8337f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/multi_threaded_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/multi_threaded_cache.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MultiThreadedCache, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MultiThreadedCache { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MultiThreadedCache{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MultiThreadedCache::MultiThreadedCache { entryCapacity: value.entry_capacity.clone().unwrap(), entryPruningTailSize: crate::standard_library_conversions::oint_to_dafny(value.entry_pruning_tail_size), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::MultiThreadedCache, >, ) -> crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/no_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/no_cache.rs index 5f24ea15e..2a3177d61 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/no_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/no_cache.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::NoCache, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::NoCache, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::NoCache, >, ) -> crate::deps::aws_cryptography_materialProviders::types::NoCache { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/none.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/none.rs index 6c96b86e4..84deff62f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/none.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/none.rs @@ -4,38 +4,40 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::None, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::None, ) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None { - crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None::None { - - } + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None::None {} } #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::None, >, ) -> crate::deps::aws_cryptography_materialProviders::types::None { @@ -57,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt.rs index 11d483a3e..b3bcab54f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _on_decrypt_input; +pub mod _on_decrypt_input; - pub mod _on_decrypt_output; +pub mod _on_decrypt_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_input.rs index ea484f4df..2edbf1a7e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput::OnDecryptInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput::OnDecryptInput { materials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.materials.clone().unwrap()) , encryptedDataKeys: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.encrypted_data_keys.clone().unwrap(), @@ -17,9 +17,9 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput, >, ) -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput { @@ -27,7 +27,7 @@ pub fn from_dafny( .set_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::from_dafny(dafny_value.materials().clone()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_output.rs index 2d63e21bc..63d854986 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt/_on_decrypt_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput::OnDecryptOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput::OnDecryptOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_input.rs index d47a5eb69..92b7f2005 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput::OnDecryptInput { materials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.materials.clone().unwrap()) , @@ -28,20 +29,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput { @@ -58,7 +59,7 @@ pub fn plain_from_dafny( .set_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::from_dafny(dafny_value.materials().clone()) )) .set_encrypted_data_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.encryptedDataKeys(), - |e: &::std::rc::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::aws_cryptography_materialProviders::conversions::encrypted_data_key::from_dafny(e.clone()) , ) )) @@ -69,7 +70,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_output.rs index 595ea28ba..36c5d8219 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_decrypt_output.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput::OnDecryptOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.materials.clone().unwrap()) , @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnDecryptOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput { @@ -59,10 +60,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt.rs index 34ba398b0..1ffe5a021 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _on_encrypt_input; +pub mod _on_encrypt_input; - pub mod _on_encrypt_output; +pub mod _on_encrypt_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_input.rs index 7cebe330b..42965e946 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_input.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput::OnEncryptInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput::OnEncryptInput { materials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput, >, ) -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_output.rs index 3203b24ea..38d15f6bd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt/_on_encrypt_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput::OnEncryptOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput::OnEncryptOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.materials.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_input.rs index 72b279382..874bc71dd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput::OnEncryptInput { materials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.materials.clone().unwrap()) , @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput { @@ -59,7 +60,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_output.rs index 5f435a39c..9be4388dc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/on_encrypt_output.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput +{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput::OnEncryptOutput { materials: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.materials.clone().unwrap()) , @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::OnEncryptOutput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput { @@ -59,10 +60,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/padding_scheme.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/padding_scheme.rs index 5dae655d7..475084986 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/padding_scheme.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/padding_scheme.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PaddingScheme, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::PaddingScheme::Pkcs1 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PaddingScheme::PKCS1 {}, crate::deps::aws_cryptography_materialProviders::types::PaddingScheme::OaepSha1Mgf1 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PaddingScheme::OAEP_SHA1_MGF1 {}, crate::deps::aws_cryptography_materialProviders::types::PaddingScheme::OaepSha256Mgf1 => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PaddingScheme::OAEP_SHA256_MGF1 {}, @@ -15,7 +17,7 @@ crate::deps::aws_cryptography_materialProviders::types::PaddingScheme::OaepSha51 _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PaddingScheme, ) -> crate::deps::aws_cryptography_materialProviders::types::PaddingScheme { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/public_key_discovery_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/public_key_discovery_input.rs index ce8313b3b..a739dd1fb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/public_key_discovery_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/public_key_discovery_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PublicKeyDiscoveryInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PublicKeyDiscoveryInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PublicKeyDiscoveryInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PublicKeyDiscoveryInput::PublicKeyDiscoveryInput { recipientStaticPrivateKey: crate::standard_library_conversions::blob_to_dafny(&value.recipient_static_private_key.unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PublicKeyDiscoveryInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry.rs index 9de055a49..23bc4c0ff 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _put_cache_entry_input; +pub mod _put_cache_entry_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry/_put_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry/_put_cache_entry_input.rs index 6b425fb73..b3b737f1a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry/_put_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry/_put_cache_entry_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput::PutCacheEntryInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput::PutCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), materials: crate::deps::aws_cryptography_materialProviders::conversions::materials::to_dafny(&value.materials.clone().unwrap()) , @@ -17,12 +17,13 @@ pub fn to_dafny( bytesUsed: crate::standard_library_conversions::oint_to_dafny(value.bytes_used), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput +{ crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput::builder() .set_identifier(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.identifier().clone()))) .set_materials(Some( crate::deps::aws_cryptography_materialProviders::conversions::materials::from_dafny(dafny_value.materials().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry_input.rs index f49dc611c..925e98cd8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/put_cache_entry_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput::PutCacheEntryInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), materials: crate::deps::aws_cryptography_materialProviders::conversions::materials::to_dafny(&value.materials.clone().unwrap()) @@ -28,20 +28,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::PutCacheEntryInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput { @@ -69,10 +69,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_ecdh_static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_ecdh_static_configurations.rs index 1ca03e57a..db5a09be1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_ecdh_static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_ecdh_static_configurations.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawEcdhStaticConfigurations, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawEcdhStaticConfigurations::PublicKeyDiscovery { PublicKeyDiscovery: crate::deps::aws_cryptography_materialProviders::conversions::public_key_discovery_input::to_dafny(&x.clone()) @@ -29,11 +29,11 @@ crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurati #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawEcdhStaticConfigurations, >, ) -> crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawEcdhStaticConfigurations::PublicKeyDiscovery { PublicKeyDiscovery: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(crate::deps::aws_cryptography_materialProviders::conversions::public_key_discovery_input::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_private_key_to_static_public_key_input.rs index f5301caba..46311bc26 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/raw_private_key_to_static_public_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawPrivateKeyToStaticPublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawPrivateKeyToStaticPublicKeyInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawPrivateKeyToStaticPublicKeyInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput { senderStaticPrivateKey: crate::standard_library_conversions::blob_to_dafny(&value.sender_static_private_key.unwrap()), recipientPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.recipient_public_key.unwrap()), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::RawPrivateKeyToStaticPublicKeyInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/signature_algorithm.rs index 14bdd8ba4..0abfb2b3a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/signature_algorithm.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA { ECDSA: crate::deps::aws_cryptography_materialProviders::conversions::ecdsa::to_dafny(&x.clone()) @@ -24,11 +24,11 @@ crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm, >, ) -> crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA { ECDSA: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa(crate::deps::aws_cryptography_materialProviders::conversions::ecdsa::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/single_threaded_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/single_threaded_cache.rs index 3719b51e5..7322e2296 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/single_threaded_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/single_threaded_cache.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SingleThreadedCache, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SingleThreadedCache { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SingleThreadedCache{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SingleThreadedCache::SingleThreadedCache { entryCapacity: value.entry_capacity.clone().unwrap(), entryPruningTailSize: crate::standard_library_conversions::oint_to_dafny(value.entry_pruning_tail_size), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SingleThreadedCache, >, ) -> crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/static_configurations.rs index 45d07881b..958f1a6ce 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/static_configurations.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StaticConfigurations, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StaticConfigurations::AWS_KMS_ECDH { AWS_KMS_ECDH: crate::deps::aws_cryptography_materialProviders::conversions::kms_ecdh_static_configurations::to_dafny(&x.clone()) @@ -24,11 +24,11 @@ crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::Ra #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StaticConfigurations, >, ) -> crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StaticConfigurations::AWS_KMS_ECDH { AWS_KMS_ECDH: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh(crate::deps::aws_cryptography_materialProviders::conversions::kms_ecdh_static_configurations::from_dafny(x.clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/storm_tracking_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/storm_tracking_cache.rs index 6829cd8c5..13f20f260 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/storm_tracking_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/storm_tracking_cache.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StormTrackingCache, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StormTrackingCache { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StormTrackingCache{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StormTrackingCache::StormTrackingCache { entryCapacity: value.entry_capacity.clone().unwrap(), entryPruningTailSize: crate::standard_library_conversions::oint_to_dafny(value.entry_pruning_tail_size), @@ -22,7 +22,7 @@ pub fn to_dafny_plain( fanOut: value.fan_out.clone().unwrap(), inFlightTTL: value.in_flight_ttl.clone().unwrap(), sleepMilli: value.sleep_milli.clone().unwrap(), - timeUnits: ::std::rc::Rc::new(match &value.time_units { + timeUnits: ::dafny_runtime::Rc::new(match &value.time_units { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::aws_cryptography_materialProviders::conversions::time_units::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -33,20 +33,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::StormTrackingCache, >, ) -> crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache { @@ -81,10 +81,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/symmetric_signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/symmetric_signature_algorithm.rs index 261dee9b4..41ab2b923 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/symmetric_signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/symmetric_signature_algorithm.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(x) => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::HMAC { HMAC: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(x.clone()), @@ -23,11 +23,11 @@ crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgori #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm, >, ) -> crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::HMAC { HMAC: x @ _, } => crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(x)), diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/time_units.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/time_units.rs index 1caaf744c..22eafaa04 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/time_units.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/time_units.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::types::TimeUnits, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::TimeUnits, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_materialProviders::types::TimeUnits::Seconds => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::TimeUnits::Seconds {}, crate::deps::aws_cryptography_materialProviders::types::TimeUnits::Milliseconds => crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::TimeUnits::Milliseconds {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::TimeUnits, ) -> crate::deps::aws_cryptography_materialProviders::types::TimeUnits { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata.rs index 2ed31961f..e769138f1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _update_usage_metadata_input; +pub mod _update_usage_metadata_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata/_update_usage_metadata_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata/_update_usage_metadata_input.rs index b752ca89e..4934e6709 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata/_update_usage_metadata_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata/_update_usage_metadata_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput::UpdateUsageMetadataInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput::UpdateUsageMetadataInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), bytesUsed: value.bytes_used.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput{ crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput::builder() .set_identifier(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.identifier().clone()))) .set_bytes_used(Some( dafny_value.bytesUsed() .clone() )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata_input.rs index 600b7caa8..07ed6278b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/update_usage_metadata_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput::UpdateUsageMetadataInput { identifier: crate::standard_library_conversions::blob_to_dafny(&value.identifier.unwrap()), bytesUsed: value.bytes_used.clone().unwrap(), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::UpdateUsageMetadataInput, >, ) -> crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput { @@ -59,10 +59,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info.rs index a44cde64a..357827051 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _valid_algorithm_suite_info_input; +pub mod _valid_algorithm_suite_info_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info/_valid_algorithm_suite_info_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info/_valid_algorithm_suite_info_input.rs index 68eb7a51f..4618d9a32 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info/_valid_algorithm_suite_info_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_algorithm_suite_info/_valid_algorithm_suite_info_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo::AlgorithmSuiteInfo { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo::AlgorithmSuiteInfo { id: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.id.clone().unwrap()) , binaryId: crate::standard_library_conversions::blob_to_dafny(&value.binary_id.unwrap()), @@ -26,12 +26,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo { +) -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo{ crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo::builder() .set_id(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.id().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition.rs index c22cc361b..beb95cf4b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _valid_decryption_materials_transition_input; +pub mod _valid_decryption_materials_transition_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs index 716e2c473..cbe574742 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput { start: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.start.clone().unwrap()) , stop: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.stop.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput{ crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput::builder() .set_start(Some( crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::from_dafny(dafny_value.start().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition_input.rs index 583033c0d..372b03d15 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_decryption_materials_transition_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput { start: crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials::to_dafny(&value.start.clone().unwrap()) , @@ -25,30 +25,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput {..} => crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput::builder() @@ -63,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition.rs index 4ef8b822f..a311f1b8d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _valid_encryption_materials_transition_input; +pub mod _valid_encryption_materials_transition_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs index c20d73f71..8d14a380d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput { start: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.start.clone().unwrap()) , stop: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.stop.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput{ crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput::builder() .set_start(Some( crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::from_dafny(dafny_value.start().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition_input.rs index 45d23ff1f..824eb216e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/valid_encryption_materials_transition_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput { start: crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials::to_dafny(&value.start.clone().unwrap()) , @@ -25,30 +25,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput {..} => crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput::builder() @@ -63,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt.rs index c20bcdd7a..58db900e6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _validate_commitment_policy_on_decrypt_input; +pub mod _validate_commitment_policy_on_decrypt_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs index 6258015b5..a289ce5be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput { algorithm: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm.clone().unwrap()) , commitmentPolicy: crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::to_dafny(&value.commitment_policy.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput::builder() .set_algorithm(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.algorithm().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt_input.rs index 455f59cf9..b6cbea7a2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_decrypt_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput { algorithm: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm.clone().unwrap()) , @@ -25,30 +25,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput {..} => crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput::builder() @@ -63,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt.rs index cea8f2413..35dbf9d05 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _validate_commitment_policy_on_encrypt_input; +pub mod _validate_commitment_policy_on_encrypt_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs index 39fe31627..96147968a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput { algorithm: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm.clone().unwrap()) , commitmentPolicy: crate::deps::aws_cryptography_materialProviders::conversions::commitment_policy::to_dafny(&value.commitment_policy.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput, >, -) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput { +) -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput::builder() .set_algorithm(Some( crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::from_dafny(dafny_value.algorithm().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt_input.rs index 4c7de6bef..5392993f5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/conversions/validate_commitment_policy_on_encrypt_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput, -) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput { +) -> crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput{ crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput { algorithm: crate::deps::aws_cryptography_materialProviders::conversions::algorithm_suite_id::to_dafny(&value.algorithm.clone().unwrap()) , @@ -25,30 +25,32 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput, >, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput +{ plain_from_dafny(&*dafny_value) } #[allow(dead_code)] pub fn plain_from_dafny( dafny_value: &crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput, -) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput { +) -> crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput +{ match dafny_value { crate::r#software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput {..} => crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput::builder() @@ -63,10 +65,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring.rs index 5b070bd90..b04035132 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsDiscoveryKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_discovery_keyring::_create_aws_kms_discovery_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsDiscoveryKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_discovery_keyring::_create_aws_kms_discovery_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsDiscoveryKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs index cfae4cd9b..f3e7f7943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_aws_kms_discovery_keyring_input.rs @@ -6,29 +6,37 @@ /// Inputs for for creating a AWS KMS Discovery Keyring. pub struct CreateAwsKmsDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, } impl CreateAwsKmsDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } } impl CreateAwsKmsDiscoveryKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsDiscoveryKeyringInput`](crate::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInputBuilder::default() } } @@ -39,60 +47,92 @@ impl CreateAwsKmsDiscoveryKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsDiscoveryKeyringInputBuilder { - pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, } impl CreateAwsKmsDiscoveryKeyringInputBuilder { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } /// Consumes the builder and constructs a [`CreateAwsKmsDiscoveryKeyringInput`](crate::operation::operation::CreateAwsKmsDiscoveryKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput { discovery_filter: self.discovery_filter, grant_tokens: self.grant_tokens, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_keyring_output.rs index 5483b4242..e78784e3a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_discovery_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/builders.rs index 330961989..07a4d28e7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsDiscoveryKeyringFluentBuilder { } impl CreateAwsKmsDiscoveryKeyringFluentBuilder { /// Creates a new `CreateAwsKmsDiscoveryKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsDiscoveryKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::builders::CreateAwsKmsDiscoveryKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,52 +58,82 @@ impl CreateAwsKmsDiscoveryKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyring::send(&self.client, input).await } /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.discovery_filter(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_discovery_filter(input); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - self.inner.get_discovery_filter() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.discovery_filter(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.set_discovery_filter(input); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + self.inner.get_discovery_filter() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring.rs index 8dd313e81..7d1475375 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsDiscoveryMultiKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryMultiKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_discovery_multi_keyring::_create_aws_kms_discovery_multi_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsDiscoveryMultiKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_discovery_multi_keyring::_create_aws_kms_discovery_multi_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsDiscoveryMultiKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs index 5a2f46187..92bf0b779 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_aws_kms_discovery_multi_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for for creating an AWS KMS Discovery Multi-Keyring. pub struct CreateAwsKmsDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub client_supplier: ::std::option::Option, -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The list of regions this Keyring will creates KMS clients for. -pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The list of regions this Keyring will creates KMS clients for. + pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } } impl CreateAwsKmsDiscoveryMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsDiscoveryMultiKeyringInput`](crate::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder::default() } } @@ -45,75 +57,117 @@ impl CreateAwsKmsDiscoveryMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsDiscoveryMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsDiscoveryMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = ::std::option::Option::Some(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = input; - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = ::std::option::Option::Some(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = input; + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } /// Consumes the builder and constructs a [`CreateAwsKmsDiscoveryMultiKeyringInput`](crate::operation::operation::CreateAwsKmsDiscoveryMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput { client_supplier: self.client_supplier, discovery_filter: self.discovery_filter, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_keyring_output.rs index 9e2ff6d09..8d1a606c7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_discovery_multi_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/builders.rs index aa6c2202b..6d4d450f1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_discovery_multi_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsDiscoveryMultiKeyringFluentBuilder { } impl CreateAwsKmsDiscoveryMultiKeyringFluentBuilder { /// Creates a new `CreateAwsKmsDiscoveryMultiKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsDiscoveryMultiKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,104 @@ impl CreateAwsKmsDiscoveryMultiKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyring::send(&self.client, input).await } /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.client_supplier(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_client_supplier(input); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - self.inner.get_client_supplier() -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.discovery_filter(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_discovery_filter(input); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - self.inner.get_discovery_filter() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.regions(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_regions(input); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_regions() -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.client_supplier(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_client_supplier(input); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + self.inner.get_client_supplier() + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.discovery_filter(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.set_discovery_filter(input); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + self.inner.get_discovery_filter() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.regions(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_regions(input); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_regions() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring.rs index 88c3d6990..43ef7cf7c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring.rs @@ -20,7 +20,7 @@ impl CreateAwsKmsEcdhKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsEcdhKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_ecdh_keyring::_create_aws_kms_ecdh_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_ecdh_keyring::_create_aws_kms_ecdh_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsEcdhKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateAwsKmsEcdhKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs index bd8611fc7..9e7feb6ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_aws_kms_ecdh_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for creating an AWS KMS ECDH Keyring. pub struct CreateAwsKmsEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub key_agreement_scheme: ::std::option::Option, -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub curve_spec: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, + pub key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub curve_spec: + ::std::option::Option, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, } impl CreateAwsKmsEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } } impl CreateAwsKmsEcdhKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsEcdhKeyringInput`](crate::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInputBuilder::default() } } @@ -45,75 +57,119 @@ impl CreateAwsKmsEcdhKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsEcdhKeyringInputBuilder { - pub(crate) key_agreement_scheme: ::std::option::Option, -pub(crate) curve_spec: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, + pub(crate) key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + pub(crate) curve_spec: + ::std::option::Option, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, } impl CreateAwsKmsEcdhKeyringInputBuilder { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.key_agreement_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.key_agreement_scheme = input; - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.curve_spec = ::std::option::Option::Some(input.into()); - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.curve_spec = input; - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = input; + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.curve_spec = ::std::option::Option::Some(input.into()); + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.curve_spec = input; + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } /// Consumes the builder and constructs a [`CreateAwsKmsEcdhKeyringInput`](crate::operation::operation::CreateAwsKmsEcdhKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput { key_agreement_scheme: self.key_agreement_scheme, curve_spec: self.curve_spec, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_keyring_output.rs index 884840db8..bc9d5cf59 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_ecdh_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/builders.rs index 54dbdf030..a07aed38d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_ecdh_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsEcdhKeyringFluentBuilder { } impl CreateAwsKmsEcdhKeyringFluentBuilder { /// Creates a new `CreateAwsKmsEcdhKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsEcdhKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::builders::CreateAwsKmsEcdhKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,107 @@ impl CreateAwsKmsEcdhKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyring::send(&self.client, input).await } /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.key_agreement_scheme(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_key_agreement_scheme(input); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - self.inner.get_key_agreement_scheme() -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.curve_spec(input.into()); - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_curve_spec(input); - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - self.inner.get_curve_spec() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.inner = self.inner.key_agreement_scheme(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.inner = self.inner.set_key_agreement_scheme(input); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + > { + self.inner.get_key_agreement_scheme() + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.curve_spec(input.into()); + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_curve_spec(input); + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + self.inner.get_curve_spec() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring.rs index c1bb6595a..35d03c5c9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsHierarchicalKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsHierarchicalKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_hierarchical_keyring::_create_aws_kms_hierarchical_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsHierarchicalKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_hierarchical_keyring::_create_aws_kms_hierarchical_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsHierarchicalKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs index ff9c24020..c999a75c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_aws_kms_hierarchical_keyring_input.rs @@ -20,33 +20,38 @@ pub ttl_seconds: ::std::option::Option<::std::primitive::i64>, } impl CreateAwsKmsHierarchicalKeyringInput { /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn cache(&self) -> &::std::option::Option { - &self.cache -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_id -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.ttl_seconds -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.ttl_seconds + } } impl CreateAwsKmsHierarchicalKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsHierarchicalKeyringInput`](crate::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInputBuilder::default() } } @@ -66,96 +71,129 @@ pub(crate) ttl_seconds: ::std::option::Option<::std::primitive::i64>, } impl CreateAwsKmsHierarchicalKeyringInputBuilder { /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.branch_key_id_supplier = input; - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.cache = ::std::option::Option::Some(input.into()); - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.cache = input; - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn get_cache(&self) -> &::std::option::Option { - &self.cache -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn key_store(mut self, input: impl ::std::convert::Into) -> Self { - self.key_store = ::std::option::Option::Some(input.into()); - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn set_key_store(mut self, input: ::std::option::Option) -> Self { - self.key_store = input; - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn get_key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.partition_id = ::std::option::Option::Some(input.into()); - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.partition_id = input; - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_id -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.ttl_seconds = ::std::option::Option::Some(input.into()); - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.ttl_seconds = input; - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.ttl_seconds -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.branch_key_id_supplier = input; + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn key_store( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.key_store = ::std::option::Option::Some(input.into()); + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn set_key_store( + mut self, + input: ::std::option::Option, + ) -> Self { + self.key_store = input; + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn get_key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.partition_id = ::std::option::Option::Some(input.into()); + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.partition_id = input; + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.ttl_seconds = ::std::option::Option::Some(input.into()); + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.ttl_seconds = input; + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.ttl_seconds + } /// Consumes the builder and constructs a [`CreateAwsKmsHierarchicalKeyringInput`](crate::operation::operation::CreateAwsKmsHierarchicalKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput { branch_key_id: self.branch_key_id, branch_key_id_supplier: self.branch_key_id_supplier, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_keyring_output.rs index fae6dc959..07f70a440 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_hierarchical_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/builders.rs index 87e84acc6..044130619 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_hierarchical_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsHierarchicalKeyringFluentBuilder { } impl CreateAwsKmsHierarchicalKeyringFluentBuilder { /// Creates a new `CreateAwsKmsHierarchicalKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsHierarchicalKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::builders::CreateAwsKmsHierarchicalKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,94 +58,127 @@ impl CreateAwsKmsHierarchicalKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyring::send(&self.client, input).await } /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.branch_key_id(input.into()); - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_branch_key_id(input); - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_branch_key_id() -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.branch_key_id_supplier(input.into()); - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_branch_key_id_supplier(input); - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option { - self.inner.get_branch_key_id_supplier() -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cache(input.into()); - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cache(input); - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn get_cache(&self) -> &::std::option::Option { - self.inner.get_cache() -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn key_store(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.key_store(input.into()); - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn set_key_store(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_key_store(input); - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn get_key_store(&self) -> &::std::option::Option { - self.inner.get_key_store() -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.partition_id(input.into()); - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_partition_id(input); - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_partition_id() -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.inner = self.inner.ttl_seconds(input.into()); - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.inner = self.inner.set_ttl_seconds(input); - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { - self.inner.get_ttl_seconds() -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.branch_key_id(input.into()); + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_branch_key_id(input); + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_branch_key_id() + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.branch_key_id_supplier(input.into()); + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_branch_key_id_supplier(input); + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option{ + self.inner.get_branch_key_id_supplier() + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.inner = self.inner.cache(input.into()); + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.inner = self.inner.set_cache(input); + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + self.inner.get_cache() + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn key_store( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.key_store(input.into()); + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn set_key_store( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_key_store(input); + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn get_key_store( + &self, + ) -> &::std::option::Option { + self.inner.get_key_store() + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.partition_id(input.into()); + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_partition_id(input); + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_partition_id() + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.inner = self.inner.ttl_seconds(input.into()); + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.inner = self.inner.set_ttl_seconds(input); + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { + self.inner.get_ttl_seconds() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring.rs index 1b8d86734..2db4943cf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring.rs @@ -20,7 +20,7 @@ impl CreateAwsKmsKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_keyring::_create_aws_kms_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_keyring::_create_aws_kms_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateAwsKmsKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs index e73e15717..b6f09a81b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_aws_kms_keyring_input.rs @@ -6,29 +6,31 @@ /// Inputs for for creating a AWS KMS Keyring. pub struct CreateAwsKmsKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub kms_key_id: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } } impl CreateAwsKmsKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsKeyringInput`](crate::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInputBuilder::default() } } @@ -40,59 +42,75 @@ impl CreateAwsKmsKeyringInput { )] pub struct CreateAwsKmsKeyringInputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsKeyringInputBuilder { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } /// Consumes the builder and constructs a [`CreateAwsKmsKeyringInput`](crate::operation::operation::CreateAwsKmsKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput { grant_tokens: self.grant_tokens, kms_client: self.kms_client, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_keyring_output.rs index 11153473b..c4b26b7d7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/builders.rs index e7fe46a13..57e5edd20 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsKeyringFluentBuilder { } impl CreateAwsKmsKeyringFluentBuilder { /// Creates a new `CreateAwsKmsKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::builders::CreateAwsKmsKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,52 +58,68 @@ impl CreateAwsKmsKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyring::send(&self.client, input).await } /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.kms_key_id(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_kms_key_id(input); - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_kms_key_id() -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.kms_key_id(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_kms_key_id(input); + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_kms_key_id() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring.rs index 1e90b2795..0f75b088e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsMrkDiscoveryKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_discovery_keyring::_create_aws_kms_mrk_discovery_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsMrkDiscoveryKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_discovery_keyring::_create_aws_kms_mrk_discovery_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsMrkDiscoveryKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs index b0fea2463..457554ab0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_aws_kms_mrk_discovery_keyring_input.rs @@ -6,35 +6,43 @@ /// Inputs for for creating a AWS KMS MRK Discovery Keyring. pub struct CreateAwsKmsMrkDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The region the input 'kmsClient' is in. -pub region: ::std::option::Option<::std::string::String>, + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The region the input 'kmsClient' is in. + pub region: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The region the input 'kmsClient' is in. -pub fn region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The region the input 'kmsClient' is in. + pub fn region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } } impl CreateAwsKmsMrkDiscoveryKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkDiscoveryKeyringInput`](crate::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder::default() } } @@ -45,75 +53,107 @@ impl CreateAwsKmsMrkDiscoveryKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkDiscoveryKeyringInputBuilder { - pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) region: ::std::option::Option<::std::string::String>, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) region: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkDiscoveryKeyringInputBuilder { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The region the input 'kmsClient' is in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.region = ::std::option::Option::Some(input.into()); - self -} -/// The region the input 'kmsClient' is in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.region = input; - self -} -/// The region the input 'kmsClient' is in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The region the input 'kmsClient' is in. + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.region = ::std::option::Option::Some(input.into()); + self + } + /// The region the input 'kmsClient' is in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.region = input; + self + } + /// The region the input 'kmsClient' is in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkDiscoveryKeyringInput`](crate::operation::operation::CreateAwsKmsMrkDiscoveryKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput { discovery_filter: self.discovery_filter, grant_tokens: self.grant_tokens, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_keyring_output.rs index f7c27e388..f348bccbe 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/builders.rs index 912caa84c..ba6d9f55e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsMrkDiscoveryKeyringFluentBuilder { } impl CreateAwsKmsMrkDiscoveryKeyringFluentBuilder { /// Creates a new `CreateAwsKmsMrkDiscoveryKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsMrkDiscoveryKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,96 @@ impl CreateAwsKmsMrkDiscoveryKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyring::send(&self.client, input).await } /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.discovery_filter(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_discovery_filter(input); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - self.inner.get_discovery_filter() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} -/// The region the input 'kmsClient' is in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.region(input.into()); - self -} -/// The region the input 'kmsClient' is in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_region(input); - self -} -/// The region the input 'kmsClient' is in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_region() -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.discovery_filter(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.set_discovery_filter(input); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + self.inner.get_discovery_filter() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } + /// The region the input 'kmsClient' is in. + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.region(input.into()); + self + } + /// The region the input 'kmsClient' is in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_region(input); + self + } + /// The region the input 'kmsClient' is in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_region() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring.rs index 461e7fb17..ab8f369aa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsMrkDiscoveryMultiKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryMultiKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_discovery_multi_keyring::_create_aws_kms_mrk_discovery_multi_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsMrkDiscoveryMultiKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_discovery_multi_keyring::_create_aws_kms_mrk_discovery_multi_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsMrkDiscoveryMultiKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs index 97c0ae720..f05db01a0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_aws_kms_mrk_discovery_multi_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for for creating a AWS KMS MRK Discovery Multi-Keyring. pub struct CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub client_supplier: ::std::option::Option, -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The list of regions this Keyring will creates KMS clients for. -pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The list of regions this Keyring will creates KMS clients for. + pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } } impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkDiscoveryMultiKeyringInput`](crate::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder::default() } } @@ -45,75 +57,117 @@ impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = ::std::option::Option::Some(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = input; - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = ::std::option::Option::Some(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = input; + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkDiscoveryMultiKeyringInput`](crate::operation::operation::CreateAwsKmsMrkDiscoveryMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput { client_supplier: self.client_supplier, discovery_filter: self.discovery_filter, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_keyring_output.rs index 6e78d39df..f9dec1744 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/builders.rs index c1ede21d9..66bc3c3d9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_discovery_multi_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder { } impl CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder { /// Creates a new `CreateAwsKmsMrkDiscoveryMultiKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsMrkDiscoveryMultiKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,104 @@ impl CreateAwsKmsMrkDiscoveryMultiKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyring::send(&self.client, input).await } /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.client_supplier(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_client_supplier(input); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - self.inner.get_client_supplier() -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.discovery_filter(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_discovery_filter(input); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - self.inner.get_discovery_filter() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.regions(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_regions(input); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_regions() -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.client_supplier(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_client_supplier(input); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + self.inner.get_client_supplier() + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.discovery_filter(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.inner = self.inner.set_discovery_filter(input); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + self.inner.get_discovery_filter() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.regions(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_regions(input); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_regions() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring.rs index d70d4df62..6456c1ac2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring.rs @@ -20,7 +20,7 @@ impl CreateAwsKmsMrkKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_keyring::_create_aws_kms_mrk_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_keyring::_create_aws_kms_mrk_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsMrkKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateAwsKmsMrkKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs index 04342a972..8c501a929 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_aws_kms_mrk_keyring_input.rs @@ -6,29 +6,31 @@ /// Inputs for for creating an AWS KMS MRK Keyring. pub struct CreateAwsKmsMrkKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub kms_key_id: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } } impl CreateAwsKmsMrkKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkKeyringInput`](crate::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInputBuilder::default() } } @@ -40,59 +42,75 @@ impl CreateAwsKmsMrkKeyringInput { )] pub struct CreateAwsKmsMrkKeyringInputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkKeyringInputBuilder { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkKeyringInput`](crate::operation::operation::CreateAwsKmsMrkKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput { grant_tokens: self.grant_tokens, kms_client: self.kms_client, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_keyring_output.rs index ef21752be..20be4bb21 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/builders.rs index 57ff953f3..c341f69c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsMrkKeyringFluentBuilder { } impl CreateAwsKmsMrkKeyringFluentBuilder { /// Creates a new `CreateAwsKmsMrkKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsMrkKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::builders::CreateAwsKmsMrkKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,52 +58,68 @@ impl CreateAwsKmsMrkKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyring::send(&self.client, input).await } /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.kms_key_id(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_kms_key_id(input); - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_kms_key_id() -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.kms_key_id(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_kms_key_id(input); + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_kms_key_id() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring.rs index bd4aa9941..f6bba0867 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsMrkMultiKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkMultiKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_multi_keyring::_create_aws_kms_mrk_multi_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsMrkMultiKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_mrk_multi_keyring::_create_aws_kms_mrk_multi_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsMrkMultiKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs index d29b1f176..9e4e221b0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_aws_kms_mrk_multi_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for for creating a AWS KMS MRK Multi-Keyring. pub struct CreateAwsKmsMrkMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub client_supplier: ::std::option::Option, -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub generator: ::std::option::Option<::std::string::String>, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub generator: ::std::option::Option<::std::string::String>, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } } impl CreateAwsKmsMrkMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkMultiKeyringInput`](crate::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInputBuilder::default() } } @@ -45,75 +51,103 @@ impl CreateAwsKmsMrkMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) generator: ::std::option::Option<::std::string::String>, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) generator: ::std::option::Option<::std::string::String>, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.generator = input; - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = ::std::option::Option::Some(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = input; - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.generator = input; + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = ::std::option::Option::Some(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = input; + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkMultiKeyringInput`](crate::operation::operation::CreateAwsKmsMrkMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput { client_supplier: self.client_supplier, generator: self.generator, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_keyring_output.rs index 472421fa6..c9c48fc15 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_mrk_multi_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/builders.rs index 70c2dbee2..75fba7457 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_mrk_multi_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsMrkMultiKeyringFluentBuilder { } impl CreateAwsKmsMrkMultiKeyringFluentBuilder { /// Creates a new `CreateAwsKmsMrkMultiKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsMrkMultiKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::builders::CreateAwsKmsMrkMultiKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,92 @@ impl CreateAwsKmsMrkMultiKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyring::send(&self.client, input).await } /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.client_supplier(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_client_supplier(input); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - self.inner.get_client_supplier() -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.generator(input.into()); - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_generator(input); - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_generator() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.kms_key_ids(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_kms_key_ids(input); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_kms_key_ids() -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.client_supplier(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_client_supplier(input); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + self.inner.get_client_supplier() + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.generator(input.into()); + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_generator(input); + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_generator() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.kms_key_ids(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_kms_key_ids(input); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_kms_key_ids() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring.rs index d0f16e149..01b1ba1f6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring.rs @@ -20,21 +20,24 @@ impl CreateAwsKmsMultiKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMultiKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_multi_keyring::_create_aws_kms_multi_keyring_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsMultiKeyring(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_multi_keyring::_create_aws_kms_multi_keyring_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateAwsKmsMultiKeyring(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs index 21ad993ec..84e1500c9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_aws_kms_multi_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for for creating a AWS KMS Multi-Keyring. pub struct CreateAwsKmsMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub client_supplier: ::std::option::Option, -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub generator: ::std::option::Option<::std::string::String>, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub generator: ::std::option::Option<::std::string::String>, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } } impl CreateAwsKmsMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMultiKeyringInput`](crate::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInputBuilder::default() } } @@ -45,75 +51,103 @@ impl CreateAwsKmsMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) generator: ::std::option::Option<::std::string::String>, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) generator: ::std::option::Option<::std::string::String>, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.generator = input; - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = ::std::option::Option::Some(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = input; - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.generator = input; + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = ::std::option::Option::Some(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = input; + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } /// Consumes the builder and constructs a [`CreateAwsKmsMultiKeyringInput`](crate::operation::operation::CreateAwsKmsMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput { client_supplier: self.client_supplier, generator: self.generator, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_keyring_output.rs index 0966a8f62..1a62e8848 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_multi_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/builders.rs index 7b71f873c..b9467c506 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_multi_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsMultiKeyringFluentBuilder { } impl CreateAwsKmsMultiKeyringFluentBuilder { /// Creates a new `CreateAwsKmsMultiKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsMultiKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::builders::CreateAwsKmsMultiKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,92 @@ impl CreateAwsKmsMultiKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyring::send(&self.client, input).await } /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.client_supplier(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_client_supplier(input); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - self.inner.get_client_supplier() -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.generator(input.into()); - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_generator(input); - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_generator() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.kms_key_ids(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_kms_key_ids(input); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_kms_key_ids() -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.client_supplier(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_client_supplier(input); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + self.inner.get_client_supplier() + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.generator(input.into()); + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_generator(input); + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_generator() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.kms_key_ids(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_kms_key_ids(input); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_kms_key_ids() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring.rs index da350e9f7..481b8e737 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring.rs @@ -20,7 +20,7 @@ impl CreateAwsKmsRsaKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsRsaKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_rsa_keyring::_create_aws_kms_rsa_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_aws_kms_rsa_keyring::_create_aws_kms_rsa_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateAwsKmsRsaKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateAwsKmsRsaKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs index 0cdaeb864..8a841febc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_aws_kms_rsa_keyring_input.rs @@ -6,41 +6,45 @@ /// Inputs for creating a AWS KMS RSA Keyring. pub struct CreateAwsKmsRsaKeyringInput { /// The RSA algorithm used to wrap and unwrap data keys. -pub encryption_algorithm: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub kms_key_id: ::std::option::Option<::std::string::String>, -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub encryption_algorithm: ::std::option::Option, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub kms_key_id: ::std::option::Option<::std::string::String>, + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateAwsKmsRsaKeyringInput { /// The RSA algorithm used to wrap and unwrap data keys. -pub fn encryption_algorithm(&self) -> &::std::option::Option { - &self.encryption_algorithm -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn encryption_algorithm( + &self, + ) -> &::std::option::Option { + &self.encryption_algorithm + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl CreateAwsKmsRsaKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsRsaKeyringInput`](crate::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInputBuilder::default() } } @@ -51,90 +55,121 @@ impl CreateAwsKmsRsaKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsRsaKeyringInputBuilder { - pub(crate) encryption_algorithm: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) encryption_algorithm: + ::std::option::Option, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateAwsKmsRsaKeyringInputBuilder { /// The RSA algorithm used to wrap and unwrap data keys. -pub fn encryption_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.encryption_algorithm = ::std::option::Option::Some(input.into()); - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn set_encryption_algorithm(mut self, input: ::std::option::Option) -> Self { - self.encryption_algorithm = input; - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn get_encryption_algorithm(&self) -> &::std::option::Option { - &self.encryption_algorithm -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn encryption_algorithm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.encryption_algorithm = ::std::option::Option::Some(input.into()); + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn set_encryption_algorithm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.encryption_algorithm = input; + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn get_encryption_algorithm( + &self, + ) -> &::std::option::Option { + &self.encryption_algorithm + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`CreateAwsKmsRsaKeyringInput`](crate::operation::operation::CreateAwsKmsRsaKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput { encryption_algorithm: self.encryption_algorithm, grant_tokens: self.grant_tokens, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_keyring_output.rs index 5cf422f7e..8bb6d537d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_aws_kms_rsa_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/builders.rs index ade16b06e..706836bea 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_aws_kms_rsa_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateAwsKmsRsaKeyringFluentBuilder { } impl CreateAwsKmsRsaKeyringFluentBuilder { /// Creates a new `CreateAwsKmsRsaKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateAwsKmsRsaKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::builders::CreateAwsKmsRsaKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,80 +58,110 @@ impl CreateAwsKmsRsaKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyring::send(&self.client, input).await } /// The RSA algorithm used to wrap and unwrap data keys. -pub fn encryption_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.encryption_algorithm(input.into()); - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn set_encryption_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_encryption_algorithm(input); - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn get_encryption_algorithm(&self) -> &::std::option::Option { - self.inner.get_encryption_algorithm() -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.grant_tokens(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_grant_tokens(input); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_grant_tokens() -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kms_client(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kms_client(input); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - self.inner.get_kms_client() -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.kms_key_id(input.into()); - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_kms_key_id(input); - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_kms_key_id() -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn encryption_algorithm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.encryption_algorithm(input.into()); + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn set_encryption_algorithm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_encryption_algorithm(input); + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn get_encryption_algorithm( + &self, + ) -> &::std::option::Option { + self.inner.get_encryption_algorithm() + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.grant_tokens(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_grant_tokens(input); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_grant_tokens() + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.kms_client(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_kms_client(input); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + self.inner.get_kms_client() + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.kms_key_id(input.into()); + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_kms_key_id(input); + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_kms_key_id() + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache.rs index eb2646e8e..e5952a1ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache.rs @@ -17,12 +17,12 @@ impl CreateCryptographicMaterialsCache { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_for_AwsCryptographicMaterialProviders_CreateCryptographicMaterialsCache(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_cryptographic_materials_cache::_create_cryptographic_materials_cache_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateCryptographicMaterialsCache(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_cryptographic_materials_cache::_create_cryptographic_materials_cache_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateCryptographicMaterialsCache(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -32,9 +32,11 @@ impl CreateCryptographicMaterialsCache { , ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs index a6bc3b0ff..40912a6ef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_input.rs @@ -6,17 +6,21 @@ #[allow(missing_docs)] pub struct CreateCryptographicMaterialsCacheInput { /// Which type of local cache to use. -pub cache: ::std::option::Option, + pub cache: + ::std::option::Option, } impl CreateCryptographicMaterialsCacheInput { /// Which type of local cache to use. -pub fn cache(&self) -> &::std::option::Option { - &self.cache -} + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } } impl CreateCryptographicMaterialsCacheInput { /// Creates a new builder-style object to manufacture [`CreateCryptographicMaterialsCacheInput`](crate::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInputBuilder::default() } } @@ -27,30 +31,44 @@ impl CreateCryptographicMaterialsCacheInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateCryptographicMaterialsCacheInputBuilder { - pub(crate) cache: ::std::option::Option, + pub(crate) cache: + ::std::option::Option, } impl CreateCryptographicMaterialsCacheInputBuilder { /// Which type of local cache to use. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.cache = ::std::option::Option::Some(input.into()); - self -} -/// Which type of local cache to use. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.cache = input; - self -} -/// Which type of local cache to use. -pub fn get_cache(&self) -> &::std::option::Option { - &self.cache -} + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Which type of local cache to use. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Which type of local cache to use. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } /// Consumes the builder and constructs a [`CreateCryptographicMaterialsCacheInput`](crate::operation::operation::CreateCryptographicMaterialsCacheInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput { cache: self.cache, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_output.rs index 5cbf6f0a9..ac3afea11 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/_create_cryptographic_materials_cache_output.rs @@ -10,13 +10,13 @@ pub materials_cache: ::std::option::Option &::std::option::Option { - &self.materials_cache -} + pub fn materials_cache(&self) -> &::std::option::Option{ + &self.materials_cache + } } impl CreateCryptographicMaterialsCacheOutput { /// Creates a new builder-style object to manufacture [`CreateCryptographicMaterialsCacheOutput`](crate::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateCryptographicMaterialsCacheOutputBuilder { } impl CreateCryptographicMaterialsCacheOutputBuilder { #[allow(missing_docs)] -pub fn materials_cache(mut self, input: impl ::std::convert::Into) -> Self { - self.materials_cache = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials_cache(mut self, input: ::std::option::Option) -> Self { - self.materials_cache = input; - self -} -#[allow(missing_docs)] -pub fn get_materials_cache(&self) -> &::std::option::Option { - &self.materials_cache -} + pub fn materials_cache( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.materials_cache = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials_cache( + mut self, + input: ::std::option::Option, + ) -> Self { + self.materials_cache = input; + self + } + #[allow(missing_docs)] + pub fn get_materials_cache(&self) -> &::std::option::Option{ + &self.materials_cache + } /// Consumes the builder and constructs a [`CreateCryptographicMaterialsCacheOutput`](crate::operation::operation::CreateCryptographicMaterialsCacheOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheOutput { materials_cache: self.materials_cache, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/builders.rs index 5c4ebe42d..2b868b157 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_cryptographic_materials_cache/builders.rs @@ -13,7 +13,7 @@ impl CreateCryptographicMaterialsCacheInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.create_cryptographic_materials_cache(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct CreateCryptographicMaterialsCacheFluentBuilder { } impl CreateCryptographicMaterialsCacheFluentBuilder { /// Creates a new `CreateCryptographicMaterialsCache`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateCryptographicMaterialsCache as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::builders::CreateCryptographicMaterialsCacheInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl CreateCryptographicMaterialsCacheFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,24 +57,37 @@ impl CreateCryptographicMaterialsCacheFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCache::send(&self.client, input).await } /// Which type of local cache to use. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.cache(input.into()); - self -} -/// Which type of local cache to use. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_cache(input); - self -} -/// Which type of local cache to use. -pub fn get_cache(&self) -> &::std::option::Option { - self.inner.get_cache() -} + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.inner = self.inner.cache(input.into()); + self + } + /// Which type of local cache to use. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.inner = self.inner.set_cache(input); + self + } + /// Which type of local cache to use. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + self.inner.get_cache() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier.rs index 334d05b32..98c751527 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier.rs @@ -20,9 +20,9 @@ impl CreateDefaultClientSupplier { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierInput_for_AwsCryptographicMaterialProviders_CreateDefaultClientSupplier(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_default_client_supplier::_create_default_client_supplier_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateDefaultClientSupplier(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_default_client_supplier::_create_default_client_supplier_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateDefaultClientSupplier(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -32,9 +32,11 @@ impl CreateDefaultClientSupplier { , ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_input.rs index ffc7d7229..23c8a4478 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_input.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct CreateDefaultClientSupplierInput { - -} -impl CreateDefaultClientSupplierInput { - -} +pub struct CreateDefaultClientSupplierInput {} +impl CreateDefaultClientSupplierInput {} impl CreateDefaultClientSupplierInput { /// Creates a new builder-style object to manufacture [`CreateDefaultClientSupplierInput`](crate::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInputBuilder::default() } } @@ -22,18 +18,15 @@ impl CreateDefaultClientSupplierInput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct CreateDefaultClientSupplierInputBuilder { - -} +pub struct CreateDefaultClientSupplierInputBuilder {} impl CreateDefaultClientSupplierInputBuilder { - /// Consumes the builder and constructs a [`CreateDefaultClientSupplierInput`](crate::operation::operation::CreateDefaultClientSupplierInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_output.rs index 8dcb8a82f..6a7dd24cb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/_create_default_client_supplier_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct CreateDefaultClientSupplierOutput { #[allow(missing_docs)] -pub client: ::std::option::Option, + pub client: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, } impl CreateDefaultClientSupplierOutput { #[allow(missing_docs)] -pub fn client(&self) -> &::std::option::Option { - &self.client -} + pub fn client( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client + } } impl CreateDefaultClientSupplierOutput { /// Creates a new builder-style object to manufacture [`CreateDefaultClientSupplierOutput`](crate::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierOutputBuilder::default() } } @@ -27,30 +33,42 @@ impl CreateDefaultClientSupplierOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateDefaultClientSupplierOutputBuilder { - pub(crate) client: ::std::option::Option, + pub(crate) client: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, } impl CreateDefaultClientSupplierOutputBuilder { #[allow(missing_docs)] -pub fn client(mut self, input: impl ::std::convert::Into) -> Self { - self.client = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_client(mut self, input: ::std::option::Option) -> Self { - self.client = input; - self -} -#[allow(missing_docs)] -pub fn get_client(&self) -> &::std::option::Option { - &self.client -} + pub fn client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client = input; + self + } + #[allow(missing_docs)] + pub fn get_client( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client + } /// Consumes the builder and constructs a [`CreateDefaultClientSupplierOutput`](crate::operation::operation::CreateDefaultClientSupplierOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierOutput { client: self.client, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/builders.rs index 2bfaae0bc..ff085e96f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_client_supplier/builders.rs @@ -28,14 +28,16 @@ pub struct CreateDefaultClientSupplierFluentBuilder { } impl CreateDefaultClientSupplierFluentBuilder { /// Creates a new `CreateDefaultClientSupplier`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateDefaultClientSupplier as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::builders::CreateDefaultClientSupplierInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,11 +57,9 @@ impl CreateDefaultClientSupplierFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplier::send(&self.client, input).await } - - } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager.rs index e1533da52..5cc7d8aba 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager.rs @@ -17,12 +17,12 @@ impl CreateDefaultCryptographicMaterialsManager { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_for_AwsCryptographicMaterialProviders_CreateDefaultCryptographicMaterialsManager(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_default_cryptographic_materials_manager::_create_default_cryptographic_materials_manager_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateDefaultCryptographicMaterialsManager(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_default_cryptographic_materials_manager::_create_default_cryptographic_materials_manager_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateDefaultCryptographicMaterialsManager(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -32,9 +32,11 @@ impl CreateDefaultCryptographicMaterialsManager { , ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_cryptographic_materials_manager_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_cryptographic_materials_manager_output.rs index b9199c92a..de2ee5886 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_cryptographic_materials_manager_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_cryptographic_materials_manager_output.rs @@ -10,13 +10,13 @@ pub materials_manager: ::std::option::Option &::std::option::Option { - &self.materials_manager -} + pub fn materials_manager(&self) -> &::std::option::Option{ + &self.materials_manager + } } impl CreateCryptographicMaterialsManagerOutput { /// Creates a new builder-style object to manufacture [`CreateCryptographicMaterialsManagerOutput`](crate::operation::create_default_cryptographic_materials_manager::builders::CreateCryptographicMaterialsManagerOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateCryptographicMaterialsManagerOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateCryptographicMaterialsManagerOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateCryptographicMaterialsManagerOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateCryptographicMaterialsManagerOutputBuilder { } impl CreateCryptographicMaterialsManagerOutputBuilder { /// The created Default Cryptographic Materials Manager. -pub fn materials_manager(mut self, input: impl ::std::convert::Into) -> Self { - self.materials_manager = ::std::option::Option::Some(input.into()); - self -} -/// The created Default Cryptographic Materials Manager. -pub fn set_materials_manager(mut self, input: ::std::option::Option) -> Self { - self.materials_manager = input; - self -} -/// The created Default Cryptographic Materials Manager. -pub fn get_materials_manager(&self) -> &::std::option::Option { - &self.materials_manager -} + pub fn materials_manager( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.materials_manager = ::std::option::Option::Some(input.into()); + self + } + /// The created Default Cryptographic Materials Manager. + pub fn set_materials_manager( + mut self, + input: ::std::option::Option, + ) -> Self { + self.materials_manager = input; + self + } + /// The created Default Cryptographic Materials Manager. + pub fn get_materials_manager(&self) -> &::std::option::Option{ + &self.materials_manager + } /// Consumes the builder and constructs a [`CreateCryptographicMaterialsManagerOutput`](crate::operation::operation::CreateCryptographicMaterialsManagerOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateCryptographicMaterialsManagerOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateCryptographicMaterialsManagerOutput { materials_manager: self.materials_manager, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs index db88dcda5..f0ed27cf7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/_create_default_cryptographic_materials_manager_input.rs @@ -6,17 +6,23 @@ /// Inputs for creating a Default Cryptographic Materials Manager. pub struct CreateDefaultCryptographicMaterialsManagerInput { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateDefaultCryptographicMaterialsManagerInput { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateDefaultCryptographicMaterialsManagerInput { /// Creates a new builder-style object to manufacture [`CreateDefaultCryptographicMaterialsManagerInput`](crate::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateDefaultCryptographicMaterialsManagerInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateDefaultCryptographicMaterialsManagerInputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateDefaultCryptographicMaterialsManagerInputBuilder { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateDefaultCryptographicMaterialsManagerInput`](crate::operation::operation::CreateDefaultCryptographicMaterialsManagerInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/builders.rs index 15ef1c577..2259eeb2e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_default_cryptographic_materials_manager/builders.rs @@ -13,7 +13,7 @@ impl CreateDefaultCryptographicMaterialsManagerInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.create_default_cryptographic_materials_manager(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct CreateDefaultCryptographicMaterialsManagerFluentBuilder { } impl CreateDefaultCryptographicMaterialsManagerFluentBuilder { /// Creates a new `CreateDefaultCryptographicMaterialsManager`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateDefaultCryptographicMaterialsManager as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl CreateDefaultCryptographicMaterialsManagerFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,38 @@ impl CreateDefaultCryptographicMaterialsManagerFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManager::send(&self.client, input).await } /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.keyring(input.into()); - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_keyring(input); - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn get_keyring(&self) -> &::std::option::Option { - self.inner.get_keyring() -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.keyring(input.into()); + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.set_keyring(input); + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + self.inner.get_keyring() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring.rs index 9da312aaf..2b2c8d002 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring.rs @@ -20,7 +20,7 @@ impl CreateMultiKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateMultiKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_multi_keyring::_create_multi_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_multi_keyring::_create_multi_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateMultiKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateMultiKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_keyring_output.rs index de7d26e26..6b67dd40a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_multi_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_multi_keyring_input.rs index 3513f83dd..e762e3ef9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/_create_multi_keyring_input.rs @@ -6,23 +6,39 @@ /// Inputs for creating a Multi-Keyring. pub struct CreateMultiKeyringInput { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub child_keyrings: ::std::option::Option<::std::vec::Vec>, -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub generator: ::std::option::Option, + pub child_keyrings: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub generator: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateMultiKeyringInput { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn child_keyrings(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.child_keyrings -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn generator(&self) -> &::std::option::Option { - &self.generator -} + pub fn child_keyrings( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + > { + &self.child_keyrings + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn generator( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.generator + } } impl CreateMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateMultiKeyringInput`](crate::operation::create_multi_keyring::builders::CreateMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringInputBuilder::default() } } @@ -33,45 +49,85 @@ impl CreateMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateMultiKeyringInputBuilder { - pub(crate) child_keyrings: ::std::option::Option<::std::vec::Vec>, -pub(crate) generator: ::std::option::Option, + pub(crate) child_keyrings: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + pub(crate) generator: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateMultiKeyringInputBuilder { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn child_keyrings(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.child_keyrings = ::std::option::Option::Some(input.into()); - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn set_child_keyrings(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.child_keyrings = input; - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn get_child_keyrings(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.child_keyrings -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn generator(mut self, input: impl ::std::convert::Into) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn set_generator(mut self, input: ::std::option::Option) -> Self { - self.generator = input; - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn get_generator(&self) -> &::std::option::Option { - &self.generator -} + pub fn child_keyrings( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.child_keyrings = ::std::option::Option::Some(input.into()); + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn set_child_keyrings( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.child_keyrings = input; + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn get_child_keyrings( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + > { + &self.child_keyrings + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn generator( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn set_generator( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.generator = input; + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn get_generator( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.generator + } /// Consumes the builder and constructs a [`CreateMultiKeyringInput`](crate::operation::operation::CreateMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput { child_keyrings: self.child_keyrings, generator: self.generator, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/builders.rs index 7a5266610..4ef65e496 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_multi_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateMultiKeyringFluentBuilder { } impl CreateMultiKeyringFluentBuilder { /// Creates a new `CreateMultiKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateMultiKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::builders::CreateMultiKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,38 +58,72 @@ impl CreateMultiKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyring::send(&self.client, input).await } /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn child_keyrings(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.child_keyrings(input.into()); - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn set_child_keyrings(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_child_keyrings(input); - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn get_child_keyrings(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_child_keyrings() -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn generator(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.generator(input.into()); - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn set_generator(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_generator(input); - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn get_generator(&self) -> &::std::option::Option { - self.inner.get_generator() -} + pub fn child_keyrings( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.inner = self.inner.child_keyrings(input.into()); + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn set_child_keyrings( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.inner = self.inner.set_child_keyrings(input); + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn get_child_keyrings( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + > { + self.inner.get_child_keyrings() + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn generator( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.generator(input.into()); + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn set_generator( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.set_generator(input); + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn get_generator( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + self.inner.get_generator() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring.rs index 9d63e526a..b876811e3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring.rs @@ -20,7 +20,7 @@ impl CreateRawAesKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawAesKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_aes_keyring::_create_raw_aes_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_aes_keyring::_create_raw_aes_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateRawAesKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateRawAesKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_keyring_output.rs index b782a386e..96f7b0186 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_raw_aes_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs index 50a6722de..5be2ceea4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/_create_raw_aes_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for creating a Raw AES Keyring. pub struct CreateRawAesKeyringInput { /// A name associated with this wrapping key. -pub key_name: ::std::option::Option<::std::string::String>, -/// A namespace associated with this wrapping key. -pub key_namespace: ::std::option::Option<::std::string::String>, -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub wrapping_alg: ::std::option::Option, -/// The AES key used with AES_GCM encryption and decryption. -pub wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub key_name: ::std::option::Option<::std::string::String>, + /// A namespace associated with this wrapping key. + pub key_namespace: ::std::option::Option<::std::string::String>, + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub wrapping_alg: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + /// The AES key used with AES_GCM encryption and decryption. + pub wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawAesKeyringInput { /// A name associated with this wrapping key. -pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn wrapping_alg(&self) -> &::std::option::Option { - &self.wrapping_alg -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.wrapping_key -} + pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn wrapping_alg( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + > { + &self.wrapping_alg + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.wrapping_key + } } impl CreateRawAesKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawAesKeyringInput`](crate::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInputBuilder::default() } } @@ -46,74 +52,102 @@ impl CreateRawAesKeyringInput { )] pub struct CreateRawAesKeyringInputBuilder { pub(crate) key_name: ::std::option::Option<::std::string::String>, -pub(crate) key_namespace: ::std::option::Option<::std::string::String>, -pub(crate) wrapping_alg: ::std::option::Option, -pub(crate) wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key_namespace: ::std::option::Option<::std::string::String>, + pub(crate) wrapping_alg: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + pub(crate) wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawAesKeyringInputBuilder { /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_name = ::std::option::Option::Some(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_name = input; - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_namespace = ::std::option::Option::Some(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_namespace = input; - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn wrapping_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.wrapping_alg = ::std::option::Option::Some(input.into()); - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn set_wrapping_alg(mut self, input: ::std::option::Option) -> Self { - self.wrapping_alg = input; - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn get_wrapping_alg(&self) -> &::std::option::Option { - &self.wrapping_alg -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn wrapping_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.wrapping_key = ::std::option::Option::Some(input.into()); - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn set_wrapping_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.wrapping_key = input; - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.wrapping_key -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_name = ::std::option::Option::Some(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_name = input; + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_namespace = ::std::option::Option::Some(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_namespace = input; + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn wrapping_alg( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.wrapping_alg = ::std::option::Option::Some(input.into()); + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn set_wrapping_alg( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.wrapping_alg = input; + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn get_wrapping_alg( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + > { + &self.wrapping_alg + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn wrapping_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.wrapping_key = ::std::option::Option::Some(input.into()); + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn set_wrapping_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.wrapping_key = input; + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.wrapping_key + } /// Consumes the builder and constructs a [`CreateRawAesKeyringInput`](crate::operation::operation::CreateRawAesKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput { key_name: self.key_name, key_namespace: self.key_namespace, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/builders.rs index ff317981a..9c34075bb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_aes_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateRawAesKeyringFluentBuilder { } impl CreateRawAesKeyringFluentBuilder { /// Creates a new `CreateRawAesKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateRawAesKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::builders::CreateRawAesKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,66 +58,92 @@ impl CreateRawAesKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyring::send(&self.client, input).await } /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.key_name(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_key_name(input); - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_key_name() -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.key_namespace(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_key_namespace(input); - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_key_namespace() -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn wrapping_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.wrapping_alg(input.into()); - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn set_wrapping_alg(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_wrapping_alg(input); - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn get_wrapping_alg(&self) -> &::std::option::Option { - self.inner.get_wrapping_alg() -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn wrapping_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.wrapping_key(input.into()); - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn set_wrapping_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_wrapping_key(input); - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_wrapping_key() -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.key_name(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_key_name(input); + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_key_name() + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.key_namespace(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_key_namespace(input); + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_key_namespace() + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn wrapping_alg( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.inner = self.inner.wrapping_alg(input.into()); + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn set_wrapping_alg( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.inner = self.inner.set_wrapping_alg(input); + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn get_wrapping_alg( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + > { + self.inner.get_wrapping_alg() + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn wrapping_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.wrapping_key(input.into()); + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn set_wrapping_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_wrapping_key(input); + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_wrapping_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring.rs index d80ead84c..e531fbda2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring.rs @@ -20,7 +20,7 @@ impl CreateRawEcdhKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawEcdhKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_ecdh_keyring::_create_raw_ecdh_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_ecdh_keyring::_create_raw_ecdh_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateRawEcdhKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateRawEcdhKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_keyring_output.rs index 597962bb5..40b98c0e7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_raw_ecdh_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs index e090ebcaa..3e949a1b6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/_create_raw_ecdh_keyring_input.rs @@ -6,23 +6,33 @@ /// Inputs for creating a raw ECDH Keyring. pub struct CreateRawEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub key_agreement_scheme: ::std::option::Option, -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub curve_spec: ::std::option::Option, + pub key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub curve_spec: + ::std::option::Option, } impl CreateRawEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} + pub fn key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } } impl CreateRawEcdhKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawEcdhKeyringInput`](crate::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInputBuilder::default() } } @@ -33,45 +43,73 @@ impl CreateRawEcdhKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateRawEcdhKeyringInputBuilder { - pub(crate) key_agreement_scheme: ::std::option::Option, -pub(crate) curve_spec: ::std::option::Option, + pub(crate) key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + pub(crate) curve_spec: + ::std::option::Option, } impl CreateRawEcdhKeyringInputBuilder { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.key_agreement_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.key_agreement_scheme = input; - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.curve_spec = ::std::option::Option::Some(input.into()); - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.curve_spec = input; - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = input; + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.curve_spec = ::std::option::Option::Some(input.into()); + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.curve_spec = input; + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } /// Consumes the builder and constructs a [`CreateRawEcdhKeyringInput`](crate::operation::operation::CreateRawEcdhKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput { key_agreement_scheme: self.key_agreement_scheme, curve_spec: self.curve_spec, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/builders.rs index 3aad0b022..68390e486 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_ecdh_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateRawEcdhKeyringFluentBuilder { } impl CreateRawEcdhKeyringFluentBuilder { /// Creates a new `CreateRawEcdhKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateRawEcdhKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::builders::CreateRawEcdhKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,38 +58,63 @@ impl CreateRawEcdhKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyring::send(&self.client, input).await } /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.key_agreement_scheme(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_key_agreement_scheme(input); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - self.inner.get_key_agreement_scheme() -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.curve_spec(input.into()); - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_curve_spec(input); - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - self.inner.get_curve_spec() -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.inner = self.inner.key_agreement_scheme(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.inner = self.inner.set_key_agreement_scheme(input); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + > { + self.inner.get_key_agreement_scheme() + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.curve_spec(input.into()); + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_curve_spec(input); + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + self.inner.get_curve_spec() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring.rs index f584a2071..58bb71f46 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring.rs @@ -20,7 +20,7 @@ impl CreateRawRsaKeyring { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawRsaKeyring(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_rsa_keyring::_create_raw_rsa_keyring_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_raw_rsa_keyring::_create_raw_rsa_keyring_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CreateRawRsaKeyring(&inner_input); if matches!( @@ -28,13 +28,16 @@ impl CreateRawRsaKeyring { crate::r#_Wrappers_Compile::Result::Success { .. } ) { Ok( - crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny(inner_result.value().clone()) -, + crate::deps::aws_cryptography_materialProviders::conversions::keyring::from_dafny( + inner_result.value().clone(), + ), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_keyring_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_keyring_output.rs index ed578fbb7..70b4d11b2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_keyring_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_keyring_output.rs @@ -6,17 +6,23 @@ /// Outputs for creating a Keyring. pub struct CreateKeyringOutput { /// The created Keyring. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutput { /// The created Keyring. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateKeyringOutput { /// Creates a new builder-style object to manufacture [`CreateKeyringOutput`](crate::operation::create_raw_rsa_keyring::builders::CreateKeyringOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateKeyringOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateKeyringOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateKeyringOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateKeyringOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateKeyringOutputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateKeyringOutputBuilder { /// The created Keyring. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The created Keyring. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The created Keyring. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The created Keyring. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The created Keyring. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateKeyringOutput`](crate::operation::operation::CreateKeyringOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateKeyringOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateKeyringOutput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs index 275ed8a7e..7e80ff9c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/_create_raw_rsa_keyring_input.rs @@ -6,41 +6,46 @@ /// Inputs for creating a Raw RAW Keyring. pub struct CreateRawRsaKeyringInput { /// A name associated with this wrapping key. -pub key_name: ::std::option::Option<::std::string::String>, -/// A namespace associated with this wrapping key. -pub key_namespace: ::std::option::Option<::std::string::String>, -/// The RSA padding scheme to use with this keyring. -pub padding_scheme: ::std::option::Option, -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub key_name: ::std::option::Option<::std::string::String>, + /// A namespace associated with this wrapping key. + pub key_namespace: ::std::option::Option<::std::string::String>, + /// The RSA padding scheme to use with this keyring. + pub padding_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawRsaKeyringInput { /// A name associated with this wrapping key. -pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The RSA padding scheme to use with this keyring. -pub fn padding_scheme(&self) -> &::std::option::Option { - &self.padding_scheme -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The RSA padding scheme to use with this keyring. + pub fn padding_scheme( + &self, + ) -> &::std::option::Option + { + &self.padding_scheme + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl CreateRawRsaKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawRsaKeyringInput`](crate::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInputBuilder::default() } } @@ -52,89 +57,122 @@ impl CreateRawRsaKeyringInput { )] pub struct CreateRawRsaKeyringInputBuilder { pub(crate) key_name: ::std::option::Option<::std::string::String>, -pub(crate) key_namespace: ::std::option::Option<::std::string::String>, -pub(crate) padding_scheme: ::std::option::Option, -pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key_namespace: ::std::option::Option<::std::string::String>, + pub(crate) padding_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawRsaKeyringInputBuilder { /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_name = ::std::option::Option::Some(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_name = input; - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_namespace = ::std::option::Option::Some(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_namespace = input; - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The RSA padding scheme to use with this keyring. -pub fn padding_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.padding_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The RSA padding scheme to use with this keyring. -pub fn set_padding_scheme(mut self, input: ::std::option::Option) -> Self { - self.padding_scheme = input; - self -} -/// The RSA padding scheme to use with this keyring. -pub fn get_padding_scheme(&self) -> &::std::option::Option { - &self.padding_scheme -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.private_key = input; - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_name = ::std::option::Option::Some(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_name = input; + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_namespace = ::std::option::Option::Some(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_namespace = input; + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The RSA padding scheme to use with this keyring. + pub fn padding_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.padding_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The RSA padding scheme to use with this keyring. + pub fn set_padding_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.padding_scheme = input; + self + } + /// The RSA padding scheme to use with this keyring. + pub fn get_padding_scheme( + &self, + ) -> &::std::option::Option + { + &self.padding_scheme + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = input; + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`CreateRawRsaKeyringInput`](crate::operation::operation::CreateRawRsaKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput { key_name: self.key_name, key_namespace: self.key_namespace, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/builders.rs index b456f9ef1..af719504e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_raw_rsa_keyring/builders.rs @@ -29,14 +29,16 @@ pub struct CreateRawRsaKeyringFluentBuilder { } impl CreateRawRsaKeyringFluentBuilder { /// Creates a new `CreateRawRsaKeyring`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateRawRsaKeyring as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::builders::CreateRawRsaKeyringInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,80 +58,111 @@ impl CreateRawRsaKeyringFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyring::send(&self.client, input).await } /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.key_name(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_key_name(input); - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_key_name() -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.key_namespace(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_key_namespace(input); - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_key_namespace() -} -/// The RSA padding scheme to use with this keyring. -pub fn padding_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.padding_scheme(input.into()); - self -} -/// The RSA padding scheme to use with this keyring. -pub fn set_padding_scheme(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_padding_scheme(input); - self -} -/// The RSA padding scheme to use with this keyring. -pub fn get_padding_scheme(&self) -> &::std::option::Option { - self.inner.get_padding_scheme() -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.private_key(input.into()); - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_private_key(input); - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_private_key() -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.key_name(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_key_name(input); + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_key_name() + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.inner = self.inner.key_namespace(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.inner = self.inner.set_key_namespace(input); + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_key_namespace() + } + /// The RSA padding scheme to use with this keyring. + pub fn padding_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.inner = self.inner.padding_scheme(input.into()); + self + } + /// The RSA padding scheme to use with this keyring. + pub fn set_padding_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.inner = self.inner.set_padding_scheme(input); + self + } + /// The RSA padding scheme to use with this keyring. + pub fn get_padding_scheme( + &self, + ) -> &::std::option::Option + { + self.inner.get_padding_scheme() + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.private_key(input.into()); + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_private_key(input); + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_private_key() + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm.rs index d541c1c37..9e67240c6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm.rs @@ -17,12 +17,12 @@ impl CreateRequiredEncryptionContextCmm { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_for_AwsCryptographicMaterialProviders_CreateRequiredEncryptionContextCMM(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_required_encryption_context_cmm::_create_required_encryption_context_cmm_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).CreateRequiredEncryptionContextCMM(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::create_required_encryption_context_cmm::_create_required_encryption_context_cmm_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .CreateRequiredEncryptionContextCMM(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -32,9 +32,11 @@ impl CreateRequiredEncryptionContextCmm { , ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs index 63b2ae588..5528ebdf0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_input.rs @@ -14,21 +14,27 @@ pub underlying_cmm: ::std::option::Option &::std::option::Option { - &self.keyring -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn underlying_cmm(&self) -> &::std::option::Option { - &self.underlying_cmm -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn underlying_cmm(&self) -> &::std::option::Option{ + &self.underlying_cmm + } } impl CreateRequiredEncryptionContextCmmInput { /// Creates a new builder-style object to manufacture [`CreateRequiredEncryptionContextCmmInput`](crate::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInputBuilder::default() } } @@ -45,54 +51,82 @@ pub(crate) underlying_cmm: ::std::option::Option) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn underlying_cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.underlying_cmm = ::std::option::Option::Some(input.into()); - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn set_underlying_cmm(mut self, input: ::std::option::Option) -> Self { - self.underlying_cmm = input; - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn get_underlying_cmm(&self) -> &::std::option::Option { - &self.underlying_cmm -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn underlying_cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.underlying_cmm = ::std::option::Option::Some(input.into()); + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn set_underlying_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.underlying_cmm = input; + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn get_underlying_cmm(&self) -> &::std::option::Option{ + &self.underlying_cmm + } /// Consumes the builder and constructs a [`CreateRequiredEncryptionContextCmmInput`](crate::operation::operation::CreateRequiredEncryptionContextCmmInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput { keyring: self.keyring, required_encryption_context_keys: self.required_encryption_context_keys, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_output.rs index dfdce272b..1a072c202 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/_create_required_encryption_context_cmm_output.rs @@ -10,13 +10,13 @@ pub materials_manager: ::std::option::Option &::std::option::Option { - &self.materials_manager -} + pub fn materials_manager(&self) -> &::std::option::Option{ + &self.materials_manager + } } impl CreateRequiredEncryptionContextCmmOutput { /// Creates a new builder-style object to manufacture [`CreateRequiredEncryptionContextCmmOutput`](crate::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CreateRequiredEncryptionContextCmmOutputBuilder { } impl CreateRequiredEncryptionContextCmmOutputBuilder { /// The created Required Encryption Context Cryptographic Materials Manager. -pub fn materials_manager(mut self, input: impl ::std::convert::Into) -> Self { - self.materials_manager = ::std::option::Option::Some(input.into()); - self -} -/// The created Required Encryption Context Cryptographic Materials Manager. -pub fn set_materials_manager(mut self, input: ::std::option::Option) -> Self { - self.materials_manager = input; - self -} -/// The created Required Encryption Context Cryptographic Materials Manager. -pub fn get_materials_manager(&self) -> &::std::option::Option { - &self.materials_manager -} + pub fn materials_manager( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.materials_manager = ::std::option::Option::Some(input.into()); + self + } + /// The created Required Encryption Context Cryptographic Materials Manager. + pub fn set_materials_manager( + mut self, + input: ::std::option::Option, + ) -> Self { + self.materials_manager = input; + self + } + /// The created Required Encryption Context Cryptographic Materials Manager. + pub fn get_materials_manager(&self) -> &::std::option::Option{ + &self.materials_manager + } /// Consumes the builder and constructs a [`CreateRequiredEncryptionContextCmmOutput`](crate::operation::operation::CreateRequiredEncryptionContextCmmOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmOutput { materials_manager: self.materials_manager, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/builders.rs index 615d5e13a..ac3eca555 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/create_required_encryption_context_cmm/builders.rs @@ -13,7 +13,7 @@ impl CreateRequiredEncryptionContextCmmInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.create_required_encryption_context_cmm(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct CreateRequiredEncryptionContextCmmFluentBuilder { } impl CreateRequiredEncryptionContextCmmFluentBuilder { /// Creates a new `CreateRequiredEncryptionContextCmm`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the CreateRequiredEncryptionContextCmm as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::builders::CreateRequiredEncryptionContextCmmInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl CreateRequiredEncryptionContextCmmFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,52 +58,80 @@ impl CreateRequiredEncryptionContextCmmFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmm::send(&self.client, input).await } /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.keyring(input.into()); - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_keyring(input); - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn get_keyring(&self) -> &::std::option::Option { - self.inner.get_keyring() -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn underlying_cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.underlying_cmm(input.into()); - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn set_underlying_cmm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_underlying_cmm(input); - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn get_underlying_cmm(&self) -> &::std::option::Option { - self.inner.get_underlying_cmm() -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.keyring(input.into()); + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.inner = self.inner.set_keyring(input); + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + self.inner.get_keyring() + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn underlying_cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.underlying_cmm(input.into()); + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn set_underlying_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_underlying_cmm(input); + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn get_underlying_cmm(&self) -> &::std::option::Option{ + self.inner.get_underlying_cmm() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials.rs index 180c92175..df8fd6890 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials.rs @@ -17,10 +17,14 @@ impl DecryptMaterials { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_for_CryptographicMaterialsManager_DecryptMaterials(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_manager.inner.borrow_mut().decrypt_materials(input) + cryptographic_materials_manager + .inner + .lock() + .unwrap() + .decrypt_materials(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_input.rs index 26c3199b2..7276d6c2c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_input.rs @@ -6,41 +6,71 @@ #[allow(missing_docs)] pub struct DecryptMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub reproduced_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub reproduced_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl DecryptMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn reproduced_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.reproduced_encryption_context -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn reproduced_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.reproduced_encryption_context + } } impl DecryptMaterialsInput { /// Creates a new builder-style object to manufacture [`DecryptMaterialsInput`](crate::operation::decrypt_materials::builders::DecryptMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsInputBuilder::default() } } @@ -51,90 +81,174 @@ impl DecryptMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) reproduced_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) reproduced_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl DecryptMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn reproduced_encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.reproduced_encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_reproduced_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.reproduced_encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_reproduced_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.reproduced_encryption_context -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn reproduced_encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.reproduced_encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_reproduced_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.reproduced_encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_reproduced_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.reproduced_encryption_context + } /// Consumes the builder and constructs a [`DecryptMaterialsInput`](crate::operation::operation::DecryptMaterialsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput { algorithm_suite_id: self.algorithm_suite_id, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_output.rs index ec595af3e..68a7c3aab 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/_decrypt_materials_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct DecryptMaterialsOutput { #[allow(missing_docs)] -pub decryption_materials: ::std::option::Option, + pub decryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl DecryptMaterialsOutput { #[allow(missing_docs)] -pub fn decryption_materials(&self) -> &::std::option::Option { - &self.decryption_materials -} + pub fn decryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.decryption_materials + } } impl DecryptMaterialsOutput { /// Creates a new builder-style object to manufacture [`DecryptMaterialsOutput`](crate::operation::decrypt_materials::builders::DecryptMaterialsOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl DecryptMaterialsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptMaterialsOutputBuilder { - pub(crate) decryption_materials: ::std::option::Option, + pub(crate) decryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl DecryptMaterialsOutputBuilder { #[allow(missing_docs)] -pub fn decryption_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.decryption_materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_decryption_materials(mut self, input: ::std::option::Option) -> Self { - self.decryption_materials = input; - self -} -#[allow(missing_docs)] -pub fn get_decryption_materials(&self) -> &::std::option::Option { - &self.decryption_materials -} + pub fn decryption_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.decryption_materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_decryption_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.decryption_materials = input; + self + } + #[allow(missing_docs)] + pub fn get_decryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.decryption_materials + } /// Consumes the builder and constructs a [`DecryptMaterialsOutput`](crate::operation::operation::DecryptMaterialsOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput { decryption_materials: self.decryption_materials, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/builders.rs index 936e0e0d3..0012e729f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decrypt_materials/builders.rs @@ -13,7 +13,7 @@ impl DecryptMaterialsInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = cryptographic_materials_manager.decrypt_materials(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct DecryptMaterialsFluentBuilder { } impl DecryptMaterialsFluentBuilder { /// Creates a new `DecryptMaterials`. - pub(crate) fn new(cryptographic_materials_manager: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) -> Self { + pub(crate) fn new( + cryptographic_materials_manager: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, + ) -> Self { Self { cryptographic_materials_manager, inner: ::std::default::Default::default(), } } /// Access the DecryptMaterials as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::builders::DecryptMaterialsInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl DecryptMaterialsFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,80 +57,154 @@ impl DecryptMaterialsFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterials::send(&self.cryptographic_materials_manager, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.commitment_policy(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_commitment_policy(input); - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - self.inner.get_commitment_policy() -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.encrypted_data_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_encrypted_data_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_encrypted_data_keys() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn reproduced_encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.reproduced_encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_reproduced_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_reproduced_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_reproduced_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_reproduced_encryption_context() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.commitment_policy(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.set_commitment_policy(input); + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + self.inner.get_commitment_policy() + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.encrypted_data_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.set_encrypted_data_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + self.inner.get_encrypted_data_keys() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn reproduced_encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.reproduced_encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_reproduced_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_reproduced_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_reproduced_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_reproduced_encryption_context() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key.rs index 250fb887a..68269eead 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key.rs @@ -20,20 +20,20 @@ impl DecryptionMaterialsWithPlaintextDataKey { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_for_AwsCryptographicMaterialProviders_DecryptionMaterialsWithPlaintextDataKey(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials_with_plaintext_data_key::_decryption_materials_with_plaintext_data_key_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).DecryptionMaterialsWithPlaintextDataKey(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::decryption_materials_with_plaintext_data_key::_decryption_materials_with_plaintext_data_key_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .DecryptionMaterialsWithPlaintextDataKey(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_decryption_materials.rs index c61998d6d..e1f3222c2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_decryption_materials.rs @@ -6,47 +6,62 @@ #[allow(missing_docs)] pub struct DecryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl DecryptionMaterials { /// Creates a new builder-style object to manufacture [`DecryptionMaterials`](crate::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsBuilder{ crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsBuilder::default() } } @@ -57,105 +72,164 @@ impl DecryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`DecryptionMaterials`](crate::operation::operation::DecryptionMaterials). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials { algorithm_suite: self.algorithm_suite, encryption_context: self.encryption_context, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_unit.rs index 27b42ff84..5eb13fbc6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::decryption_materials_with_plaintext_data_key::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/builders.rs index 3a3b9dec5..db0351e00 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/decryption_materials_with_plaintext_data_key/builders.rs @@ -28,14 +28,16 @@ pub struct DecryptionMaterialsWithPlaintextDataKeyFluentBuilder { } impl DecryptionMaterialsWithPlaintextDataKeyFluentBuilder { /// Creates a new `DecryptionMaterialsWithPlaintextDataKey`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the DecryptionMaterialsWithPlaintextDataKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::builders::DecryptionMaterialsBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,94 +57,148 @@ impl DecryptionMaterialsWithPlaintextDataKeyFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterialsWithPlaintextDataKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.plaintext_data_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_plaintext_data_key(input); - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_plaintext_data_key() -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.symmetric_signing_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_symmetric_signing_key(input); - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_symmetric_signing_key() -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.verification_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_verification_key(input); - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_verification_key() -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + self.inner.get_algorithm_suite() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.plaintext_data_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_plaintext_data_key(input); + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_plaintext_data_key() + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } + #[allow(missing_docs)] + pub fn symmetric_signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.symmetric_signing_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_symmetric_signing_key(input); + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_symmetric_signing_key() + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.verification_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_verification_key(input); + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_verification_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry.rs index d4712e577..e52fda082 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry.rs @@ -20,7 +20,11 @@ impl DeleteCacheEntry { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_for_CryptographicMaterialsCache_DeleteCacheEntry(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_cache.inner.borrow_mut().delete_cache_entry(input) + cryptographic_materials_cache + .inner + .lock() + .unwrap() + .delete_cache_entry(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_delete_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_delete_cache_entry_input.rs index 2a0c69b85..cb6e8a0f0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_delete_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_delete_cache_entry_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct DeleteCacheEntryInput { #[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl DeleteCacheEntryInput { #[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl DeleteCacheEntryInput { /// Creates a new builder-style object to manufacture [`DeleteCacheEntryInput`](crate::operation::delete_cache_entry::builders::DeleteCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::DeleteCacheEntryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::DeleteCacheEntryInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::DeleteCacheEntryInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct DeleteCacheEntryInputBuilder { } impl DeleteCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`DeleteCacheEntryInput`](crate::operation::operation::DeleteCacheEntryInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput { identifier: self.identifier, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_unit.rs index b52810dd9..28d3ebe26 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::delete_cache_entry::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::UnitBuilder::default() } } @@ -22,11 +18,8 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, @@ -34,8 +27,8 @@ impl UnitBuilder { crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::Unit, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::Unit { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::Unit {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/builders.rs index a4f242e0d..cea07c258 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/delete_cache_entry/builders.rs @@ -28,14 +28,16 @@ pub struct DeleteCacheEntryFluentBuilder { } impl DeleteCacheEntryFluentBuilder { /// Creates a new `DeleteCacheEntry`. - pub(crate) fn new(cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) -> Self { + pub(crate) fn new( + cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, + ) -> Self { Self { cryptographic_materials_cache, inner: ::std::default::Default::default(), } } /// Access the DeleteCacheEntry as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::DeleteCacheEntryInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::builders::DeleteCacheEntryInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,24 +57,30 @@ impl DeleteCacheEntryFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntry::send(&self.cryptographic_materials_cache, input).await } #[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.identifier(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_identifier(input); - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_identifier() -} + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.identifier(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_identifier(input); + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key.rs index b96c67006..e8100818b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key.rs @@ -20,20 +20,20 @@ impl EncryptionMaterialsHasPlaintextDataKey { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_for_AwsCryptographicMaterialProviders_EncryptionMaterialsHasPlaintextDataKey(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials_has_plaintext_data_key::_encryption_materials_has_plaintext_data_key_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).EncryptionMaterialsHasPlaintextDataKey(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::encryption_materials_has_plaintext_data_key::_encryption_materials_has_plaintext_data_key_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .EncryptionMaterialsHasPlaintextDataKey(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_encryption_materials.rs index 607b1af5f..7fa5a1d22 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_encryption_materials.rs @@ -6,53 +6,76 @@ #[allow(missing_docs)] pub struct EncryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } } impl EncryptionMaterials { /// Creates a new builder-style object to manufacture [`EncryptionMaterials`](crate::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsBuilder{ crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsBuilder::default() } } @@ -63,120 +86,202 @@ impl EncryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) symmetric_signing_keys: + ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } /// Consumes the builder and constructs a [`EncryptionMaterials`](crate::operation::operation::EncryptionMaterials). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials { algorithm_suite: self.algorithm_suite, encrypted_data_keys: self.encrypted_data_keys, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_unit.rs index 015ef24c3..b67a6e070 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::encryption_materials_has_plaintext_data_key::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/builders.rs index f3ec99f6d..d5d1336be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/encryption_materials_has_plaintext_data_key/builders.rs @@ -28,14 +28,16 @@ pub struct EncryptionMaterialsHasPlaintextDataKeyFluentBuilder { } impl EncryptionMaterialsHasPlaintextDataKeyFluentBuilder { /// Creates a new `EncryptionMaterialsHasPlaintextDataKey`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the EncryptionMaterialsHasPlaintextDataKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::builders::EncryptionMaterialsBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,108 +57,182 @@ impl EncryptionMaterialsHasPlaintextDataKeyFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterialsHasPlaintextDataKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite() -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.encrypted_data_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_encrypted_data_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_encrypted_data_keys() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.plaintext_data_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_plaintext_data_key(input); - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_plaintext_data_key() -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.signing_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_signing_key(input); - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_signing_key() -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.inner = self.inner.symmetric_signing_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.inner = self.inner.set_symmetric_signing_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - self.inner.get_symmetric_signing_keys() -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + self.inner.get_algorithm_suite() + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.encrypted_data_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.set_encrypted_data_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + self.inner.get_encrypted_data_keys() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.plaintext_data_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_plaintext_data_key(input); + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_plaintext_data_key() + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.signing_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_signing_key(input); + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_signing_key() + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.inner = self.inner.symmetric_signing_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.inner = self.inner.set_symmetric_signing_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + self.inner.get_symmetric_signing_keys() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info.rs index 8e0629d9b..2d5329cea 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info.rs @@ -17,10 +17,11 @@ impl GetAlgorithmSuiteInfo { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_for_AwsCryptographicMaterialProviders_GetAlgorithmSuiteInfo(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::standard_library_conversions::blob_to_dafny(&input.binary_id.unwrap()); + let inner_input = + crate::standard_library_conversions::blob_to_dafny(&input.r#binary_id.unwrap()); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetAlgorithmSuiteInfo(&inner_input); if matches!( @@ -31,9 +32,11 @@ impl GetAlgorithmSuiteInfo { crate::deps::aws_cryptography_materialProviders::conversions::get_algorithm_suite_info::_get_algorithm_suite_info_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_algorithm_suite_info.rs index 827565a56..db9076dd0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_algorithm_suite_info.rs @@ -6,65 +6,105 @@ #[allow(missing_docs)] pub struct AlgorithmSuiteInfo { #[allow(missing_docs)] -pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub commitment: ::std::option::Option, -#[allow(missing_docs)] -pub edk_wrapping: ::std::option::Option, -#[allow(missing_docs)] -pub encrypt: ::std::option::Option, -#[allow(missing_docs)] -pub id: ::std::option::Option, -#[allow(missing_docs)] -pub kdf: ::std::option::Option, -#[allow(missing_docs)] -pub message_version: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub signature: ::std::option::Option, -#[allow(missing_docs)] -pub symmetric_signature: ::std::option::Option, + pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + #[allow(missing_docs)] + pub encrypt: + ::std::option::Option, + #[allow(missing_docs)] + pub id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub message_version: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + #[allow(missing_docs)] + pub symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfo { #[allow(missing_docs)] -pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } } impl AlgorithmSuiteInfo { /// Creates a new builder-style object to manufacture [`AlgorithmSuiteInfo`](crate::operation::get_algorithm_suite_info::builders::AlgorithmSuiteInfo). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder::default() } } @@ -76,149 +116,265 @@ impl AlgorithmSuiteInfo { )] pub struct AlgorithmSuiteInfoBuilder { pub(crate) binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) commitment: ::std::option::Option, -pub(crate) edk_wrapping: ::std::option::Option, -pub(crate) encrypt: ::std::option::Option, -pub(crate) id: ::std::option::Option, -pub(crate) kdf: ::std::option::Option, -pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, -pub(crate) signature: ::std::option::Option, -pub(crate) symmetric_signature: ::std::option::Option, + pub(crate) commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + pub(crate) encrypt: + ::std::option::Option, + pub(crate) id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, + pub(crate) signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + pub(crate) symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfoBuilder { #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.binary_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.binary_id = input; - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment(mut self, input: ::std::option::Option) -> Self { - self.commitment = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(mut self, input: impl ::std::convert::Into) -> Self { - self.edk_wrapping = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_edk_wrapping(mut self, input: ::std::option::Option) -> Self { - self.edk_wrapping = input; - self -} -#[allow(missing_docs)] -pub fn get_edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(mut self, input: impl ::std::convert::Into) -> Self { - self.encrypt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypt(mut self, input: ::std::option::Option) -> Self { - self.encrypt = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(mut self, input: impl ::std::convert::Into) -> Self { - self.id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_id(mut self, input: ::std::option::Option) -> Self { - self.id = input; - self -} -#[allow(missing_docs)] -pub fn get_id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.kdf = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_kdf(mut self, input: ::std::option::Option) -> Self { - self.kdf = input; - self -} -#[allow(missing_docs)] -pub fn get_kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.message_version = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.message_version = input; - self -} -#[allow(missing_docs)] -pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(mut self, input: impl ::std::convert::Into) -> Self { - self.symmetric_signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signature(mut self, input: ::std::option::Option) -> Self { - self.symmetric_signature = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.binary_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.binary_id = input; + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_edk_wrapping( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = input; + self + } + #[allow(missing_docs)] + pub fn get_edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypt( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = input; + self + } + #[allow(missing_docs)] + pub fn get_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = input; + self + } + #[allow(missing_docs)] + pub fn get_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.message_version = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message_version( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.message_version = input; + self + } + #[allow(missing_docs)] + pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } /// Consumes the builder and constructs a [`AlgorithmSuiteInfo`](crate::operation::operation::AlgorithmSuiteInfo). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo { binary_id: self.binary_id, commitment: self.commitment, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_get_algorithm_suite_info_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_get_algorithm_suite_info_input.rs index b235c23a6..14bf41919 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_get_algorithm_suite_info_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/_get_algorithm_suite_info_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GetAlgorithmSuiteInfoInput { #[allow(missing_docs)] -pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, + pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetAlgorithmSuiteInfoInput { #[allow(missing_docs)] -pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} + pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } } impl GetAlgorithmSuiteInfoInput { /// Creates a new builder-style object to manufacture [`GetAlgorithmSuiteInfoInput`](crate::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct GetAlgorithmSuiteInfoInputBuilder { } impl GetAlgorithmSuiteInfoInputBuilder { #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.binary_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.binary_id = input; - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.binary_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.binary_id = input; + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } /// Consumes the builder and constructs a [`GetAlgorithmSuiteInfoInput`](crate::operation::operation::GetAlgorithmSuiteInfoInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfoInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfoInput { binary_id: self.binary_id, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/builders.rs index b9225f95c..f84264419 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_algorithm_suite_info/builders.rs @@ -13,7 +13,7 @@ impl GetAlgorithmSuiteInfoInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.get_algorithm_suite_info(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct GetAlgorithmSuiteInfoFluentBuilder { } impl GetAlgorithmSuiteInfoFluentBuilder { /// Creates a new `GetAlgorithmSuiteInfo`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the GetAlgorithmSuiteInfo as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::builders::GetAlgorithmSuiteInfoInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl GetAlgorithmSuiteInfoFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::AlgorithmSuiteInfo, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,24 +57,24 @@ impl GetAlgorithmSuiteInfoFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfo::send(&self.client, input).await } #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.binary_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_binary_id(input); - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_binary_id() -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.binary_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_binary_id(input); + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_binary_id() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id.rs index d8c375c6d..2fc2e839f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id.rs @@ -17,10 +17,14 @@ impl GetBranchKeyId { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_for_BranchKeyIdSupplier_GetBranchKeyId(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - branch_key_id_supplier.inner.borrow_mut().get_branch_key_id(input) + branch_key_id_supplier + .inner + .lock() + .unwrap() + .get_branch_key_id(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_input.rs index 1e5a6fffb..3414b6136 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_input.rs @@ -6,17 +6,23 @@ /// Inputs for determining the Branch Key which should be used to wrap or unwrap the data key for this encryption or decryption pub struct GetBranchKeyIdInput { /// The Encryption Context used with this encryption or decryption. -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl GetBranchKeyIdInput { /// The Encryption Context used with this encryption or decryption. -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } } impl GetBranchKeyIdInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdInput`](crate::operation::get_branch_key_id::builders::GetBranchKeyIdInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdInputBuilder::default() } } @@ -27,30 +33,46 @@ impl GetBranchKeyIdInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyIdInputBuilder { - pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl GetBranchKeyIdInputBuilder { /// The Encryption Context used with this encryption or decryption. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } /// Consumes the builder and constructs a [`GetBranchKeyIdInput`](crate::operation::operation::GetBranchKeyIdInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput { encryption_context: self.encryption_context, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_output.rs index 04b71db00..d7bb62139 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/_get_branch_key_id_output.rs @@ -6,17 +6,17 @@ /// Outputs for the Branch Key responsible for wrapping or unwrapping the data key in this encryption or decryption. pub struct GetBranchKeyIdOutput { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub branch_key_id: ::std::option::Option<::std::string::String>, + pub branch_key_id: ::std::option::Option<::std::string::String>, } impl GetBranchKeyIdOutput { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } } impl GetBranchKeyIdOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdOutput`](crate::operation::get_branch_key_id::builders::GetBranchKeyIdOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetBranchKeyIdOutputBuilder { } impl GetBranchKeyIdOutputBuilder { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } /// Consumes the builder and constructs a [`GetBranchKeyIdOutput`](crate::operation::operation::GetBranchKeyIdOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput { branch_key_id: self.branch_key_id, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/builders.rs index 5102ba1a3..d872b2109 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_branch_key_id/builders.rs @@ -13,7 +13,7 @@ impl GetBranchKeyIdInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = branch_key_id_supplier.get_branch_key_id(); fluent_builder.inner = self; fluent_builder.send().await @@ -29,14 +29,16 @@ pub struct GetBranchKeyIdFluentBuilder { } impl GetBranchKeyIdFluentBuilder { /// Creates a new `GetBranchKeyId`. - pub(crate) fn new(branch_key_id_supplier: crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef) -> Self { + pub(crate) fn new( + branch_key_id_supplier: crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef, + ) -> Self { Self { branch_key_id_supplier, inner: ::std::default::Default::default(), } } /// Access the GetBranchKeyId as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::builders::GetBranchKeyIdInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -45,7 +47,7 @@ impl GetBranchKeyIdFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -56,24 +58,38 @@ impl GetBranchKeyIdFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyId::send(&self.branch_key_id_supplier, input).await } /// The Encryption Context used with this encryption or decryption. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry.rs index b20b3b848..b713f5217 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry.rs @@ -17,10 +17,14 @@ impl GetCacheEntry { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_for_CryptographicMaterialsCache_GetCacheEntry(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_cache.inner.borrow_mut().get_cache_entry(input) + cryptographic_materials_cache + .inner + .lock() + .unwrap() + .get_cache_entry(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_input.rs index b6de75234..7b0144685 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_input.rs @@ -6,23 +6,23 @@ #[allow(missing_docs)] pub struct GetCacheEntryInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub bytes_used: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetCacheEntryInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl GetCacheEntryInput { /// Creates a new builder-style object to manufacture [`GetCacheEntryInput`](crate::operation::get_cache_entry::builders::GetCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryInputBuilder::default() } } @@ -34,44 +34,50 @@ impl GetCacheEntryInput { )] pub struct GetCacheEntryInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i64>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`GetCacheEntryInput`](crate::operation::operation::GetCacheEntryInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput { bytes_used: self.bytes_used, identifier: self.identifier, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_output.rs index c22962752..53501d0f1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/_get_cache_entry_output.rs @@ -6,41 +6,45 @@ #[allow(missing_docs)] pub struct GetCacheEntryOutput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub creation_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub expiry_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, -#[allow(missing_docs)] -pub messages_used: ::std::option::Option<::std::primitive::i32>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub creation_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub expiry_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub materials: + ::std::option::Option, + #[allow(missing_docs)] + pub messages_used: ::std::option::Option<::std::primitive::i32>, } impl GetCacheEntryOutput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } } impl GetCacheEntryOutput { /// Creates a new builder-style object to manufacture [`GetCacheEntryOutput`](crate::operation::get_cache_entry::builders::GetCacheEntryOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryOutputBuilder::default() } } @@ -52,89 +56,115 @@ impl GetCacheEntryOutput { )] pub struct GetCacheEntryOutputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) materials: ::std::option::Option, -pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, + pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) materials: + ::std::option::Option, + pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, } impl GetCacheEntryOutputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.creation_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_creation_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.creation_time = input; - self -} -#[allow(missing_docs)] -pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.expiry_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.expiry_time = input; - self -} -#[allow(missing_docs)] -pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.messages_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_messages_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.messages_used = input; - self -} -#[allow(missing_docs)] -pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.creation_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_creation_time( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.creation_time = input; + self + } + #[allow(missing_docs)] + pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.expiry_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.expiry_time = input; + self + } + #[allow(missing_docs)] + pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.messages_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_messages_used( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.messages_used = input; + self + } + #[allow(missing_docs)] + pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } /// Consumes the builder and constructs a [`GetCacheEntryOutput`](crate::operation::operation::GetCacheEntryOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput { bytes_used: self.bytes_used, creation_time: self.creation_time, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/builders.rs index 496ac1a45..f3f7c2f93 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_cache_entry/builders.rs @@ -13,7 +13,7 @@ impl GetCacheEntryInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = cryptographic_materials_cache.get_cache_entry(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct GetCacheEntryFluentBuilder { } impl GetCacheEntryFluentBuilder { /// Creates a new `GetCacheEntry`. - pub(crate) fn new(cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) -> Self { + pub(crate) fn new( + cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, + ) -> Self { Self { cryptographic_materials_cache, inner: ::std::default::Default::default(), } } /// Access the GetCacheEntry as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::builders::GetCacheEntryInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl GetCacheEntryFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,38 +57,44 @@ impl GetCacheEntryFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntry::send(&self.cryptographic_materials_cache, input).await } #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.inner = self.inner.bytes_used(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.inner = self.inner.set_bytes_used(input); - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { - self.inner.get_bytes_used() -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.identifier(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_identifier(input); - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_identifier() -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.inner = self.inner.bytes_used(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.inner = self.inner.set_bytes_used(input); + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { + self.inner.get_bytes_used() + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.identifier(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_identifier(input); + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client.rs index 507757c65..fdf69077a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client.rs @@ -20,7 +20,7 @@ impl GetClient { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_for_ClientSupplier_GetClient(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - client_supplier.inner.borrow_mut().get_client(input) + client_supplier.inner.lock().unwrap().get_client(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_input.rs index 4c9cb6ec1..d62294b50 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_input.rs @@ -6,17 +6,17 @@ /// Inputs for getting a AWS KMS Client. pub struct GetClientInput { /// The region the client should be created in. -pub region: ::std::option::Option<::std::string::String>, + pub region: ::std::option::Option<::std::string::String>, } impl GetClientInput { /// The region the client should be created in. -pub fn region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } } impl GetClientInput { /// Creates a new builder-style object to manufacture [`GetClientInput`](crate::operation::get_client::builders::GetClientInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientInputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct GetClientInputBuilder { } impl GetClientInputBuilder { /// The region the client should be created in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.region = ::std::option::Option::Some(input.into()); - self -} -/// The region the client should be created in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.region = input; - self -} -/// The region the client should be created in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.region = ::std::option::Option::Some(input.into()); + self + } + /// The region the client should be created in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.region = input; + self + } + /// The region the client should be created in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } /// Consumes the builder and constructs a [`GetClientInput`](crate::operation::operation::GetClientInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_output.rs index e5aa48d82..c489d9027 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/_get_client_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GetClientOutput { #[allow(missing_docs)] -pub client: ::std::option::Option, + pub client: ::std::option::Option, } impl GetClientOutput { #[allow(missing_docs)] -pub fn client(&self) -> &::std::option::Option { - &self.client -} + pub fn client(&self) -> &::std::option::Option { + &self.client + } } impl GetClientOutput { /// Creates a new builder-style object to manufacture [`GetClientOutput`](crate::operation::get_client::builders::GetClientOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientOutputBuilder::default() } } @@ -31,19 +31,27 @@ pub struct GetClientOutputBuilder { } impl GetClientOutputBuilder { #[allow(missing_docs)] -pub fn client(mut self, input: impl ::std::convert::Into) -> Self { - self.client = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_client(mut self, input: ::std::option::Option) -> Self { - self.client = input; - self -} -#[allow(missing_docs)] -pub fn get_client(&self) -> &::std::option::Option { - &self.client -} + pub fn client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client = input; + self + } + #[allow(missing_docs)] + pub fn get_client( + &self, + ) -> &::std::option::Option { + &self.client + } /// Consumes the builder and constructs a [`GetClientOutput`](crate::operation::operation::GetClientOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/builders.rs index 56ac7ae4a..c491be94b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_client/builders.rs @@ -29,14 +29,16 @@ pub struct GetClientFluentBuilder { } impl GetClientFluentBuilder { /// Creates a new `GetClient`. - pub(crate) fn new(client_supplier: crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef) -> Self { + pub(crate) fn new( + client_supplier: crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + ) -> Self { Self { client_supplier, inner: ::std::default::Default::default(), } } /// Access the GetClient as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -56,24 +58,28 @@ impl GetClientFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; - crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClient::send(&self.client_supplier, input).await + crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClient::send( + &self.client_supplier, + input, + ) + .await } /// The region the client should be created in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.inner = self.inner.region(input.into()); - self -} -/// The region the client should be created in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.inner = self.inner.set_region(input); - self -} -/// The region the client should be created in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - self.inner.get_region() -} + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.inner = self.inner.region(input.into()); + self + } + /// The region the client should be created in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.inner = self.inner.set_region(input); + self + } + /// The region the client should be created in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + self.inner.get_region() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials.rs index 0bb78b48b..930680372 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials.rs @@ -17,10 +17,14 @@ impl GetEncryptionMaterials { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_for_CryptographicMaterialsManager_GetEncryptionMaterials(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_manager.inner.borrow_mut().get_encryption_materials(input) + cryptographic_materials_manager + .inner + .lock() + .unwrap() + .get_encryption_materials(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_input.rs index 739655f79..a6849bd10 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_input.rs @@ -6,41 +6,62 @@ #[allow(missing_docs)] pub struct GetEncryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub max_plaintext_length: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub max_plaintext_length: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl GetEncryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.max_plaintext_length -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.max_plaintext_length + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } } impl GetEncryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`GetEncryptionMaterialsInput`](crate::operation::get_encryption_materials::builders::GetEncryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsInputBuilder::default() } } @@ -51,90 +72,153 @@ impl GetEncryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetEncryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) max_plaintext_length: ::std::option::Option<::std::primitive::i64>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) max_plaintext_length: ::std::option::Option<::std::primitive::i64>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl GetEncryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn max_plaintext_length(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.max_plaintext_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_max_plaintext_length(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.max_plaintext_length = input; - self -} -#[allow(missing_docs)] -pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.max_plaintext_length -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn max_plaintext_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.max_plaintext_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_max_plaintext_length( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.max_plaintext_length = input; + self + } + #[allow(missing_docs)] + pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.max_plaintext_length + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } /// Consumes the builder and constructs a [`GetEncryptionMaterialsInput`](crate::operation::operation::GetEncryptionMaterialsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput { algorithm_suite_id: self.algorithm_suite_id, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_output.rs index 84536e476..362302a5d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/_get_encryption_materials_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct GetEncryptionMaterialsOutput { #[allow(missing_docs)] -pub encryption_materials: ::std::option::Option, + pub encryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl GetEncryptionMaterialsOutput { #[allow(missing_docs)] -pub fn encryption_materials(&self) -> &::std::option::Option { - &self.encryption_materials -} + pub fn encryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.encryption_materials + } } impl GetEncryptionMaterialsOutput { /// Creates a new builder-style object to manufacture [`GetEncryptionMaterialsOutput`](crate::operation::get_encryption_materials::builders::GetEncryptionMaterialsOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsOutputBuilder::default() } } @@ -27,30 +33,46 @@ impl GetEncryptionMaterialsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetEncryptionMaterialsOutputBuilder { - pub(crate) encryption_materials: ::std::option::Option, + pub(crate) encryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl GetEncryptionMaterialsOutputBuilder { #[allow(missing_docs)] -pub fn encryption_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.encryption_materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_materials(mut self, input: ::std::option::Option) -> Self { - self.encryption_materials = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_materials(&self) -> &::std::option::Option { - &self.encryption_materials -} + pub fn encryption_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.encryption_materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.encryption_materials = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.encryption_materials + } /// Consumes the builder and constructs a [`GetEncryptionMaterialsOutput`](crate::operation::operation::GetEncryptionMaterialsOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput { encryption_materials: self.encryption_materials, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/builders.rs index 122dd8bc0..38007505b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/get_encryption_materials/builders.rs @@ -13,7 +13,7 @@ impl GetEncryptionMaterialsInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = cryptographic_materials_manager.get_encryption_materials(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct GetEncryptionMaterialsFluentBuilder { } impl GetEncryptionMaterialsFluentBuilder { /// Creates a new `GetEncryptionMaterials`. - pub(crate) fn new(cryptographic_materials_manager: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) -> Self { + pub(crate) fn new( + cryptographic_materials_manager: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, + ) -> Self { Self { cryptographic_materials_manager, inner: ::std::default::Default::default(), } } /// Access the GetEncryptionMaterials as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::builders::GetEncryptionMaterialsInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl GetEncryptionMaterialsFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,80 +57,136 @@ impl GetEncryptionMaterialsFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterials::send(&self.cryptographic_materials_manager, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.commitment_policy(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_commitment_policy(input); - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - self.inner.get_commitment_policy() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn max_plaintext_length(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.inner = self.inner.max_plaintext_length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_max_plaintext_length(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.inner = self.inner.set_max_plaintext_length(input); - self -} -#[allow(missing_docs)] -pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { - self.inner.get_max_plaintext_length() -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.commitment_policy(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.set_commitment_policy(input); + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + self.inner.get_commitment_policy() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn max_plaintext_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.inner = self.inner.max_plaintext_length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_max_plaintext_length( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.inner = self.inner.set_max_plaintext_length(input); + self + } + #[allow(missing_docs)] + pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { + self.inner.get_max_plaintext_length() + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials.rs index da98d1283..6cbde3cd3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials.rs @@ -17,12 +17,12 @@ impl InitializeDecryptionMaterials { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeDecryptionMaterials(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::initialize_decryption_materials::_initialize_decryption_materials_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).InitializeDecryptionMaterials(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::initialize_decryption_materials::_initialize_decryption_materials_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .InitializeDecryptionMaterials(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -31,9 +31,11 @@ impl InitializeDecryptionMaterials { crate::deps::aws_cryptography_materialProviders::conversions::initialize_decryption_materials::_initialize_decryption_materials_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_decryption_materials.rs index 0e6d1a22b..a30153747 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_decryption_materials.rs @@ -6,47 +6,62 @@ #[allow(missing_docs)] pub struct DecryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl DecryptionMaterials { /// Creates a new builder-style object to manufacture [`DecryptionMaterials`](crate::operation::initialize_decryption_materials::builders::DecryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::DecryptionMaterialsBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::DecryptionMaterialsBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::DecryptionMaterialsBuilder::default() } } @@ -57,105 +72,164 @@ impl DecryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`DecryptionMaterials`](crate::operation::operation::DecryptionMaterials). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials { algorithm_suite: self.algorithm_suite, encryption_context: self.encryption_context, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_initialize_decryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_initialize_decryption_materials_input.rs index 4c9f91829..f49118aa0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_initialize_decryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/_initialize_decryption_materials_input.rs @@ -6,29 +6,44 @@ #[allow(missing_docs)] pub struct InitializeDecryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl InitializeDecryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } } impl InitializeDecryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`InitializeDecryptionMaterialsInput`](crate::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInputBuilder::default() } } @@ -39,60 +54,101 @@ impl InitializeDecryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct InitializeDecryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl InitializeDecryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } /// Consumes the builder and constructs a [`InitializeDecryptionMaterialsInput`](crate::operation::operation::InitializeDecryptionMaterialsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput { algorithm_suite_id: self.algorithm_suite_id, encryption_context: self.encryption_context, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/builders.rs index 99e971955..f58ab2b8e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_decryption_materials/builders.rs @@ -13,7 +13,7 @@ impl InitializeDecryptionMaterialsInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.initialize_decryption_materials(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct InitializeDecryptionMaterialsFluentBuilder { } impl InitializeDecryptionMaterialsFluentBuilder { /// Creates a new `InitializeDecryptionMaterials`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the InitializeDecryptionMaterials as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::builders::InitializeDecryptionMaterialsInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl InitializeDecryptionMaterialsFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::DecryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,52 +57,88 @@ impl InitializeDecryptionMaterialsFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterials::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials.rs index 705c857d7..37db1d2ee 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials.rs @@ -17,12 +17,12 @@ impl InitializeEncryptionMaterials { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeEncryptionMaterials(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::initialize_encryption_materials::_initialize_encryption_materials_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).InitializeEncryptionMaterials(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::initialize_encryption_materials::_initialize_encryption_materials_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .InitializeEncryptionMaterials(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -31,9 +31,11 @@ impl InitializeEncryptionMaterials { crate::deps::aws_cryptography_materialProviders::conversions::initialize_encryption_materials::_initialize_encryption_materials_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_encryption_materials.rs index f9ff6dad9..e23a1556d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_encryption_materials.rs @@ -6,53 +6,76 @@ #[allow(missing_docs)] pub struct EncryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } } impl EncryptionMaterials { /// Creates a new builder-style object to manufacture [`EncryptionMaterials`](crate::operation::initialize_encryption_materials::builders::EncryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::EncryptionMaterialsBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::EncryptionMaterialsBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::EncryptionMaterialsBuilder::default() } } @@ -63,120 +86,202 @@ impl EncryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) symmetric_signing_keys: + ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } /// Consumes the builder and constructs a [`EncryptionMaterials`](crate::operation::operation::EncryptionMaterials). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials { algorithm_suite: self.algorithm_suite, encrypted_data_keys: self.encrypted_data_keys, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_initialize_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_initialize_encryption_materials_input.rs index afb124ace..b2005080c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_initialize_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/_initialize_encryption_materials_input.rs @@ -6,41 +6,56 @@ #[allow(missing_docs)] pub struct InitializeEncryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl InitializeEncryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl InitializeEncryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`InitializeEncryptionMaterialsInput`](crate::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInputBuilder::default() } } @@ -51,90 +66,143 @@ impl InitializeEncryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct InitializeEncryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl InitializeEncryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`InitializeEncryptionMaterialsInput`](crate::operation::operation::InitializeEncryptionMaterialsInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput { algorithm_suite_id: self.algorithm_suite_id, encryption_context: self.encryption_context, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/builders.rs index d68eae967..bd3a6aac6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/initialize_encryption_materials/builders.rs @@ -13,7 +13,7 @@ impl InitializeEncryptionMaterialsInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let mut fluent_builder = client.initialize_encryption_materials(); fluent_builder.inner = self; fluent_builder.send().await @@ -28,14 +28,16 @@ pub struct InitializeEncryptionMaterialsFluentBuilder { } impl InitializeEncryptionMaterialsFluentBuilder { /// Creates a new `InitializeEncryptionMaterials`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the InitializeEncryptionMaterials as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::builders::InitializeEncryptionMaterialsInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +46,7 @@ impl InitializeEncryptionMaterialsFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::EncryptionMaterials, crate::deps::aws_cryptography_materialProviders::types::error::Error, - > { + >{ let input = self .inner .build() @@ -55,80 +57,128 @@ impl InitializeEncryptionMaterialsFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterials::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm_suite_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm_suite_id(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - self.inner.get_algorithm_suite_id() -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.encryption_context(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.inner = self.inner.set_encryption_context(input); - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - self.inner.get_encryption_context() -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.required_encryption_context_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.inner = self.inner.set_required_encryption_context_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - self.inner.get_required_encryption_context_keys() -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.signing_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_signing_key(input); - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_signing_key() -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.verification_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_verification_key(input); - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_verification_key() -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm_suite_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm_suite_id(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm_suite_id() + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.encryption_context(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.inner = self.inner.set_encryption_context(input); + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + self.inner.get_encryption_context() + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.required_encryption_context_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.inner = self.inner.set_required_encryption_context_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + self.inner.get_required_encryption_context_keys() + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.signing_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_signing_key(input); + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_signing_key() + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.verification_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_verification_key(input); + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_verification_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt.rs index 3b8aae79b..27984eba3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt.rs @@ -20,7 +20,7 @@ impl OnDecrypt { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_for_Keyring_OnDecrypt(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - keyring.inner.borrow_mut().on_decrypt(input) + keyring.inner.lock().unwrap().on_decrypt(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_input.rs index 8a25d564e..9c9108b6d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct OnDecryptInput { #[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptInput { #[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } } impl OnDecryptInput { /// Creates a new builder-style object to manufacture [`OnDecryptInput`](crate::operation::on_decrypt::builders::OnDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptInputBuilder::default() } } @@ -33,38 +45,74 @@ impl OnDecryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnDecryptInputBuilder { - pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) materials: ::std::option::Option, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptInputBuilder { #[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnDecryptInput`](crate::operation::operation::OnDecryptInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_output.rs index fedf5395b..c302081c1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/_on_decrypt_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct OnDecryptOutput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptOutput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } } impl OnDecryptOutput { /// Creates a new builder-style object to manufacture [`OnDecryptOutput`](crate::operation::on_decrypt::builders::OnDecryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptOutputBuilder::default() } } @@ -27,23 +33,39 @@ impl OnDecryptOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnDecryptOutputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptOutputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnDecryptOutput`](crate::operation::operation::OnDecryptOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/builders.rs index 9e05198e6..7883f2560 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_decrypt/builders.rs @@ -28,14 +28,16 @@ pub struct OnDecryptFluentBuilder { } impl OnDecryptFluentBuilder { /// Creates a new `OnDecrypt`. - pub(crate) fn new(keyring: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) -> Self { + pub(crate) fn new( + keyring: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + ) -> Self { Self { keyring, inner: ::std::default::Default::default(), } } /// Access the OnDecrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,74 @@ impl OnDecryptFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; - crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecrypt::send(&self.keyring, input).await + crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecrypt::send( + &self.keyring, + input, + ) + .await } #[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.inner = self.inner.encrypted_data_keys(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.inner = self.inner.set_encrypted_data_keys(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - self.inner.get_encrypted_data_keys() -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.materials(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_materials(input); - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - self.inner.get_materials() -} + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.encrypted_data_keys(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.inner = self.inner.set_encrypted_data_keys(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + self.inner.get_encrypted_data_keys() + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.materials(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_materials(input); + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + self.inner.get_materials() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt.rs index 1fc3ca3d1..33b7d21a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt.rs @@ -20,7 +20,7 @@ impl OnEncrypt { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_for_Keyring_OnEncrypt(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - keyring.inner.borrow_mut().on_encrypt(input) + keyring.inner.lock().unwrap().on_encrypt(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_input.rs index 55ff9c6e2..f82047797 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_input.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct OnEncryptInput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptInput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } } impl OnEncryptInput { /// Creates a new builder-style object to manufacture [`OnEncryptInput`](crate::operation::on_encrypt::builders::OnEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptInputBuilder::default() } } @@ -27,23 +33,39 @@ impl OnEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnEncryptInputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptInputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnEncryptInput`](crate::operation::operation::OnEncryptInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_output.rs index 365ab8839..4482000af 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/_on_encrypt_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct OnEncryptOutput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptOutput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } } impl OnEncryptOutput { /// Creates a new builder-style object to manufacture [`OnEncryptOutput`](crate::operation::on_encrypt::builders::OnEncryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptOutputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptOutputBuilder::default() } } @@ -27,23 +33,39 @@ impl OnEncryptOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnEncryptOutputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptOutputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnEncryptOutput`](crate::operation::operation::OnEncryptOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/builders.rs index 2b2c6f83b..31267ff46 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/on_encrypt/builders.rs @@ -28,14 +28,16 @@ pub struct OnEncryptFluentBuilder { } impl OnEncryptFluentBuilder { /// Creates a new `OnEncrypt`. - pub(crate) fn new(keyring: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) -> Self { + pub(crate) fn new( + keyring: crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + ) -> Self { Self { keyring, inner: ::std::default::Default::default(), } } /// Access the OnEncrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,24 +57,42 @@ impl OnEncryptFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; - crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncrypt::send(&self.keyring, input).await + crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncrypt::send( + &self.keyring, + input, + ) + .await } #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.materials(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_materials(input); - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - self.inner.get_materials() -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.materials(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_materials(input); + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + self.inner.get_materials() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry.rs index 5fd0c7884..9cefaac65 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry.rs @@ -20,7 +20,11 @@ impl PutCacheEntry { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_for_CryptographicMaterialsCache_PutCacheEntry(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_cache.inner.borrow_mut().put_cache_entry(input) + cryptographic_materials_cache + .inner + .lock() + .unwrap() + .put_cache_entry(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_put_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_put_cache_entry_input.rs index 53fa83e8a..f76dc6ba8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_put_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_put_cache_entry_input.rs @@ -6,47 +6,51 @@ #[allow(missing_docs)] pub struct PutCacheEntryInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub creation_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub expiry_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, -#[allow(missing_docs)] -pub messages_used: ::std::option::Option<::std::primitive::i32>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub creation_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub expiry_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub materials: + ::std::option::Option, + #[allow(missing_docs)] + pub messages_used: ::std::option::Option<::std::primitive::i32>, } impl PutCacheEntryInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } } impl PutCacheEntryInput { /// Creates a new builder-style object to manufacture [`PutCacheEntryInput`](crate::operation::put_cache_entry::builders::PutCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::PutCacheEntryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::PutCacheEntryInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::PutCacheEntryInputBuilder::default() } } @@ -58,104 +62,136 @@ impl PutCacheEntryInput { )] pub struct PutCacheEntryInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) materials: ::std::option::Option, -pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, + pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) materials: + ::std::option::Option, + pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, } impl PutCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.creation_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_creation_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.creation_time = input; - self -} -#[allow(missing_docs)] -pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.expiry_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.expiry_time = input; - self -} -#[allow(missing_docs)] -pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.messages_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_messages_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.messages_used = input; - self -} -#[allow(missing_docs)] -pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.creation_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_creation_time( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.creation_time = input; + self + } + #[allow(missing_docs)] + pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.expiry_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.expiry_time = input; + self + } + #[allow(missing_docs)] + pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.messages_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_messages_used( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.messages_used = input; + self + } + #[allow(missing_docs)] + pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } /// Consumes the builder and constructs a [`PutCacheEntryInput`](crate::operation::operation::PutCacheEntryInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput { bytes_used: self.bytes_used, creation_time: self.creation_time, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_unit.rs index 813fbbd8d..83f8d7056 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::put_cache_entry::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::UnitBuilder::default() } } @@ -22,11 +18,8 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, @@ -34,8 +27,8 @@ impl UnitBuilder { crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::Unit, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::Unit { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::Unit {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/builders.rs index bea71c253..43a92fea2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/put_cache_entry/builders.rs @@ -28,14 +28,16 @@ pub struct PutCacheEntryFluentBuilder { } impl PutCacheEntryFluentBuilder { /// Creates a new `PutCacheEntry`. - pub(crate) fn new(cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) -> Self { + pub(crate) fn new( + cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, + ) -> Self { Self { cryptographic_materials_cache, inner: ::std::default::Default::default(), } } /// Access the PutCacheEntry as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::PutCacheEntryInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::builders::PutCacheEntryInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,94 +57,125 @@ impl PutCacheEntryFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntry::send(&self.cryptographic_materials_cache, input).await } #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.bytes_used(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_bytes_used(input); - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_bytes_used() -} -#[allow(missing_docs)] -pub fn creation_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.inner = self.inner.creation_time(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_creation_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.inner = self.inner.set_creation_time(input); - self -} -#[allow(missing_docs)] -pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - self.inner.get_creation_time() -} -#[allow(missing_docs)] -pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.inner = self.inner.expiry_time(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.inner = self.inner.set_expiry_time(input); - self -} -#[allow(missing_docs)] -pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - self.inner.get_expiry_time() -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.identifier(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_identifier(input); - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_identifier() -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.materials(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_materials(input); - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - self.inner.get_materials() -} -#[allow(missing_docs)] -pub fn messages_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.messages_used(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_messages_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_messages_used(input); - self -} -#[allow(missing_docs)] -pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_messages_used() -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.inner = self.inner.bytes_used(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.inner = self.inner.set_bytes_used(input); + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_bytes_used() + } + #[allow(missing_docs)] + pub fn creation_time( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.inner = self.inner.creation_time(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_creation_time( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.inner = self.inner.set_creation_time(input); + self + } + #[allow(missing_docs)] + pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + self.inner.get_creation_time() + } + #[allow(missing_docs)] + pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.inner = self.inner.expiry_time(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.inner = self.inner.set_expiry_time(input); + self + } + #[allow(missing_docs)] + pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + self.inner.get_expiry_time() + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.identifier(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_identifier(input); + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_identifier() + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.inner = self.inner.materials(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.inner = self.inner.set_materials(input); + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option + { + self.inner.get_materials() + } + #[allow(missing_docs)] + pub fn messages_used( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.messages_used(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_messages_used( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_messages_used(input); + self + } + #[allow(missing_docs)] + pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_messages_used() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata.rs index 1c1d2a9d2..269b6d403 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata.rs @@ -20,7 +20,11 @@ impl UpdateUsageMetadata { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_for_CryptographicMaterialsCache_UpdateUsageMetadata(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - cryptographic_materials_cache.inner.borrow_mut().update_usage_metadata(input) + cryptographic_materials_cache + .inner + .lock() + .unwrap() + .update_usage_metadata(input) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_unit.rs index 1f43786d7..02b9958bb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::update_usage_metadata::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UnitBuilder::default() } } @@ -22,11 +18,8 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_update_usage_metadata_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_update_usage_metadata_input.rs index d6bda9485..034824a48 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_update_usage_metadata_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/_update_usage_metadata_input.rs @@ -6,23 +6,23 @@ #[allow(missing_docs)] pub struct UpdateUsageMetadataInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl UpdateUsageMetadataInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl UpdateUsageMetadataInput { /// Creates a new builder-style object to manufacture [`UpdateUsageMetadataInput`](crate::operation::update_usage_metadata::builders::UpdateUsageMetadataInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UpdateUsageMetadataInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UpdateUsageMetadataInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UpdateUsageMetadataInputBuilder::default() } } @@ -34,44 +34,50 @@ impl UpdateUsageMetadataInput { )] pub struct UpdateUsageMetadataInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl UpdateUsageMetadataInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`UpdateUsageMetadataInput`](crate::operation::operation::UpdateUsageMetadataInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput { bytes_used: self.bytes_used, identifier: self.identifier, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/builders.rs index 8e42182a3..b656c0ac0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/update_usage_metadata/builders.rs @@ -28,14 +28,16 @@ pub struct UpdateUsageMetadataFluentBuilder { } impl UpdateUsageMetadataFluentBuilder { /// Creates a new `UpdateUsageMetadata`. - pub(crate) fn new(cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) -> Self { + pub(crate) fn new( + cryptographic_materials_cache: crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, + ) -> Self { Self { cryptographic_materials_cache, inner: ::std::default::Default::default(), } } /// Access the UpdateUsageMetadata as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UpdateUsageMetadataInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::builders::UpdateUsageMetadataInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,44 @@ impl UpdateUsageMetadataFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadata::send(&self.cryptographic_materials_cache, input).await } #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.bytes_used(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_bytes_used(input); - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_bytes_used() -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.identifier(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_identifier(input); - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_identifier() -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.inner = self.inner.bytes_used(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.inner = self.inner.set_bytes_used(input); + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_bytes_used() + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.identifier(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_identifier(input); + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_identifier() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info.rs index 340afc10a..8a1cc968b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info.rs @@ -20,20 +20,20 @@ impl ValidAlgorithmSuiteInfo { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_for_AwsCryptographicMaterialProviders_ValidAlgorithmSuiteInfo(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_algorithm_suite_info::_valid_algorithm_suite_info_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_algorithm_suite_info::_valid_algorithm_suite_info_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ValidAlgorithmSuiteInfo(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_algorithm_suite_info.rs index 4f88cb1bd..8d2306d2d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_algorithm_suite_info.rs @@ -6,65 +6,105 @@ #[allow(missing_docs)] pub struct AlgorithmSuiteInfo { #[allow(missing_docs)] -pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub commitment: ::std::option::Option, -#[allow(missing_docs)] -pub edk_wrapping: ::std::option::Option, -#[allow(missing_docs)] -pub encrypt: ::std::option::Option, -#[allow(missing_docs)] -pub id: ::std::option::Option, -#[allow(missing_docs)] -pub kdf: ::std::option::Option, -#[allow(missing_docs)] -pub message_version: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub signature: ::std::option::Option, -#[allow(missing_docs)] -pub symmetric_signature: ::std::option::Option, + pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + #[allow(missing_docs)] + pub encrypt: + ::std::option::Option, + #[allow(missing_docs)] + pub id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub message_version: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + #[allow(missing_docs)] + pub symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfo { #[allow(missing_docs)] -pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } } impl AlgorithmSuiteInfo { /// Creates a new builder-style object to manufacture [`AlgorithmSuiteInfo`](crate::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfo). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder::default() } } @@ -76,149 +116,265 @@ impl AlgorithmSuiteInfo { )] pub struct AlgorithmSuiteInfoBuilder { pub(crate) binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) commitment: ::std::option::Option, -pub(crate) edk_wrapping: ::std::option::Option, -pub(crate) encrypt: ::std::option::Option, -pub(crate) id: ::std::option::Option, -pub(crate) kdf: ::std::option::Option, -pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, -pub(crate) signature: ::std::option::Option, -pub(crate) symmetric_signature: ::std::option::Option, + pub(crate) commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + pub(crate) encrypt: + ::std::option::Option, + pub(crate) id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, + pub(crate) signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + pub(crate) symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfoBuilder { #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.binary_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.binary_id = input; - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment(mut self, input: ::std::option::Option) -> Self { - self.commitment = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(mut self, input: impl ::std::convert::Into) -> Self { - self.edk_wrapping = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_edk_wrapping(mut self, input: ::std::option::Option) -> Self { - self.edk_wrapping = input; - self -} -#[allow(missing_docs)] -pub fn get_edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(mut self, input: impl ::std::convert::Into) -> Self { - self.encrypt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypt(mut self, input: ::std::option::Option) -> Self { - self.encrypt = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(mut self, input: impl ::std::convert::Into) -> Self { - self.id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_id(mut self, input: ::std::option::Option) -> Self { - self.id = input; - self -} -#[allow(missing_docs)] -pub fn get_id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.kdf = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_kdf(mut self, input: ::std::option::Option) -> Self { - self.kdf = input; - self -} -#[allow(missing_docs)] -pub fn get_kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.message_version = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.message_version = input; - self -} -#[allow(missing_docs)] -pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(mut self, input: impl ::std::convert::Into) -> Self { - self.symmetric_signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signature(mut self, input: ::std::option::Option) -> Self { - self.symmetric_signature = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.binary_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.binary_id = input; + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_edk_wrapping( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = input; + self + } + #[allow(missing_docs)] + pub fn get_edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypt( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = input; + self + } + #[allow(missing_docs)] + pub fn get_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = input; + self + } + #[allow(missing_docs)] + pub fn get_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.message_version = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message_version( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.message_version = input; + self + } + #[allow(missing_docs)] + pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } /// Consumes the builder and constructs a [`AlgorithmSuiteInfo`](crate::operation::operation::AlgorithmSuiteInfo). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo { binary_id: self.binary_id, commitment: self.commitment, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_unit.rs index cc4b0eeab..238f36cbd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::valid_algorithm_suite_info::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/builders.rs index 27e560f12..87f45cdc8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_algorithm_suite_info/builders.rs @@ -28,14 +28,16 @@ pub struct ValidAlgorithmSuiteInfoFluentBuilder { } impl ValidAlgorithmSuiteInfoFluentBuilder { /// Creates a new `ValidAlgorithmSuiteInfo`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ValidAlgorithmSuiteInfo as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::builders::AlgorithmSuiteInfoBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,136 +57,239 @@ impl ValidAlgorithmSuiteInfoFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::ValidAlgorithmSuiteInfo::send(&self.client, input).await } #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.binary_id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_binary_id(input); - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_binary_id() -} -#[allow(missing_docs)] -pub fn commitment(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.commitment(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_commitment(input); - self -} -#[allow(missing_docs)] -pub fn get_commitment(&self) -> &::std::option::Option { - self.inner.get_commitment() -} -#[allow(missing_docs)] -pub fn edk_wrapping(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.edk_wrapping(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_edk_wrapping(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_edk_wrapping(input); - self -} -#[allow(missing_docs)] -pub fn get_edk_wrapping(&self) -> &::std::option::Option { - self.inner.get_edk_wrapping() -} -#[allow(missing_docs)] -pub fn encrypt(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.encrypt(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypt(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_encrypt(input); - self -} -#[allow(missing_docs)] -pub fn get_encrypt(&self) -> &::std::option::Option { - self.inner.get_encrypt() -} -#[allow(missing_docs)] -pub fn id(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.id(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_id(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_id(input); - self -} -#[allow(missing_docs)] -pub fn get_id(&self) -> &::std::option::Option { - self.inner.get_id() -} -#[allow(missing_docs)] -pub fn kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.kdf(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_kdf(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_kdf(input); - self -} -#[allow(missing_docs)] -pub fn get_kdf(&self) -> &::std::option::Option { - self.inner.get_kdf() -} -#[allow(missing_docs)] -pub fn message_version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.message_version(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_message_version(input); - self -} -#[allow(missing_docs)] -pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_message_version() -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.signature(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_signature(input); - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option { - self.inner.get_signature() -} -#[allow(missing_docs)] -pub fn symmetric_signature(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.symmetric_signature(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signature(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_symmetric_signature(input); - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signature(&self) -> &::std::option::Option { - self.inner.get_symmetric_signature() -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.binary_id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_binary_id(input); + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_binary_id() + } + #[allow(missing_docs)] + pub fn commitment( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.inner = self.inner.commitment(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_commitment(input); + self + } + #[allow(missing_docs)] + pub fn get_commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + self.inner.get_commitment() + } + #[allow(missing_docs)] + pub fn edk_wrapping( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.inner = self.inner.edk_wrapping(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_edk_wrapping( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_edk_wrapping(input); + self + } + #[allow(missing_docs)] + pub fn get_edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + self.inner.get_edk_wrapping() + } + #[allow(missing_docs)] + pub fn encrypt( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.inner = self.inner.encrypt(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypt( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.inner = self.inner.set_encrypt(input); + self + } + #[allow(missing_docs)] + pub fn get_encrypt( + &self, + ) -> &::std::option::Option + { + self.inner.get_encrypt() + } + #[allow(missing_docs)] + pub fn id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.id(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_id(input); + self + } + #[allow(missing_docs)] + pub fn get_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_id() + } + #[allow(missing_docs)] + pub fn kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.inner = self.inner.kdf(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_kdf(input); + self + } + #[allow(missing_docs)] + pub fn get_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + self.inner.get_kdf() + } + #[allow(missing_docs)] + pub fn message_version( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.message_version(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message_version( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_message_version(input); + self + } + #[allow(missing_docs)] + pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_message_version() + } + #[allow(missing_docs)] + pub fn signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.signature(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_signature(input); + self + } + #[allow(missing_docs)] + pub fn get_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + self.inner.get_signature() + } + #[allow(missing_docs)] + pub fn symmetric_signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.symmetric_signature(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_symmetric_signature(input); + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + self.inner.get_symmetric_signature() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition.rs index 8e538e1c5..fd1b513e9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition.rs @@ -20,20 +20,20 @@ impl ValidDecryptionMaterialsTransition { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidDecryptionMaterialsTransition(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_decryption_materials_transition::_valid_decryption_materials_transition_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).ValidDecryptionMaterialsTransition(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_decryption_materials_transition::_valid_decryption_materials_transition_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .ValidDecryptionMaterialsTransition(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_unit.rs index bde19e7e2..2a808b3d5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::valid_decryption_materials_transition::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs index a40ae9f71..cdfc7c93d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/_valid_decryption_materials_transition_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidDecryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub start: ::std::option::Option, -#[allow(missing_docs)] -pub stop: ::std::option::Option, + pub start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + #[allow(missing_docs)] + pub stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl ValidDecryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub fn start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.stop + } } impl ValidDecryptionMaterialsTransitionInput { /// Creates a new builder-style object to manufacture [`ValidDecryptionMaterialsTransitionInput`](crate::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidDecryptionMaterialsTransitionInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidDecryptionMaterialsTransitionInputBuilder { - pub(crate) start: ::std::option::Option, -pub(crate) stop: ::std::option::Option, + pub(crate) start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + pub(crate) stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl ValidDecryptionMaterialsTransitionInputBuilder { #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.start = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.start = input; - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.stop = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.stop = input; - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.start = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.start = input; + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.stop = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.stop = input; + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.stop + } /// Consumes the builder and constructs a [`ValidDecryptionMaterialsTransitionInput`](crate::operation::operation::ValidDecryptionMaterialsTransitionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput { start: self.start, stop: self.stop, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/builders.rs index 880c5a4b7..26d5a7e21 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_decryption_materials_transition/builders.rs @@ -28,14 +28,16 @@ pub struct ValidDecryptionMaterialsTransitionFluentBuilder { } impl ValidDecryptionMaterialsTransitionFluentBuilder { /// Creates a new `ValidDecryptionMaterialsTransition`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ValidDecryptionMaterialsTransition as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::builders::ValidDecryptionMaterialsTransitionInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,66 @@ impl ValidDecryptionMaterialsTransitionFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransition::send(&self.client, input).await } #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.start(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_start(input); - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - self.inner.get_start() -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.stop(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_stop(input); - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - self.inner.get_stop() -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.start(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_start(input); + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + self.inner.get_start() + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.stop(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_stop(input); + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + self.inner.get_stop() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition.rs index ef480966a..5a54437a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition.rs @@ -20,20 +20,20 @@ impl ValidEncryptionMaterialsTransition { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidEncryptionMaterialsTransition(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_encryption_materials_transition::_valid_encryption_materials_transition_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).ValidEncryptionMaterialsTransition(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::valid_encryption_materials_transition::_valid_encryption_materials_transition_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .ValidEncryptionMaterialsTransition(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_unit.rs index 7d0106342..ba1eb4356 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::valid_encryption_materials_transition::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs index fdb2768fc..034b596d7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/_valid_encryption_materials_transition_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidEncryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub start: ::std::option::Option, -#[allow(missing_docs)] -pub stop: ::std::option::Option, + pub start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + #[allow(missing_docs)] + pub stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl ValidEncryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub fn start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.stop + } } impl ValidEncryptionMaterialsTransitionInput { /// Creates a new builder-style object to manufacture [`ValidEncryptionMaterialsTransitionInput`](crate::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidEncryptionMaterialsTransitionInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidEncryptionMaterialsTransitionInputBuilder { - pub(crate) start: ::std::option::Option, -pub(crate) stop: ::std::option::Option, + pub(crate) start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + pub(crate) stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl ValidEncryptionMaterialsTransitionInputBuilder { #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.start = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.start = input; - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.stop = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.stop = input; - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.start = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.start = input; + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.stop = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.stop = input; + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.stop + } /// Consumes the builder and constructs a [`ValidEncryptionMaterialsTransitionInput`](crate::operation::operation::ValidEncryptionMaterialsTransitionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput { start: self.start, stop: self.stop, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/builders.rs index 836bb96da..15e5a8857 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/valid_encryption_materials_transition/builders.rs @@ -28,14 +28,16 @@ pub struct ValidEncryptionMaterialsTransitionFluentBuilder { } impl ValidEncryptionMaterialsTransitionFluentBuilder { /// Creates a new `ValidEncryptionMaterialsTransition`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ValidEncryptionMaterialsTransition as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::builders::ValidEncryptionMaterialsTransitionInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,66 @@ impl ValidEncryptionMaterialsTransitionFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransition::send(&self.client, input).await } #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.start(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_start(input); - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - self.inner.get_start() -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.stop(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_stop(input); - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - self.inner.get_stop() -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.start(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_start(input); + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + self.inner.get_start() + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.stop(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.inner = self.inner.set_stop(input); + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + self.inner.get_stop() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt.rs index e1214fc9f..ed354230c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt.rs @@ -20,20 +20,20 @@ impl ValidateCommitmentPolicyOnDecrypt { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnDecrypt(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::validate_commitment_policy_on_decrypt::_validate_commitment_policy_on_decrypt_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).ValidateCommitmentPolicyOnDecrypt(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::validate_commitment_policy_on_decrypt::_validate_commitment_policy_on_decrypt_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .ValidateCommitmentPolicyOnDecrypt(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_unit.rs index 877845ee7..c7078d007 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::validate_commitment_policy_on_decrypt::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs index 9197a8f79..3c248a734 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/_validate_commitment_policy_on_decrypt_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidateCommitmentPolicyOnDecryptInput { #[allow(missing_docs)] -pub algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, + pub algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnDecryptInput { #[allow(missing_docs)] -pub fn algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } } impl ValidateCommitmentPolicyOnDecryptInput { /// Creates a new builder-style object to manufacture [`ValidateCommitmentPolicyOnDecryptInput`](crate::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidateCommitmentPolicyOnDecryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidateCommitmentPolicyOnDecryptInputBuilder { - pub(crate) algorithm: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, + pub(crate) algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnDecryptInputBuilder { #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } /// Consumes the builder and constructs a [`ValidateCommitmentPolicyOnDecryptInput`](crate::operation::operation::ValidateCommitmentPolicyOnDecryptInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput { algorithm: self.algorithm, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/builders.rs index c769df07f..90c8bc76e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_decrypt/builders.rs @@ -28,14 +28,16 @@ pub struct ValidateCommitmentPolicyOnDecryptFluentBuilder { } impl ValidateCommitmentPolicyOnDecryptFluentBuilder { /// Creates a new `ValidateCommitmentPolicyOnDecrypt`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ValidateCommitmentPolicyOnDecrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::builders::ValidateCommitmentPolicyOnDecryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,66 @@ impl ValidateCommitmentPolicyOnDecryptFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecrypt::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - self.inner.get_algorithm() -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.commitment_policy(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_commitment_policy(input); - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - self.inner.get_commitment_policy() -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm() + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.commitment_policy(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.set_commitment_policy(input); + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + self.inner.get_commitment_policy() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt.rs index f96d93c81..573b980ce 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt.rs @@ -20,20 +20,20 @@ impl ValidateCommitmentPolicyOnEncrypt { > { crate::deps::aws_cryptography_materialProviders::validation::validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnEncrypt(&input) .map_err(crate::deps::aws_cryptography_materialProviders::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::validate_commitment_policy_on_encrypt::_validate_commitment_policy_on_encrypt_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).ValidateCommitmentPolicyOnEncrypt(&inner_input); + let inner_input = crate::deps::aws_cryptography_materialProviders::conversions::validate_commitment_policy_on_encrypt::_validate_commitment_policy_on_encrypt_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .ValidateCommitmentPolicyOnEncrypt(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - (), - ) + Ok(()) } else { - Err(crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_materialProviders::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_unit.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_unit.rs index ebb40c887..48fcc4200 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_unit.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_unit.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Unit { - -} -impl Unit { - -} +pub struct Unit {} +impl Unit {} impl Unit { /// Creates a new builder-style object to manufacture [`Unit`](crate::operation::validate_commitment_policy_on_encrypt::builders::Unit). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::UnitBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::UnitBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::UnitBuilder::default() } } @@ -22,18 +18,15 @@ impl Unit { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct UnitBuilder { - -} +pub struct UnitBuilder {} impl UnitBuilder { - /// Consumes the builder and constructs a [`Unit`](crate::operation::operation::Unit). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::Unit, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::Unit { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs index 912f35303..8af78cac1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/_validate_commitment_policy_on_encrypt_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidateCommitmentPolicyOnEncryptInput { #[allow(missing_docs)] -pub algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, + pub algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnEncryptInput { #[allow(missing_docs)] -pub fn algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } } impl ValidateCommitmentPolicyOnEncryptInput { /// Creates a new builder-style object to manufacture [`ValidateCommitmentPolicyOnEncryptInput`](crate::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidateCommitmentPolicyOnEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidateCommitmentPolicyOnEncryptInputBuilder { - pub(crate) algorithm: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, + pub(crate) algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnEncryptInputBuilder { #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } /// Consumes the builder and constructs a [`ValidateCommitmentPolicyOnEncryptInput`](crate::operation::operation::ValidateCommitmentPolicyOnEncryptInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput { algorithm: self.algorithm, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/builders.rs index 2f6b38448..e7ed2a57d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/operation/validate_commitment_policy_on_encrypt/builders.rs @@ -28,14 +28,16 @@ pub struct ValidateCommitmentPolicyOnEncryptFluentBuilder { } impl ValidateCommitmentPolicyOnEncryptFluentBuilder { /// Creates a new `ValidateCommitmentPolicyOnEncrypt`. - pub(crate) fn new(client: crate::deps::aws_cryptography_materialProviders::client::Client) -> Self { + pub(crate) fn new( + client: crate::deps::aws_cryptography_materialProviders::client::Client, + ) -> Self { Self { client, inner: ::std::default::Default::default(), } } /// Access the ValidateCommitmentPolicyOnEncrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::builders::ValidateCommitmentPolicyOnEncryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -55,38 +57,66 @@ impl ValidateCommitmentPolicyOnEncryptFluentBuilder { .map_err(|mut e| { let msg = format!("{:?}", e); crate::deps::aws_cryptography_materialProviders::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), objMessage: msg }})?; crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncrypt::send(&self.client, input).await } #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - self.inner.get_algorithm() -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.commitment_policy(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_commitment_policy(input); - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - self.inner.get_commitment_policy() -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.inner = self.inner.set_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + self.inner.get_algorithm() + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.commitment_policy(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.inner = self.inner.set_commitment_policy(input); + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + self.inner.get_commitment_policy() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_aes_wrapping_alg.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_aes_wrapping_alg.rs index 052fc5613..b00fd5f93 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_aes_wrapping_alg.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_aes_wrapping_alg.rs @@ -5,16 +5,16 @@ #[allow(missing_docs)] pub enum AesWrappingAlg { AlgAes128GcmIv12Tag16, -AlgAes192GcmIv12Tag16, -AlgAes256GcmIv12Tag16, + AlgAes192GcmIv12Tag16, + AlgAes256GcmIv12Tag16, } impl ::std::fmt::Display for AesWrappingAlg { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { AesWrappingAlg::AlgAes128GcmIv12Tag16 => write!(f, "ALG_AES128_GCM_IV12_TAG16"), -AesWrappingAlg::AlgAes192GcmIv12Tag16 => write!(f, "ALG_AES192_GCM_IV12_TAG16"), -AesWrappingAlg::AlgAes256GcmIv12Tag16 => write!(f, "ALG_AES256_GCM_IV12_TAG16"), + AesWrappingAlg::AlgAes192GcmIv12Tag16 => write!(f, "ALG_AES192_GCM_IV12_TAG16"), + AesWrappingAlg::AlgAes256GcmIv12Tag16 => write!(f, "ALG_AES256_GCM_IV12_TAG16"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_id.rs index 17028a660..ae3c86aa6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_id.rs @@ -6,9 +6,9 @@ #[allow(missing_docs)] pub enum AlgorithmSuiteId { #[allow(missing_docs)] -Esdk(crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId), -#[allow(missing_docs)] -Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId), + Esdk(crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId), + #[allow(missing_docs)] + Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,45 @@ Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId) } impl AlgorithmSuiteId { /// Tries to convert the enum instance into [`Esdk`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId`](crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_esdk(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_esdk( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId`](crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_dbe(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId`](crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_dbe( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`Esdk`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk). -pub fn is_esdk(&self) -> ::std::primitive::bool { - self.as_esdk().is_ok() -} -/// Returns true if this is a [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe). -pub fn is_dbe(&self) -> ::std::primitive::bool { - self.as_dbe().is_ok() -} + pub fn is_esdk(&self) -> ::std::primitive::bool { + self.as_esdk().is_ok() + } + /// Returns true if this is a [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe). + pub fn is_dbe(&self) -> ::std::primitive::bool { + self.as_dbe().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_info.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_info.rs index 892c17c15..faaaab14d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_info.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_algorithm_suite_info.rs @@ -6,65 +6,107 @@ #[allow(missing_docs)] pub struct AlgorithmSuiteInfo { #[allow(missing_docs)] -pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub commitment: ::std::option::Option, -#[allow(missing_docs)] -pub edk_wrapping: ::std::option::Option, -#[allow(missing_docs)] -pub encrypt: ::std::option::Option, -#[allow(missing_docs)] -pub id: ::std::option::Option, -#[allow(missing_docs)] -pub kdf: ::std::option::Option, -#[allow(missing_docs)] -pub message_version: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub signature: ::std::option::Option, -#[allow(missing_docs)] -pub symmetric_signature: ::std::option::Option, + pub binary_id: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + #[allow(missing_docs)] + pub encrypt: + ::std::option::Option, + #[allow(missing_docs)] + pub id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub message_version: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + #[allow(missing_docs)] + pub symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfo { #[allow(missing_docs)] -pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } } impl AlgorithmSuiteInfo { /// Creates a new builder-style object to manufacture [`AlgorithmSuiteInfo`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::AlgorithmSuiteInfoBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::AlgorithmSuiteInfoBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::AlgorithmSuiteInfoBuilder::default() } } @@ -76,142 +118,258 @@ impl AlgorithmSuiteInfo { )] pub struct AlgorithmSuiteInfoBuilder { pub(crate) binary_id: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) commitment: ::std::option::Option, -pub(crate) edk_wrapping: ::std::option::Option, -pub(crate) encrypt: ::std::option::Option, -pub(crate) id: ::std::option::Option, -pub(crate) kdf: ::std::option::Option, -pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, -pub(crate) signature: ::std::option::Option, -pub(crate) symmetric_signature: ::std::option::Option, + pub(crate) commitment: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) edk_wrapping: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + pub(crate) encrypt: + ::std::option::Option, + pub(crate) id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) message_version: ::std::option::Option<::std::primitive::i32>, + pub(crate) signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + pub(crate) symmetric_signature: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, } impl AlgorithmSuiteInfoBuilder { #[allow(missing_docs)] -pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.binary_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.binary_id = input; - self -} -#[allow(missing_docs)] -pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.binary_id -} -#[allow(missing_docs)] -pub fn commitment(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment(mut self, input: ::std::option::Option) -> Self { - self.commitment = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment(&self) -> &::std::option::Option { - &self.commitment -} -#[allow(missing_docs)] -pub fn edk_wrapping(mut self, input: impl ::std::convert::Into) -> Self { - self.edk_wrapping = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_edk_wrapping(mut self, input: ::std::option::Option) -> Self { - self.edk_wrapping = input; - self -} -#[allow(missing_docs)] -pub fn get_edk_wrapping(&self) -> &::std::option::Option { - &self.edk_wrapping -} -#[allow(missing_docs)] -pub fn encrypt(mut self, input: impl ::std::convert::Into) -> Self { - self.encrypt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypt(mut self, input: ::std::option::Option) -> Self { - self.encrypt = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypt(&self) -> &::std::option::Option { - &self.encrypt -} -#[allow(missing_docs)] -pub fn id(mut self, input: impl ::std::convert::Into) -> Self { - self.id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_id(mut self, input: ::std::option::Option) -> Self { - self.id = input; - self -} -#[allow(missing_docs)] -pub fn get_id(&self) -> &::std::option::Option { - &self.id -} -#[allow(missing_docs)] -pub fn kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.kdf = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_kdf(mut self, input: ::std::option::Option) -> Self { - self.kdf = input; - self -} -#[allow(missing_docs)] -pub fn get_kdf(&self) -> &::std::option::Option { - &self.kdf -} -#[allow(missing_docs)] -pub fn message_version(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.message_version = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message_version(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.message_version = input; - self -} -#[allow(missing_docs)] -pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.message_version -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option { - &self.signature -} -#[allow(missing_docs)] -pub fn symmetric_signature(mut self, input: impl ::std::convert::Into) -> Self { - self.symmetric_signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signature(mut self, input: ::std::option::Option) -> Self { - self.symmetric_signature = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signature(&self) -> &::std::option::Option { - &self.symmetric_signature -} + pub fn binary_id(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.binary_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_binary_id(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.binary_id = input; + self + } + #[allow(missing_docs)] + pub fn get_binary_id(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.binary_id + } + #[allow(missing_docs)] + pub fn commitment( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.commitment = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.commitment + } + #[allow(missing_docs)] + pub fn edk_wrapping( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_edk_wrapping( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, + ) -> Self { + self.edk_wrapping = input; + self + } + #[allow(missing_docs)] + pub fn get_edk_wrapping( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + > { + &self.edk_wrapping + } + #[allow(missing_docs)] + pub fn encrypt( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypt( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.encrypt = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypt( + &self, + ) -> &::std::option::Option + { + &self.encrypt + } + #[allow(missing_docs)] + pub fn id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.id = input; + self + } + #[allow(missing_docs)] + pub fn get_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.id + } + #[allow(missing_docs)] + pub fn kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.kdf = input; + self + } + #[allow(missing_docs)] + pub fn get_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.kdf + } + #[allow(missing_docs)] + pub fn message_version( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.message_version = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message_version( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.message_version = input; + self + } + #[allow(missing_docs)] + pub fn get_message_version(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.message_version + } + #[allow(missing_docs)] + pub fn signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, + ) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + > { + &self.signature + } + #[allow(missing_docs)] + pub fn symmetric_signature( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signature( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, + ) -> Self { + self.symmetric_signature = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signature( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + > { + &self.symmetric_signature + } /// Consumes the builder and constructs a [`AlgorithmSuiteInfo`](crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo). pub fn build( self, @@ -219,16 +377,18 @@ pub fn get_symmetric_signature(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo { - binary_id: self.binary_id, -commitment: self.commitment, -edk_wrapping: self.edk_wrapping, -encrypt: self.encrypt, -id: self.id, -kdf: self.kdf, -message_version: self.message_version, -signature: self.signature, -symmetric_signature: self.symmetric_signature, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo { + binary_id: self.binary_id, + commitment: self.commitment, + edk_wrapping: self.edk_wrapping, + encrypt: self.encrypt, + id: self.id, + kdf: self.kdf, + message_version: self.message_version, + signature: self.signature, + symmetric_signature: self.symmetric_signature, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_cache_type.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_cache_type.rs index b1b20ecec..3338c8fe8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_cache_type.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_cache_type.rs @@ -29,83 +29,121 @@ Shared(crate::deps::aws_cryptography_materialProviders::types::cryptographic_mat } impl CacheType { /// Tries to convert the enum instance into [`Default`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Default), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DefaultCache`](crate::deps::aws_cryptography_materialProviders::types::DefaultCache). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_default(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::DefaultCache, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_default( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::DefaultCache, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`No`](crate::deps::aws_cryptography_materialProviders::types::CacheType::No), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::NoCache`](crate::deps::aws_cryptography_materialProviders::types::NoCache). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_no(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::NoCache, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::No(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`No`](crate::deps::aws_cryptography_materialProviders::types::CacheType::No), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::NoCache`](crate::deps::aws_cryptography_materialProviders::types::NoCache). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_no( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::NoCache, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::No(val) = &self { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`SingleThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_single_threaded(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`SingleThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_single_threaded( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`MultiThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_multi_threaded(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`MultiThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_multi_threaded( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`StormTracking`](crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache`](crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_storm_tracking(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`StormTracking`](crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache`](crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_storm_tracking( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Shared`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef`](crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_shared(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Shared`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef`](crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_shared(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, &Self>{ + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`Default`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Default). -pub fn is_default(&self) -> ::std::primitive::bool { - self.as_default().is_ok() -} -/// Returns true if this is a [`No`](crate::deps::aws_cryptography_materialProviders::types::CacheType::No). -pub fn is_no(&self) -> ::std::primitive::bool { - self.as_no().is_ok() -} -/// Returns true if this is a [`SingleThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded). -pub fn is_single_threaded(&self) -> ::std::primitive::bool { - self.as_single_threaded().is_ok() -} -/// Returns true if this is a [`MultiThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded). -pub fn is_multi_threaded(&self) -> ::std::primitive::bool { - self.as_multi_threaded().is_ok() -} -/// Returns true if this is a [`StormTracking`](crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking). -pub fn is_storm_tracking(&self) -> ::std::primitive::bool { - self.as_storm_tracking().is_ok() -} -/// Returns true if this is a [`Shared`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared). -pub fn is_shared(&self) -> ::std::primitive::bool { - self.as_shared().is_ok() -} + pub fn is_default(&self) -> ::std::primitive::bool { + self.as_default().is_ok() + } + /// Returns true if this is a [`No`](crate::deps::aws_cryptography_materialProviders::types::CacheType::No). + pub fn is_no(&self) -> ::std::primitive::bool { + self.as_no().is_ok() + } + /// Returns true if this is a [`SingleThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded). + pub fn is_single_threaded(&self) -> ::std::primitive::bool { + self.as_single_threaded().is_ok() + } + /// Returns true if this is a [`MultiThreaded`](crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded). + pub fn is_multi_threaded(&self) -> ::std::primitive::bool { + self.as_multi_threaded().is_ok() + } + /// Returns true if this is a [`StormTracking`](crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking). + pub fn is_storm_tracking(&self) -> ::std::primitive::bool { + self.as_storm_tracking().is_ok() + } + /// Returns true if this is a [`Shared`](crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared). + pub fn is_shared(&self) -> ::std::primitive::bool { + self.as_shared().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_commitment_policy.rs index 58f2f77a2..a637024ff 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_commitment_policy.rs @@ -6,9 +6,9 @@ #[allow(missing_docs)] pub enum CommitmentPolicy { #[allow(missing_docs)] -Esdk(crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy), -#[allow(missing_docs)] -Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy), + Esdk(crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy), + #[allow(missing_docs)] + Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,45 @@ Dbe(crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy) } impl CommitmentPolicy { /// Tries to convert the enum instance into [`Esdk`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy`](crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_esdk(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_esdk( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy`](crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_dbe(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy`](crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_dbe( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`Esdk`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk). -pub fn is_esdk(&self) -> ::std::primitive::bool { - self.as_esdk().is_ok() -} -/// Returns true if this is a [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe). -pub fn is_dbe(&self) -> ::std::primitive::bool { - self.as_dbe().is_ok() -} + pub fn is_esdk(&self) -> ::std::primitive::bool { + self.as_esdk().is_ok() + } + /// Returns true if this is a [`Dbe`](crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe). + pub fn is_dbe(&self) -> ::std::primitive::bool { + self.as_dbe().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_keyring_input.rs index 727904133..8d75f6e94 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_keyring_input.rs @@ -6,29 +6,37 @@ /// Inputs for for creating a AWS KMS Discovery Keyring. pub struct CreateAwsKmsDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, } impl CreateAwsKmsDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } } impl CreateAwsKmsDiscoveryKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsDiscoveryKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryKeyringInputBuilder::default() } } @@ -39,53 +47,85 @@ impl CreateAwsKmsDiscoveryKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsDiscoveryKeyringInputBuilder { - pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, } impl CreateAwsKmsDiscoveryKeyringInputBuilder { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } /// Consumes the builder and constructs a [`CreateAwsKmsDiscoveryKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_multi_keyring_input.rs index c58cc0f2c..b03cc7a4c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_discovery_multi_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for for creating an AWS KMS Discovery Multi-Keyring. pub struct CreateAwsKmsDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub client_supplier: ::std::option::Option, -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The list of regions this Keyring will creates KMS clients for. -pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The list of regions this Keyring will creates KMS clients for. + pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } } impl CreateAwsKmsDiscoveryMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsDiscoveryMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsDiscoveryMultiKeyringInputBuilder::default() } } @@ -45,75 +57,117 @@ impl CreateAwsKmsDiscoveryMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsDiscoveryMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsDiscoveryMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = ::std::option::Option::Some(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = input; - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = ::std::option::Option::Some(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = input; + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } /// Consumes the builder and constructs a [`CreateAwsKmsDiscoveryMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput { client_supplier: self.client_supplier, discovery_filter: self.discovery_filter, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_ecdh_keyring_input.rs index 567b60402..e7a55a182 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_ecdh_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for creating an AWS KMS ECDH Keyring. pub struct CreateAwsKmsEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub key_agreement_scheme: ::std::option::Option, -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub curve_spec: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, + pub key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub curve_spec: + ::std::option::Option, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, } impl CreateAwsKmsEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } } impl CreateAwsKmsEcdhKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsEcdhKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsEcdhKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsEcdhKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsEcdhKeyringInputBuilder::default() } } @@ -45,68 +57,112 @@ impl CreateAwsKmsEcdhKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsEcdhKeyringInputBuilder { - pub(crate) key_agreement_scheme: ::std::option::Option, -pub(crate) curve_spec: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, + pub(crate) key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + pub(crate) curve_spec: + ::std::option::Option, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, } impl CreateAwsKmsEcdhKeyringInputBuilder { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.key_agreement_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.key_agreement_scheme = input; - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.curve_spec = ::std::option::Option::Some(input.into()); - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.curve_spec = input; - self -} -/// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = input; + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.curve_spec = ::std::option::Option::Some(input.into()); + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.curve_spec = input; + self + } + /// The named curve that corresponds to the curve on which the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } /// Consumes the builder and constructs a [`CreateAwsKmsEcdhKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput). pub fn build( self, @@ -114,11 +170,13 @@ pub fn get_kms_client(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput { - key_agreement_scheme: self.key_agreement_scheme, -curve_spec: self.curve_spec, -grant_tokens: self.grant_tokens, -kms_client: self.kms_client, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput { + key_agreement_scheme: self.key_agreement_scheme, + curve_spec: self.curve_spec, + grant_tokens: self.grant_tokens, + kms_client: self.kms_client, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_hierarchical_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_hierarchical_keyring_input.rs index b87e3888b..1abb8f9ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_hierarchical_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_hierarchical_keyring_input.rs @@ -20,33 +20,38 @@ pub ttl_seconds: ::std::option::Option<::std::primitive::i64>, } impl CreateAwsKmsHierarchicalKeyringInput { /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn cache(&self) -> &::std::option::Option { - &self.cache -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_id -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.ttl_seconds -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.ttl_seconds + } } impl CreateAwsKmsHierarchicalKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsHierarchicalKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsHierarchicalKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsHierarchicalKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsHierarchicalKeyringInputBuilder::default() } } @@ -66,96 +71,129 @@ pub(crate) ttl_seconds: ::std::option::Option<::std::primitive::i64>, } impl CreateAwsKmsHierarchicalKeyringInputBuilder { /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn branch_key_id_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn set_branch_key_id_supplier(mut self, input: ::std::option::Option) -> Self { - self.branch_key_id_supplier = input; - self -} -/// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. -pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option { - &self.branch_key_id_supplier -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.cache = ::std::option::Option::Some(input.into()); - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.cache = input; - self -} -/// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. -pub fn get_cache(&self) -> &::std::option::Option { - &self.cache -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn key_store(mut self, input: impl ::std::convert::Into) -> Self { - self.key_store = ::std::option::Option::Some(input.into()); - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn set_key_store(mut self, input: ::std::option::Option) -> Self { - self.key_store = input; - self -} -/// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. -pub fn get_key_store(&self) -> &::std::option::Option { - &self.key_store -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.partition_id = ::std::option::Option::Some(input.into()); - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.partition_id = input; - self -} -/// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. -pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { - &self.partition_id -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.ttl_seconds = ::std::option::Option::Some(input.into()); - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.ttl_seconds = input; - self -} -/// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. -pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.ttl_seconds -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The identifier for the single Branch Key responsible for wrapping and unwrapping the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn branch_key_id_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.branch_key_id_supplier = ::std::option::Option::Some(input.into()); + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn set_branch_key_id_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.branch_key_id_supplier = input; + self + } + /// A Branch Key Supplier which determines what Branch Key to use to wrap and unwrap the data key. Either a Branch Key ID or Branch Key Supplier must be specified. + pub fn get_branch_key_id_supplier(&self) -> &::std::option::Option{ + &self.branch_key_id_supplier + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Sets the type of cache for this Hierarchical Keyring. By providing an already initialized 'Shared' cache, users can determine the scope of the cache. That is, if the cache is shared across other Cryptographic Material Providers, for instance other Hierarchical Keyrings or Caching Cryptographic Materials Managers (Caching CMMs). If any other type of cache in the CacheType union is provided, the Hierarchical Keyring will initialize a cache of that type, to be used with only this Hierarchical Keyring. If not set, a DefaultCache is initialized to be used with only this Hierarchical Keyring with entryCapacity = 1000. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn key_store( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.key_store = ::std::option::Option::Some(input.into()); + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn set_key_store( + mut self, + input: ::std::option::Option, + ) -> Self { + self.key_store = input; + self + } + /// The Key Store which contains the Branch Key(s) responsible for wrapping and unwrapping data keys. + pub fn get_key_store( + &self, + ) -> &::std::option::Option { + &self.key_store + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn partition_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.partition_id = ::std::option::Option::Some(input.into()); + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn set_partition_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.partition_id = input; + self + } + /// Partition ID to distinguish Cryptographic Material Providers (i.e: Keyrings) writing to a cache. If the Partition ID is the same for two Hierarchical Keyrings (or another Material Provider), they can share the same cache entries in the cache. + pub fn get_partition_id(&self) -> &::std::option::Option<::std::string::String> { + &self.partition_id + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn ttl_seconds(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.ttl_seconds = ::std::option::Option::Some(input.into()); + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn set_ttl_seconds(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.ttl_seconds = input; + self + } + /// How many seconds the Branch Key material is allowed to be reused within the local cache before it is re-retrieved from Amazon DynamoDB and re-authenticated with AWS KMS. + pub fn get_ttl_seconds(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.ttl_seconds + } /// Consumes the builder and constructs a [`CreateAwsKmsHierarchicalKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput { branch_key_id: self.branch_key_id, branch_key_id_supplier: self.branch_key_id_supplier, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_keyring_input.rs index 0db2025a2..e6bb4b2a9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_keyring_input.rs @@ -6,29 +6,31 @@ /// Inputs for for creating a AWS KMS Keyring. pub struct CreateAwsKmsKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub kms_key_id: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } } impl CreateAwsKmsKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsKeyringInputBuilder::default() } } @@ -40,52 +42,68 @@ impl CreateAwsKmsKeyringInput { )] pub struct CreateAwsKmsKeyringInputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsKeyringInputBuilder { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The identifier for the symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. This should not be a AWS KMS Multi-Region Key. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } /// Consumes the builder and constructs a [`CreateAwsKmsKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput). pub fn build( self, @@ -93,10 +111,12 @@ pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput { - grant_tokens: self.grant_tokens, -kms_client: self.kms_client, -kms_key_id: self.kms_key_id, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput { + grant_tokens: self.grant_tokens, + kms_client: self.kms_client, + kms_key_id: self.kms_key_id, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_keyring_input.rs index 99e87368e..7eaa97b7e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_keyring_input.rs @@ -6,35 +6,43 @@ /// Inputs for for creating a AWS KMS MRK Discovery Keyring. pub struct CreateAwsKmsMrkDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The region the input 'kmsClient' is in. -pub region: ::std::option::Option<::std::string::String>, + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The region the input 'kmsClient' is in. + pub region: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkDiscoveryKeyringInput { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The region the input 'kmsClient' is in. -pub fn region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The region the input 'kmsClient' is in. + pub fn region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } } impl CreateAwsKmsMrkDiscoveryKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkDiscoveryKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryKeyringInputBuilder::default() } } @@ -45,75 +53,107 @@ impl CreateAwsKmsMrkDiscoveryKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkDiscoveryKeyringInputBuilder { - pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) region: ::std::option::Option<::std::string::String>, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) region: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkDiscoveryKeyringInputBuilder { /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The region the input 'kmsClient' is in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.region = ::std::option::Option::Some(input.into()); - self -} -/// The region the input 'kmsClient' is in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.region = input; - self -} -/// The region the input 'kmsClient' is in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The region the input 'kmsClient' is in. + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.region = ::std::option::Option::Some(input.into()); + self + } + /// The region the input 'kmsClient' is in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.region = input; + self + } + /// The region the input 'kmsClient' is in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkDiscoveryKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput { discovery_filter: self.discovery_filter, grant_tokens: self.grant_tokens, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_multi_keyring_input.rs index a22dc11cc..f25aeb5c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_discovery_multi_keyring_input.rs @@ -6,35 +6,47 @@ /// Inputs for for creating a AWS KMS MRK Discovery Multi-Keyring. pub struct CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub client_supplier: ::std::option::Option, -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub discovery_filter: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The list of regions this Keyring will creates KMS clients for. -pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The list of regions this Keyring will creates KMS clients for. + pub regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } } impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkDiscoveryMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder::default() } } @@ -45,75 +57,117 @@ impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) discovery_filter: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) discovery_filter: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) regions: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkDiscoveryMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn discovery_filter(mut self, input: impl ::std::convert::Into) -> Self { - self.discovery_filter = ::std::option::Option::Some(input.into()); - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn set_discovery_filter(mut self, input: ::std::option::Option) -> Self { - self.discovery_filter = input; - self -} -/// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. -pub fn get_discovery_filter(&self) -> &::std::option::Option { - &self.discovery_filter -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn regions(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = ::std::option::Option::Some(input.into()); - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn set_regions(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.regions = input; - self -} -/// The list of regions this Keyring will creates KMS clients for. -pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.regions -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. If not specified on input, a Default Client Supplier is created which creates a KMS Client for each region in the 'regions' input. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn discovery_filter( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = ::std::option::Option::Some(input.into()); + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn set_discovery_filter( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, + ) -> Self { + self.discovery_filter = input; + self + } + /// A filter which restricts which KMS Keys this Keyring may attempt to decrypt with by AWS partition and account. + pub fn get_discovery_filter( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + > { + &self.discovery_filter + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn regions( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = ::std::option::Option::Some(input.into()); + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn set_regions( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.regions = input; + self + } + /// The list of regions this Keyring will creates KMS clients for. + pub fn get_regions(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.regions + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkDiscoveryMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput { client_supplier: self.client_supplier, discovery_filter: self.discovery_filter, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_keyring_input.rs index a509149ed..592e5f495 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_keyring_input.rs @@ -6,29 +6,31 @@ /// Inputs for for creating an AWS KMS MRK Keyring. pub struct CreateAwsKmsMrkKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub kms_key_id: ::std::option::Option<::std::string::String>, + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkKeyringInput { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } } impl CreateAwsKmsMrkKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkKeyringInputBuilder::default() } } @@ -40,52 +42,68 @@ impl CreateAwsKmsMrkKeyringInput { )] pub struct CreateAwsKmsMrkKeyringInputBuilder { pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, } impl CreateAwsKmsMrkKeyringInputBuilder { /// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The identifier for the symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput). pub fn build( self, @@ -93,10 +111,12 @@ pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput { - grant_tokens: self.grant_tokens, -kms_client: self.kms_client, -kms_key_id: self.kms_key_id, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput { + grant_tokens: self.grant_tokens, + kms_client: self.kms_client, + kms_key_id: self.kms_key_id, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_multi_keyring_input.rs index 712d714e3..cb0a50012 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_mrk_multi_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for for creating a AWS KMS MRK Multi-Keyring. pub struct CreateAwsKmsMrkMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub client_supplier: ::std::option::Option, -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub generator: ::std::option::Option<::std::string::String>, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub generator: ::std::option::Option<::std::string::String>, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } } impl CreateAwsKmsMrkMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMrkMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMrkMultiKeyringInputBuilder::default() } } @@ -45,68 +51,96 @@ impl CreateAwsKmsMrkMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMrkMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) generator: ::std::option::Option<::std::string::String>, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) generator: ::std::option::Option<::std::string::String>, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMrkMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.generator = input; - self -} -/// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = ::std::option::Option::Some(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = input; - self -} -/// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.generator = input; + self + } + /// A symmetric AWS KMS Key or AWS KMS Multi-Region Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = ::std::option::Option::Some(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = input; + self + } + /// A list of identifiers for the symmetric AWS KMS Keys and/or AWS KMS Multi-Region Keys (other than the generator) responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } /// Consumes the builder and constructs a [`CreateAwsKmsMrkMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_multi_keyring_input.rs index a29eee4af..2d82d24b5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_multi_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for for creating a AWS KMS Multi-Keyring. pub struct CreateAwsKmsMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub client_supplier: ::std::option::Option, -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub generator: ::std::option::Option<::std::string::String>, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub generator: ::std::option::Option<::std::string::String>, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMultiKeyringInput { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } } impl CreateAwsKmsMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsMultiKeyringInputBuilder::default() } } @@ -45,68 +51,96 @@ impl CreateAwsKmsMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsMultiKeyringInputBuilder { - pub(crate) client_supplier: ::std::option::Option, -pub(crate) generator: ::std::option::Option<::std::string::String>, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) client_supplier: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, + pub(crate) generator: ::std::option::Option<::std::string::String>, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_key_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl CreateAwsKmsMultiKeyringInputBuilder { /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn client_supplier(mut self, input: impl ::std::convert::Into) -> Self { - self.client_supplier = ::std::option::Option::Some(input.into()); - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn set_client_supplier(mut self, input: ::std::option::Option) -> Self { - self.client_supplier = input; - self -} -/// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. -pub fn get_client_supplier(&self) -> &::std::option::Option { - &self.client_supplier -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.generator = input; - self -} -/// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. -pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { - &self.generator -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn kms_key_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = ::std::option::Option::Some(input.into()); - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn set_kms_key_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.kms_key_ids = input; - self -} -/// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. -pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.kms_key_ids -} + pub fn client_supplier( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.client_supplier = ::std::option::Option::Some(input.into()); + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn set_client_supplier( + mut self, + input: ::std::option::Option, + ) -> Self { + self.client_supplier = input; + self + } + /// The Client Supplier which will be used to get KMS Clients for use with this Keyring. The Client Supplier will create a client for each region specified in the generator and kmsKeyIds ARNs. If not specified on input, the Default Client Supplier is used. + pub fn get_client_supplier( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + > { + &self.client_supplier + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn generator(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn set_generator(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.generator = input; + self + } + /// A identifier for a symmetric AWS KMS Key responsible for wrapping and unwrapping data keys. KMS.GenerateDataKey may be called with this key if the data key has not already been generated by another Keyring. This should not be a AWS KMS Multi-Region Key. + pub fn get_generator(&self) -> &::std::option::Option<::std::string::String> { + &self.generator + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn kms_key_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = ::std::option::Option::Some(input.into()); + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn set_kms_key_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.kms_key_ids = input; + self + } + /// A list of identifiers for the symmetric AWS KMS Keys (other than the generator) responsible for wrapping and unwrapping data keys. This list should not contain AWS KMS Multi-Region Keys. + pub fn get_kms_key_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.kms_key_ids + } /// Consumes the builder and constructs a [`CreateAwsKmsMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput). pub fn build( self, @@ -114,11 +148,13 @@ pub fn get_kms_key_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::s crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput { - client_supplier: self.client_supplier, -generator: self.generator, -grant_tokens: self.grant_tokens, -kms_key_ids: self.kms_key_ids, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput { + client_supplier: self.client_supplier, + generator: self.generator, + grant_tokens: self.grant_tokens, + kms_key_ids: self.kms_key_ids, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_rsa_keyring_input.rs index 94bca74e3..f3c7810aa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_aws_kms_rsa_keyring_input.rs @@ -6,41 +6,45 @@ /// Inputs for creating a AWS KMS RSA Keyring. pub struct CreateAwsKmsRsaKeyringInput { /// The RSA algorithm used to wrap and unwrap data keys. -pub encryption_algorithm: ::std::option::Option, -/// A list of grant tokens to be used when calling KMS. -pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The KMS Client this Keyring will use to call KMS. -pub kms_client: ::std::option::Option, -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub kms_key_id: ::std::option::Option<::std::string::String>, -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub encryption_algorithm: ::std::option::Option, + /// A list of grant tokens to be used when calling KMS. + pub grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The KMS Client this Keyring will use to call KMS. + pub kms_client: ::std::option::Option, + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub kms_key_id: ::std::option::Option<::std::string::String>, + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateAwsKmsRsaKeyringInput { /// The RSA algorithm used to wrap and unwrap data keys. -pub fn encryption_algorithm(&self) -> &::std::option::Option { - &self.encryption_algorithm -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn encryption_algorithm( + &self, + ) -> &::std::option::Option { + &self.encryption_algorithm + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl CreateAwsKmsRsaKeyringInput { /// Creates a new builder-style object to manufacture [`CreateAwsKmsRsaKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsRsaKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsRsaKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateAwsKmsRsaKeyringInputBuilder::default() } } @@ -51,83 +55,114 @@ impl CreateAwsKmsRsaKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateAwsKmsRsaKeyringInputBuilder { - pub(crate) encryption_algorithm: ::std::option::Option, -pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) kms_client: ::std::option::Option, -pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) encryption_algorithm: + ::std::option::Option, + pub(crate) grant_tokens: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) kms_client: ::std::option::Option, + pub(crate) kms_key_id: ::std::option::Option<::std::string::String>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateAwsKmsRsaKeyringInputBuilder { /// The RSA algorithm used to wrap and unwrap data keys. -pub fn encryption_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.encryption_algorithm = ::std::option::Option::Some(input.into()); - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn set_encryption_algorithm(mut self, input: ::std::option::Option) -> Self { - self.encryption_algorithm = input; - self -} -/// The RSA algorithm used to wrap and unwrap data keys. -pub fn get_encryption_algorithm(&self) -> &::std::option::Option { - &self.encryption_algorithm -} -/// A list of grant tokens to be used when calling KMS. -pub fn grant_tokens(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = ::std::option::Option::Some(input.into()); - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn set_grant_tokens(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.grant_tokens = input; - self -} -/// A list of grant tokens to be used when calling KMS. -pub fn get_grant_tokens(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.grant_tokens -} -/// The KMS Client this Keyring will use to call KMS. -pub fn kms_client(mut self, input: impl ::std::convert::Into) -> Self { - self.kms_client = ::std::option::Option::Some(input.into()); - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn set_kms_client(mut self, input: ::std::option::Option) -> Self { - self.kms_client = input; - self -} -/// The KMS Client this Keyring will use to call KMS. -pub fn get_kms_client(&self) -> &::std::option::Option { - &self.kms_client -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.kms_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.kms_key_id = input; - self -} -/// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. -pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.kms_key_id -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn encryption_algorithm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.encryption_algorithm = ::std::option::Option::Some(input.into()); + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn set_encryption_algorithm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.encryption_algorithm = input; + self + } + /// The RSA algorithm used to wrap and unwrap data keys. + pub fn get_encryption_algorithm( + &self, + ) -> &::std::option::Option { + &self.encryption_algorithm + } + /// A list of grant tokens to be used when calling KMS. + pub fn grant_tokens( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = ::std::option::Option::Some(input.into()); + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn set_grant_tokens( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.grant_tokens = input; + self + } + /// A list of grant tokens to be used when calling KMS. + pub fn get_grant_tokens( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.grant_tokens + } + /// The KMS Client this Keyring will use to call KMS. + pub fn kms_client( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.kms_client = ::std::option::Option::Some(input.into()); + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn set_kms_client( + mut self, + input: ::std::option::Option, + ) -> Self { + self.kms_client = input; + self + } + /// The KMS Client this Keyring will use to call KMS. + pub fn get_kms_client( + &self, + ) -> &::std::option::Option { + &self.kms_client + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn kms_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.kms_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn set_kms_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.kms_key_id = input; + self + } + /// The ARN for the asymmetric AWS KMS Key for RSA responsible for wrapping and unwrapping data keys. + pub fn get_kms_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.kms_key_id + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. This should be the public key as exported from KMS. If not specified, this Keyring cannot be used on encrypt. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`CreateAwsKmsRsaKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput). pub fn build( self, @@ -135,12 +170,14 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput { - encryption_algorithm: self.encryption_algorithm, -grant_tokens: self.grant_tokens, -kms_client: self.kms_client, -kms_key_id: self.kms_key_id, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput { + encryption_algorithm: self.encryption_algorithm, + grant_tokens: self.grant_tokens, + kms_client: self.kms_client, + kms_key_id: self.kms_key_id, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_cryptographic_materials_cache_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_cryptographic_materials_cache_input.rs index 008c3e860..c496f29f5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_cryptographic_materials_cache_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_cryptographic_materials_cache_input.rs @@ -6,17 +6,21 @@ #[allow(missing_docs)] pub struct CreateCryptographicMaterialsCacheInput { /// Which type of local cache to use. -pub cache: ::std::option::Option, + pub cache: + ::std::option::Option, } impl CreateCryptographicMaterialsCacheInput { /// Which type of local cache to use. -pub fn cache(&self) -> &::std::option::Option { - &self.cache -} + pub fn cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } } impl CreateCryptographicMaterialsCacheInput { /// Creates a new builder-style object to manufacture [`CreateCryptographicMaterialsCacheInput`](crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateCryptographicMaterialsCacheInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateCryptographicMaterialsCacheInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateCryptographicMaterialsCacheInputBuilder::default() } } @@ -27,30 +31,44 @@ impl CreateCryptographicMaterialsCacheInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateCryptographicMaterialsCacheInputBuilder { - pub(crate) cache: ::std::option::Option, + pub(crate) cache: + ::std::option::Option, } impl CreateCryptographicMaterialsCacheInputBuilder { /// Which type of local cache to use. -pub fn cache(mut self, input: impl ::std::convert::Into) -> Self { - self.cache = ::std::option::Option::Some(input.into()); - self -} -/// Which type of local cache to use. -pub fn set_cache(mut self, input: ::std::option::Option) -> Self { - self.cache = input; - self -} -/// Which type of local cache to use. -pub fn get_cache(&self) -> &::std::option::Option { - &self.cache -} + pub fn cache( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = ::std::option::Option::Some(input.into()); + self + } + /// Which type of local cache to use. + pub fn set_cache( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, + ) -> Self { + self.cache = input; + self + } + /// Which type of local cache to use. + pub fn get_cache( + &self, + ) -> &::std::option::Option + { + &self.cache + } /// Consumes the builder and constructs a [`CreateCryptographicMaterialsCacheInput`](crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput { cache: self.cache, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_client_supplier_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_client_supplier_input.rs index 24a13380e..a7ac4a7df 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_client_supplier_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_client_supplier_input.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct CreateDefaultClientSupplierInput { - -} -impl CreateDefaultClientSupplierInput { - -} +pub struct CreateDefaultClientSupplierInput {} +impl CreateDefaultClientSupplierInput {} impl CreateDefaultClientSupplierInput { /// Creates a new builder-style object to manufacture [`CreateDefaultClientSupplierInput`](crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultClientSupplierInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultClientSupplierInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultClientSupplierInputBuilder::default() } } @@ -22,11 +18,8 @@ impl CreateDefaultClientSupplierInput { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct CreateDefaultClientSupplierInputBuilder { - -} +pub struct CreateDefaultClientSupplierInputBuilder {} impl CreateDefaultClientSupplierInputBuilder { - /// Consumes the builder and constructs a [`CreateDefaultClientSupplierInput`](crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_cryptographic_materials_manager_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_cryptographic_materials_manager_input.rs index 4945e2ae3..fa11f3fe8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_cryptographic_materials_manager_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_default_cryptographic_materials_manager_input.rs @@ -6,17 +6,23 @@ /// Inputs for creating a Default Cryptographic Materials Manager. pub struct CreateDefaultCryptographicMaterialsManagerInput { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub keyring: ::std::option::Option, + pub keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateDefaultCryptographicMaterialsManagerInput { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } } impl CreateDefaultCryptographicMaterialsManagerInput { /// Creates a new builder-style object to manufacture [`CreateDefaultCryptographicMaterialsManagerInput`](crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateDefaultCryptographicMaterialsManagerInputBuilder::default() } } @@ -27,30 +33,46 @@ impl CreateDefaultCryptographicMaterialsManagerInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateDefaultCryptographicMaterialsManagerInputBuilder { - pub(crate) keyring: ::std::option::Option, + pub(crate) keyring: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateDefaultCryptographicMaterialsManagerInputBuilder { /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn keyring(mut self, input: impl ::std::convert::Into) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that the created Default Cryprographic Materials Manager will use to wrap data keys. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } /// Consumes the builder and constructs a [`CreateDefaultCryptographicMaterialsManagerInput`](crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput { keyring: self.keyring, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_multi_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_multi_keyring_input.rs index 28e44160b..bd7dca443 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_multi_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_multi_keyring_input.rs @@ -6,23 +6,39 @@ /// Inputs for creating a Multi-Keyring. pub struct CreateMultiKeyringInput { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub child_keyrings: ::std::option::Option<::std::vec::Vec>, -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub generator: ::std::option::Option, + pub child_keyrings: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub generator: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateMultiKeyringInput { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn child_keyrings(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.child_keyrings -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn generator(&self) -> &::std::option::Option { - &self.generator -} + pub fn child_keyrings( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + > { + &self.child_keyrings + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn generator( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.generator + } } impl CreateMultiKeyringInput { /// Creates a new builder-style object to manufacture [`CreateMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateMultiKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateMultiKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateMultiKeyringInputBuilder::default() } } @@ -33,38 +49,78 @@ impl CreateMultiKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateMultiKeyringInputBuilder { - pub(crate) child_keyrings: ::std::option::Option<::std::vec::Vec>, -pub(crate) generator: ::std::option::Option, + pub(crate) child_keyrings: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + pub(crate) generator: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, } impl CreateMultiKeyringInputBuilder { /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn child_keyrings(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.child_keyrings = ::std::option::Option::Some(input.into()); - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn set_child_keyrings(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.child_keyrings = input; - self -} -/// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. -pub fn get_child_keyrings(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.child_keyrings -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn generator(mut self, input: impl ::std::convert::Into) -> Self { - self.generator = ::std::option::Option::Some(input.into()); - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn set_generator(mut self, input: ::std::option::Option) -> Self { - self.generator = input; - self -} -/// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. -pub fn get_generator(&self) -> &::std::option::Option { - &self.generator -} + pub fn child_keyrings( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.child_keyrings = ::std::option::Option::Some(input.into()); + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn set_child_keyrings( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, + ) -> Self { + self.child_keyrings = input; + self + } + /// A list of keyrings (other than the generator) responsible for wrapping and unwrapping the data key. + pub fn get_child_keyrings( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + > { + &self.child_keyrings + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn generator( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.generator = ::std::option::Option::Some(input.into()); + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn set_generator( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.generator = input; + self + } + /// A keyring responsible for wrapping and unwrapping the data key. This is the first keyring that will be used to wrap the data key, and may be responsible for additionally generating the data key. + pub fn get_generator( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.generator + } /// Consumes the builder and constructs a [`CreateMultiKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput). pub fn build( self, @@ -72,9 +128,11 @@ pub fn get_generator(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput { - child_keyrings: self.child_keyrings, -generator: self.generator, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput { + child_keyrings: self.child_keyrings, + generator: self.generator, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_aes_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_aes_keyring_input.rs index 790783100..348298a3e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_aes_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_aes_keyring_input.rs @@ -6,35 +6,41 @@ /// Inputs for creating a Raw AES Keyring. pub struct CreateRawAesKeyringInput { /// A name associated with this wrapping key. -pub key_name: ::std::option::Option<::std::string::String>, -/// A namespace associated with this wrapping key. -pub key_namespace: ::std::option::Option<::std::string::String>, -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub wrapping_alg: ::std::option::Option, -/// The AES key used with AES_GCM encryption and decryption. -pub wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub key_name: ::std::option::Option<::std::string::String>, + /// A namespace associated with this wrapping key. + pub key_namespace: ::std::option::Option<::std::string::String>, + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub wrapping_alg: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + /// The AES key used with AES_GCM encryption and decryption. + pub wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawAesKeyringInput { /// A name associated with this wrapping key. -pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn wrapping_alg(&self) -> &::std::option::Option { - &self.wrapping_alg -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.wrapping_key -} + pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn wrapping_alg( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + > { + &self.wrapping_alg + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.wrapping_key + } } impl CreateRawAesKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawAesKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawAesKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawAesKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawAesKeyringInputBuilder::default() } } @@ -46,67 +52,95 @@ impl CreateRawAesKeyringInput { )] pub struct CreateRawAesKeyringInputBuilder { pub(crate) key_name: ::std::option::Option<::std::string::String>, -pub(crate) key_namespace: ::std::option::Option<::std::string::String>, -pub(crate) wrapping_alg: ::std::option::Option, -pub(crate) wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key_namespace: ::std::option::Option<::std::string::String>, + pub(crate) wrapping_alg: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + pub(crate) wrapping_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawAesKeyringInputBuilder { /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_name = ::std::option::Option::Some(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_name = input; - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_namespace = ::std::option::Option::Some(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_namespace = input; - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn wrapping_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.wrapping_alg = ::std::option::Option::Some(input.into()); - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn set_wrapping_alg(mut self, input: ::std::option::Option) -> Self { - self.wrapping_alg = input; - self -} -/// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. -pub fn get_wrapping_alg(&self) -> &::std::option::Option { - &self.wrapping_alg -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn wrapping_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.wrapping_key = ::std::option::Option::Some(input.into()); - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn set_wrapping_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.wrapping_key = input; - self -} -/// The AES key used with AES_GCM encryption and decryption. -pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.wrapping_key -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_name = ::std::option::Option::Some(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_name = input; + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_namespace = ::std::option::Option::Some(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_namespace = input; + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn wrapping_alg( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.wrapping_alg = ::std::option::Option::Some(input.into()); + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn set_wrapping_alg( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, + ) -> Self { + self.wrapping_alg = input; + self + } + /// The AES_GCM algorithm this Keyring uses to wrap and unwrap data keys. + pub fn get_wrapping_alg( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + > { + &self.wrapping_alg + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn wrapping_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.wrapping_key = ::std::option::Option::Some(input.into()); + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn set_wrapping_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.wrapping_key = input; + self + } + /// The AES key used with AES_GCM encryption and decryption. + pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.wrapping_key + } /// Consumes the builder and constructs a [`CreateRawAesKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput). pub fn build( self, @@ -114,11 +148,13 @@ pub fn get_wrapping_key(&self) -> &::std::option::Option<::aws_smithy_types::Blo crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput { - key_name: self.key_name, -key_namespace: self.key_namespace, -wrapping_alg: self.wrapping_alg, -wrapping_key: self.wrapping_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput { + key_name: self.key_name, + key_namespace: self.key_namespace, + wrapping_alg: self.wrapping_alg, + wrapping_key: self.wrapping_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_ecdh_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_ecdh_keyring_input.rs index 638016e03..a60c81b80 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_ecdh_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_ecdh_keyring_input.rs @@ -6,23 +6,33 @@ /// Inputs for creating a raw ECDH Keyring. pub struct CreateRawEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub key_agreement_scheme: ::std::option::Option, -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub curve_spec: ::std::option::Option, + pub key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub curve_spec: + ::std::option::Option, } impl CreateRawEcdhKeyringInput { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} + pub fn key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } } impl CreateRawEcdhKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawEcdhKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawEcdhKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawEcdhKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawEcdhKeyringInputBuilder::default() } } @@ -33,38 +43,66 @@ impl CreateRawEcdhKeyringInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CreateRawEcdhKeyringInputBuilder { - pub(crate) key_agreement_scheme: ::std::option::Option, -pub(crate) curve_spec: ::std::option::Option, + pub(crate) key_agreement_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + pub(crate) curve_spec: + ::std::option::Option, } impl CreateRawEcdhKeyringInputBuilder { /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn key_agreement_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.key_agreement_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn set_key_agreement_scheme(mut self, input: ::std::option::Option) -> Self { - self.key_agreement_scheme = input; - self -} -/// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. -pub fn get_key_agreement_scheme(&self) -> &::std::option::Option { - &self.key_agreement_scheme -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn curve_spec(mut self, input: impl ::std::convert::Into) -> Self { - self.curve_spec = ::std::option::Option::Some(input.into()); - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn set_curve_spec(mut self, input: ::std::option::Option) -> Self { - self.curve_spec = input; - self -} -/// The the curve on which the points for the sender's private and recipient's public key lie. -pub fn get_curve_spec(&self) -> &::std::option::Option { - &self.curve_spec -} + pub fn key_agreement_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn set_key_agreement_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, + ) -> Self { + self.key_agreement_scheme = input; + self + } + /// The Key Agreement Scheme configuration that is responsible for how the shared secret is calculated. + pub fn get_key_agreement_scheme( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + > { + &self.key_agreement_scheme + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn curve_spec( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.curve_spec = ::std::option::Option::Some(input.into()); + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn set_curve_spec( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.curve_spec = input; + self + } + /// The the curve on which the points for the sender's private and recipient's public key lie. + pub fn get_curve_spec( + &self, + ) -> &::std::option::Option + { + &self.curve_spec + } /// Consumes the builder and constructs a [`CreateRawEcdhKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput). pub fn build( self, @@ -72,9 +110,11 @@ pub fn get_curve_spec(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput { - key_agreement_scheme: self.key_agreement_scheme, -curve_spec: self.curve_spec, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput { + key_agreement_scheme: self.key_agreement_scheme, + curve_spec: self.curve_spec, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_rsa_keyring_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_rsa_keyring_input.rs index 95d4da684..025022006 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_rsa_keyring_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_raw_rsa_keyring_input.rs @@ -6,41 +6,46 @@ /// Inputs for creating a Raw RAW Keyring. pub struct CreateRawRsaKeyringInput { /// A name associated with this wrapping key. -pub key_name: ::std::option::Option<::std::string::String>, -/// A namespace associated with this wrapping key. -pub key_namespace: ::std::option::Option<::std::string::String>, -/// The RSA padding scheme to use with this keyring. -pub padding_scheme: ::std::option::Option, -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub key_name: ::std::option::Option<::std::string::String>, + /// A namespace associated with this wrapping key. + pub key_namespace: ::std::option::Option<::std::string::String>, + /// The RSA padding scheme to use with this keyring. + pub padding_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawRsaKeyringInput { /// A name associated with this wrapping key. -pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The RSA padding scheme to use with this keyring. -pub fn padding_scheme(&self) -> &::std::option::Option { - &self.padding_scheme -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The RSA padding scheme to use with this keyring. + pub fn padding_scheme( + &self, + ) -> &::std::option::Option + { + &self.padding_scheme + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl CreateRawRsaKeyringInput { /// Creates a new builder-style object to manufacture [`CreateRawRsaKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawRsaKeyringInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawRsaKeyringInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateRawRsaKeyringInputBuilder::default() } } @@ -52,82 +57,115 @@ impl CreateRawRsaKeyringInput { )] pub struct CreateRawRsaKeyringInputBuilder { pub(crate) key_name: ::std::option::Option<::std::string::String>, -pub(crate) key_namespace: ::std::option::Option<::std::string::String>, -pub(crate) padding_scheme: ::std::option::Option, -pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key_namespace: ::std::option::Option<::std::string::String>, + pub(crate) padding_scheme: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CreateRawRsaKeyringInputBuilder { /// A name associated with this wrapping key. -pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_name = ::std::option::Option::Some(input.into()); - self -} -/// A name associated with this wrapping key. -pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_name = input; - self -} -/// A name associated with this wrapping key. -pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { - &self.key_name -} -/// A namespace associated with this wrapping key. -pub fn key_namespace(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_namespace = ::std::option::Option::Some(input.into()); - self -} -/// A namespace associated with this wrapping key. -pub fn set_key_namespace(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_namespace = input; - self -} -/// A namespace associated with this wrapping key. -pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { - &self.key_namespace -} -/// The RSA padding scheme to use with this keyring. -pub fn padding_scheme(mut self, input: impl ::std::convert::Into) -> Self { - self.padding_scheme = ::std::option::Option::Some(input.into()); - self -} -/// The RSA padding scheme to use with this keyring. -pub fn set_padding_scheme(mut self, input: ::std::option::Option) -> Self { - self.padding_scheme = input; - self -} -/// The RSA padding scheme to use with this keyring. -pub fn get_padding_scheme(&self) -> &::std::option::Option { - &self.padding_scheme -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.private_key = input; - self -} -/// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -/// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn key_name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.key_name = ::std::option::Option::Some(input.into()); + self + } + /// A name associated with this wrapping key. + pub fn set_key_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.key_name = input; + self + } + /// A name associated with this wrapping key. + pub fn get_key_name(&self) -> &::std::option::Option<::std::string::String> { + &self.key_name + } + /// A namespace associated with this wrapping key. + pub fn key_namespace( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_namespace = ::std::option::Option::Some(input.into()); + self + } + /// A namespace associated with this wrapping key. + pub fn set_key_namespace( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_namespace = input; + self + } + /// A namespace associated with this wrapping key. + pub fn get_key_namespace(&self) -> &::std::option::Option<::std::string::String> { + &self.key_namespace + } + /// The RSA padding scheme to use with this keyring. + pub fn padding_scheme( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.padding_scheme = ::std::option::Option::Some(input.into()); + self + } + /// The RSA padding scheme to use with this keyring. + pub fn set_padding_scheme( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, + ) -> Self { + self.padding_scheme = input; + self + } + /// The RSA padding scheme to use with this keyring. + pub fn get_padding_scheme( + &self, + ) -> &::std::option::Option + { + &self.padding_scheme + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = input; + self + } + /// The private RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded PKCS #8 PrivateKeyInfo structure. If not specified, this Keyring cannot be used on decrypt. A public key and/or a private key must be specified. + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + /// The public RSA Key responsible for wrapping data keys, as a UTF8 encoded, PEM encoded X.509 SubjectPublicKeyInfo structure. If not specified, this Keyring cannot be used on encrypt. A public key and/or a private key must be specified. + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`CreateRawRsaKeyringInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput). pub fn build( self, @@ -135,12 +173,14 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput { - key_name: self.key_name, -key_namespace: self.key_namespace, -padding_scheme: self.padding_scheme, -private_key: self.private_key, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput { + key_name: self.key_name, + key_namespace: self.key_namespace, + padding_scheme: self.padding_scheme, + private_key: self.private_key, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_required_encryption_context_cmm_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_required_encryption_context_cmm_input.rs index 62a050fb5..d78d84673 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_required_encryption_context_cmm_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_create_required_encryption_context_cmm_input.rs @@ -14,21 +14,27 @@ pub underlying_cmm: ::std::option::Option &::std::option::Option { - &self.keyring -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn underlying_cmm(&self) -> &::std::option::Option { - &self.underlying_cmm -} + pub fn keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn underlying_cmm(&self) -> &::std::option::Option{ + &self.underlying_cmm + } } impl CreateRequiredEncryptionContextCmmInput { /// Creates a new builder-style object to manufacture [`CreateRequiredEncryptionContextCmmInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRequiredEncryptionContextCmmInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::CreateRequiredEncryptionContextCmmInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::CreateRequiredEncryptionContextCmmInputBuilder::default() } } @@ -45,54 +51,82 @@ pub(crate) underlying_cmm: ::std::option::Option) -> Self { - self.keyring = ::std::option::Option::Some(input.into()); - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn set_keyring(mut self, input: ::std::option::Option) -> Self { - self.keyring = input; - self -} -/// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. -pub fn get_keyring(&self) -> &::std::option::Option { - &self.keyring -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -/// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn underlying_cmm(mut self, input: impl ::std::convert::Into) -> Self { - self.underlying_cmm = ::std::option::Option::Some(input.into()); - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn set_underlying_cmm(mut self, input: ::std::option::Option) -> Self { - self.underlying_cmm = input; - self -} -/// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. -pub fn get_underlying_cmm(&self) -> &::std::option::Option { - &self.underlying_cmm -} + pub fn keyring( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = ::std::option::Option::Some(input.into()); + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn set_keyring( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + ) -> Self { + self.keyring = input; + self + } + /// The Keyring that the created Cryprographic Materials Manager will use to wrap data keys. The created Required Encryption Context CMM will delegate to a Default Cryptographic Materials Manager created with this Keyring. Either a Keyring or an underlying Cryprographic Materials Manager must be specified as input. + pub fn get_keyring( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + > { + &self.keyring + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + /// A list of Encryption Context keys which are required to be supplied during encryption and decryption, and correspond to Encryption Context key-value pairs which are not stored on the resulting message. + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn underlying_cmm( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.underlying_cmm = ::std::option::Option::Some(input.into()); + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn set_underlying_cmm( + mut self, + input: ::std::option::Option, + ) -> Self { + self.underlying_cmm = input; + self + } + /// The Cryprographic Materials Manager that the created Required Encryption Context Cryptographic Materials Manager will delegate to. Either a Keyring or underlying Cryprographic Materials Manager must be specified. + pub fn get_underlying_cmm(&self) -> &::std::option::Option{ + &self.underlying_cmm + } /// Consumes the builder and constructs a [`CreateRequiredEncryptionContextCmmInput`](crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput { keyring: self.keyring, required_encryption_context_keys: self.required_encryption_context_keys, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_algorithm_suite_id.rs index cd0de5629..6834e3550 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_algorithm_suite_id.rs @@ -5,14 +5,22 @@ #[allow(missing_docs)] pub enum DbeAlgorithmSuiteId { AlgAes256GcmHkdfSha512CommitKeySymsigHmacSha384, -AlgAes256GcmHkdfSha512CommitKeyEcdsaP384SymsigHmacSha384, + AlgAes256GcmHkdfSha512CommitKeyEcdsaP384SymsigHmacSha384, } impl ::std::fmt::Display for DbeAlgorithmSuiteId { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeySymsigHmacSha384 => write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384"), -DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeyEcdsaP384SymsigHmacSha384 => write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384"), + DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeySymsigHmacSha384 => write!( + f, + "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384" + ), + DbeAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeyEcdsaP384SymsigHmacSha384 => { + write!( + f, + "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384" + ) + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_commitment_policy.rs index 88de0bd7d..561b1ea4a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_dbe_commitment_policy.rs @@ -10,7 +10,9 @@ pub enum DbeCommitmentPolicy { impl ::std::fmt::Display for DbeCommitmentPolicy { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - DbeCommitmentPolicy::RequireEncryptRequireDecrypt => write!(f, "REQUIRE_ENCRYPT_REQUIRE_DECRYPT"), + DbeCommitmentPolicy::RequireEncryptRequireDecrypt => { + write!(f, "REQUIRE_ENCRYPT_REQUIRE_DECRYPT") + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_input.rs index c21e05816..6ad0463fb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_input.rs @@ -6,41 +6,71 @@ #[allow(missing_docs)] pub struct DecryptMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub reproduced_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub reproduced_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl DecryptMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn reproduced_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.reproduced_encryption_context -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn reproduced_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.reproduced_encryption_context + } } impl DecryptMaterialsInput { /// Creates a new builder-style object to manufacture [`DecryptMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsInputBuilder::default() } } @@ -51,83 +81,167 @@ impl DecryptMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) reproduced_encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) reproduced_encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl DecryptMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn reproduced_encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.reproduced_encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_reproduced_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.reproduced_encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_reproduced_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.reproduced_encryption_context -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn reproduced_encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.reproduced_encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_reproduced_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.reproduced_encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_reproduced_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.reproduced_encryption_context + } /// Consumes the builder and constructs a [`DecryptMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput). pub fn build( self, @@ -135,12 +249,14 @@ pub fn get_reproduced_encryption_context(&self) -> &::std::option::Option<::std: crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput { - algorithm_suite_id: self.algorithm_suite_id, -commitment_policy: self.commitment_policy, -encrypted_data_keys: self.encrypted_data_keys, -encryption_context: self.encryption_context, -reproduced_encryption_context: self.reproduced_encryption_context, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput { + algorithm_suite_id: self.algorithm_suite_id, + commitment_policy: self.commitment_policy, + encrypted_data_keys: self.encrypted_data_keys, + encryption_context: self.encryption_context, + reproduced_encryption_context: self.reproduced_encryption_context, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_output.rs index fa5b8319d..10209acb4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decrypt_materials_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct DecryptMaterialsOutput { #[allow(missing_docs)] -pub decryption_materials: ::std::option::Option, + pub decryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl DecryptMaterialsOutput { #[allow(missing_docs)] -pub fn decryption_materials(&self) -> &::std::option::Option { - &self.decryption_materials -} + pub fn decryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.decryption_materials + } } impl DecryptMaterialsOutput { /// Creates a new builder-style object to manufacture [`DecryptMaterialsOutput`](crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsOutputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::DecryptMaterialsOutputBuilder::default() } } @@ -27,23 +33,39 @@ impl DecryptMaterialsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptMaterialsOutputBuilder { - pub(crate) decryption_materials: ::std::option::Option, + pub(crate) decryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl DecryptMaterialsOutputBuilder { #[allow(missing_docs)] -pub fn decryption_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.decryption_materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_decryption_materials(mut self, input: ::std::option::Option) -> Self { - self.decryption_materials = input; - self -} -#[allow(missing_docs)] -pub fn get_decryption_materials(&self) -> &::std::option::Option { - &self.decryption_materials -} + pub fn decryption_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.decryption_materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_decryption_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.decryption_materials = input; + self + } + #[allow(missing_docs)] + pub fn get_decryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.decryption_materials + } /// Consumes the builder and constructs a [`DecryptMaterialsOutput`](crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput). pub fn build( self, @@ -51,8 +73,10 @@ pub fn get_decryption_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput { - decryption_materials: self.decryption_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput { + decryption_materials: self.decryption_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decryption_materials.rs index a259f204d..61459a92c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_decryption_materials.rs @@ -6,47 +6,64 @@ #[allow(missing_docs)] pub struct DecryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl DecryptionMaterials { /// Creates a new builder-style object to manufacture [`DecryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptionMaterialsBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::DecryptionMaterialsBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::DecryptionMaterialsBuilder::default() } } @@ -57,98 +74,157 @@ impl DecryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) symmetric_signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl DecryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn symmetric_signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.symmetric_signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.symmetric_signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn symmetric_signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.symmetric_signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.symmetric_signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`DecryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials). pub fn build( self, @@ -156,13 +232,15 @@ pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types: crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials { - algorithm_suite: self.algorithm_suite, -encryption_context: self.encryption_context, -plaintext_data_key: self.plaintext_data_key, -required_encryption_context_keys: self.required_encryption_context_keys, -symmetric_signing_key: self.symmetric_signing_key, -verification_key: self.verification_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials { + algorithm_suite: self.algorithm_suite, + encryption_context: self.encryption_context, + plaintext_data_key: self.plaintext_data_key, + required_encryption_context_keys: self.required_encryption_context_keys, + symmetric_signing_key: self.symmetric_signing_key, + verification_key: self.verification_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_default_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_default_cache.rs index 32d840377..8f49d24be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_default_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_default_cache.rs @@ -6,17 +6,18 @@ /// The best choice for most situations. Probably a StormTrackingCache. pub struct DefaultCache { /// Maximum number of entries cached. -pub entry_capacity: ::std::option::Option<::std::primitive::i32>, + pub entry_capacity: ::std::option::Option<::std::primitive::i32>, } impl DefaultCache { /// Maximum number of entries cached. -pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} + pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } } impl DefaultCache { /// Creates a new builder-style object to manufacture [`DefaultCache`](crate::deps::aws_cryptography_materialProviders::types::DefaultCache). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DefaultCacheBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::DefaultCacheBuilder { crate::deps::aws_cryptography_materialProviders::types::builders::DefaultCacheBuilder::default() } } @@ -31,19 +32,25 @@ pub struct DefaultCacheBuilder { } impl DefaultCacheBuilder { /// Maximum number of entries cached. -pub fn entry_capacity(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_capacity = ::std::option::Option::Some(input.into()); - self -} -/// Maximum number of entries cached. -pub fn set_entry_capacity(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_capacity = input; - self -} -/// Maximum number of entries cached. -pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} + pub fn entry_capacity( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = ::std::option::Option::Some(input.into()); + self + } + /// Maximum number of entries cached. + pub fn set_entry_capacity( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = input; + self + } + /// Maximum number of entries cached. + pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } /// Consumes the builder and constructs a [`DefaultCache`](crate::deps::aws_cryptography_materialProviders::types::DefaultCache). pub fn build( self, @@ -51,8 +58,10 @@ pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32 crate::deps::aws_cryptography_materialProviders::types::DefaultCache, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DefaultCache { - entry_capacity: self.entry_capacity, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DefaultCache { + entry_capacity: self.entry_capacity, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_delete_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_delete_cache_entry_input.rs index edd445405..35d9439c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_delete_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_delete_cache_entry_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct DeleteCacheEntryInput { #[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl DeleteCacheEntryInput { #[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl DeleteCacheEntryInput { /// Creates a new builder-style object to manufacture [`DeleteCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DeleteCacheEntryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DeleteCacheEntryInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::DeleteCacheEntryInputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct DeleteCacheEntryInputBuilder { } impl DeleteCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`DeleteCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput { - identifier: self.identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput { + identifier: self.identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_derivation_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_derivation_algorithm.rs index 1e0cab6b4..b26b541b4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_derivation_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_derivation_algorithm.rs @@ -6,11 +6,11 @@ #[allow(missing_docs)] pub enum DerivationAlgorithm { #[allow(missing_docs)] -Hkdf(crate::deps::aws_cryptography_materialProviders::types::Hkdf), -#[allow(missing_docs)] -Identity(crate::deps::aws_cryptography_materialProviders::types::Identity), -#[allow(missing_docs)] -None(crate::deps::aws_cryptography_materialProviders::types::None), + Hkdf(crate::deps::aws_cryptography_materialProviders::types::Hkdf), + #[allow(missing_docs)] + Identity(crate::deps::aws_cryptography_materialProviders::types::Identity), + #[allow(missing_docs)] + None(crate::deps::aws_cryptography_materialProviders::types::None), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -23,44 +23,61 @@ None(crate::deps::aws_cryptography_materialProviders::types::None), } impl DerivationAlgorithm { /// Tries to convert the enum instance into [`Hkdf`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::Hkdf`](crate::deps::aws_cryptography_materialProviders::types::Hkdf). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_hkdf(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::Hkdf, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_hkdf( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::Hkdf, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Identity`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::Identity`](crate::deps::aws_cryptography_materialProviders::types::Identity). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_identity(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::Identity, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity(val) = &self { + /// Tries to convert the enum instance into [`Identity`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::Identity`](crate::deps::aws_cryptography_materialProviders::types::Identity). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_identity( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::Identity, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_none(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) } -} + /// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_none( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } + } /// Returns true if this is a [`Hkdf`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf). -pub fn is_hkdf(&self) -> ::std::primitive::bool { - self.as_hkdf().is_ok() -} -/// Returns true if this is a [`Identity`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity). -pub fn is_identity(&self) -> ::std::primitive::bool { - self.as_identity().is_ok() -} -/// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None). -pub fn is_none(&self) -> ::std::primitive::bool { - self.as_none().is_ok() -} + pub fn is_hkdf(&self) -> ::std::primitive::bool { + self.as_hkdf().is_ok() + } + /// Returns true if this is a [`Identity`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity). + pub fn is_identity(&self) -> ::std::primitive::bool { + self.as_identity().is_ok() + } + /// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None). + pub fn is_none(&self) -> ::std::primitive::bool { + self.as_none().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_direct_key_wrapping.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_direct_key_wrapping.rs index de8b03fe0..71e6c25e2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_direct_key_wrapping.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_direct_key_wrapping.rs @@ -4,15 +4,13 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct DirectKeyWrapping { - -} -impl DirectKeyWrapping { - -} +pub struct DirectKeyWrapping {} +impl DirectKeyWrapping {} impl DirectKeyWrapping { /// Creates a new builder-style object to manufacture [`DirectKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DirectKeyWrappingBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::DirectKeyWrappingBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::DirectKeyWrappingBuilder::default() } } @@ -22,11 +20,8 @@ impl DirectKeyWrapping { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct DirectKeyWrappingBuilder { - -} +pub struct DirectKeyWrappingBuilder {} impl DirectKeyWrappingBuilder { - /// Consumes the builder and constructs a [`DirectKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping). pub fn build( self, @@ -34,8 +29,8 @@ impl DirectKeyWrappingBuilder { crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_discovery_filter.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_discovery_filter.rs index fa9818a73..c5e7b1db4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_discovery_filter.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_discovery_filter.rs @@ -6,23 +6,25 @@ /// A filter which defines what AWS partition and AWS accounts a KMS Key may be in for a Keyring to be allowed to attempt to decrypt it. pub struct DiscoveryFilter { /// A list of allowed AWS account IDs. -pub account_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -/// The AWS partition which is allowed. -pub partition: ::std::option::Option<::std::string::String>, + pub account_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + /// The AWS partition which is allowed. + pub partition: ::std::option::Option<::std::string::String>, } impl DiscoveryFilter { /// A list of allowed AWS account IDs. -pub fn account_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.account_ids -} -/// The AWS partition which is allowed. -pub fn partition(&self) -> &::std::option::Option<::std::string::String> { - &self.partition -} + pub fn account_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.account_ids + } + /// The AWS partition which is allowed. + pub fn partition(&self) -> &::std::option::Option<::std::string::String> { + &self.partition + } } impl DiscoveryFilter { /// Creates a new builder-style object to manufacture [`DiscoveryFilter`](crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::DiscoveryFilterBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::DiscoveryFilterBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::DiscoveryFilterBuilder::default() } } @@ -34,37 +36,45 @@ impl DiscoveryFilter { )] pub struct DiscoveryFilterBuilder { pub(crate) account_ids: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) partition: ::std::option::Option<::std::string::String>, + pub(crate) partition: ::std::option::Option<::std::string::String>, } impl DiscoveryFilterBuilder { /// A list of allowed AWS account IDs. -pub fn account_ids(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.account_ids = ::std::option::Option::Some(input.into()); - self -} -/// A list of allowed AWS account IDs. -pub fn set_account_ids(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.account_ids = input; - self -} -/// A list of allowed AWS account IDs. -pub fn get_account_ids(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.account_ids -} -/// The AWS partition which is allowed. -pub fn partition(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.partition = ::std::option::Option::Some(input.into()); - self -} -/// The AWS partition which is allowed. -pub fn set_partition(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.partition = input; - self -} -/// The AWS partition which is allowed. -pub fn get_partition(&self) -> &::std::option::Option<::std::string::String> { - &self.partition -} + pub fn account_ids( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.account_ids = ::std::option::Option::Some(input.into()); + self + } + /// A list of allowed AWS account IDs. + pub fn set_account_ids( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.account_ids = input; + self + } + /// A list of allowed AWS account IDs. + pub fn get_account_ids( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.account_ids + } + /// The AWS partition which is allowed. + pub fn partition(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.partition = ::std::option::Option::Some(input.into()); + self + } + /// The AWS partition which is allowed. + pub fn set_partition(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.partition = input; + self + } + /// The AWS partition which is allowed. + pub fn get_partition(&self) -> &::std::option::Option<::std::string::String> { + &self.partition + } /// Consumes the builder and constructs a [`DiscoveryFilter`](crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter). pub fn build( self, @@ -72,9 +82,11 @@ pub fn get_partition(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter { - account_ids: self.account_ids, -partition: self.partition, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter { + account_ids: self.account_ids, + partition: self.partition, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ecdsa.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ecdsa.rs index eff4a9e97..8db6973dc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ecdsa.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ecdsa.rs @@ -6,17 +6,24 @@ #[allow(missing_docs)] pub struct Ecdsa { #[allow(missing_docs)] -pub curve: ::std::option::Option, + pub curve: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl Ecdsa { #[allow(missing_docs)] -pub fn curve(&self) -> &::std::option::Option { - &self.curve -} + pub fn curve( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.curve + } } impl Ecdsa { /// Creates a new builder-style object to manufacture [`Ecdsa`](crate::deps::aws_cryptography_materialProviders::types::Ecdsa). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::EcdsaBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::EcdsaBuilder { crate::deps::aws_cryptography_materialProviders::types::builders::EcdsaBuilder::default() } } @@ -27,23 +34,39 @@ impl Ecdsa { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EcdsaBuilder { - pub(crate) curve: ::std::option::Option, + pub(crate) curve: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl EcdsaBuilder { #[allow(missing_docs)] -pub fn curve(mut self, input: impl ::std::convert::Into) -> Self { - self.curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_curve(mut self, input: ::std::option::Option) -> Self { - self.curve = input; - self -} -#[allow(missing_docs)] -pub fn get_curve(&self) -> &::std::option::Option { - &self.curve -} + pub fn curve( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.curve = input; + self + } + #[allow(missing_docs)] + pub fn get_curve( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.curve + } /// Consumes the builder and constructs a [`Ecdsa`](crate::deps::aws_cryptography_materialProviders::types::Ecdsa). pub fn build( self, @@ -51,8 +74,8 @@ pub fn get_curve(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::Ecdsa { - curve: self.curve, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::Ecdsa { curve: self.curve }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_edk_wrapping_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_edk_wrapping_algorithm.rs index f8e6ee1dd..e3ea5a55b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_edk_wrapping_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_edk_wrapping_algorithm.rs @@ -6,9 +6,11 @@ #[allow(missing_docs)] pub enum EdkWrappingAlgorithm { #[allow(missing_docs)] -DirectKeyWrapping(crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping), -#[allow(missing_docs)] -IntermediateKeyWrapping(crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping), + DirectKeyWrapping(crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping), + #[allow(missing_docs)] + IntermediateKeyWrapping( + crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, + ), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +23,41 @@ IntermediateKeyWrapping(crate::deps::aws_cryptography_materialProviders::types:: } impl EdkWrappingAlgorithm { /// Tries to convert the enum instance into [`DirectKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_direct_key_wrapping(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_direct_key_wrapping( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_intermediate_key_wrapping(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping(val) = &self { + } + /// Tries to convert the enum instance into [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_intermediate_key_wrapping( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`DirectKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping). -pub fn is_direct_key_wrapping(&self) -> ::std::primitive::bool { - self.as_direct_key_wrapping().is_ok() -} -/// Returns true if this is a [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping). -pub fn is_intermediate_key_wrapping(&self) -> ::std::primitive::bool { - self.as_intermediate_key_wrapping().is_ok() -} + pub fn is_direct_key_wrapping(&self) -> ::std::primitive::bool { + self.as_direct_key_wrapping().is_ok() + } + /// Returns true if this is a [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping). + pub fn is_intermediate_key_wrapping(&self) -> ::std::primitive::bool { + self.as_intermediate_key_wrapping().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypt.rs index 2e3bf6a7b..806160235 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypt.rs @@ -6,7 +6,7 @@ #[allow(missing_docs)] pub enum Encrypt { #[allow(missing_docs)] -AesGcm(crate::deps::aws_cryptography_primitives::types::AesGcm), + AesGcm(crate::deps::aws_cryptography_primitives::types::AesGcm), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -19,18 +19,22 @@ AesGcm(crate::deps::aws_cryptography_primitives::types::AesGcm), } impl Encrypt { /// Tries to convert the enum instance into [`AesGcm`](crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm), extracting the inner [`crate::deps::aws_cryptography_primitives::types::AesGcm`](crate::deps::aws_cryptography_primitives::types::AesGcm). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_aes_gcm(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_primitives::types::AesGcm, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_aes_gcm( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_primitives::types::AesGcm, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(val) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`AesGcm`](crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm). -pub fn is_aes_gcm(&self) -> ::std::primitive::bool { - self.as_aes_gcm().is_ok() -} + pub fn is_aes_gcm(&self) -> ::std::primitive::bool { + self.as_aes_gcm().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypted_data_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypted_data_key.rs index 01cf4089d..8c351527b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypted_data_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encrypted_data_key.rs @@ -6,29 +6,31 @@ #[allow(missing_docs)] pub struct EncryptedDataKey { #[allow(missing_docs)] -pub ciphertext: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub key_provider_id: ::std::option::Option<::std::string::String>, -#[allow(missing_docs)] -pub key_provider_info: ::std::option::Option<::aws_smithy_types::Blob>, + pub ciphertext: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub key_provider_id: ::std::option::Option<::std::string::String>, + #[allow(missing_docs)] + pub key_provider_info: ::std::option::Option<::aws_smithy_types::Blob>, } impl EncryptedDataKey { #[allow(missing_docs)] -pub fn ciphertext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ciphertext -} -#[allow(missing_docs)] -pub fn key_provider_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_id -} -#[allow(missing_docs)] -pub fn key_provider_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key_provider_info -} + pub fn ciphertext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ciphertext + } + #[allow(missing_docs)] + pub fn key_provider_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_id + } + #[allow(missing_docs)] + pub fn key_provider_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key_provider_info + } } impl EncryptedDataKey { /// Creates a new builder-style object to manufacture [`EncryptedDataKey`](crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::EncryptedDataKeyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::EncryptedDataKeyBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::EncryptedDataKeyBuilder::default() } } @@ -40,52 +42,70 @@ impl EncryptedDataKey { )] pub struct EncryptedDataKeyBuilder { pub(crate) ciphertext: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) key_provider_id: ::std::option::Option<::std::string::String>, -pub(crate) key_provider_info: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key_provider_id: ::std::option::Option<::std::string::String>, + pub(crate) key_provider_info: ::std::option::Option<::aws_smithy_types::Blob>, } impl EncryptedDataKeyBuilder { #[allow(missing_docs)] -pub fn ciphertext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ciphertext = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ciphertext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ciphertext = input; - self -} -#[allow(missing_docs)] -pub fn get_ciphertext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ciphertext -} -#[allow(missing_docs)] -pub fn key_provider_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.key_provider_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key_provider_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.key_provider_id = input; - self -} -#[allow(missing_docs)] -pub fn get_key_provider_id(&self) -> &::std::option::Option<::std::string::String> { - &self.key_provider_id -} -#[allow(missing_docs)] -pub fn key_provider_info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key_provider_info = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key_provider_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key_provider_info = input; - self -} -#[allow(missing_docs)] -pub fn get_key_provider_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key_provider_info -} + pub fn ciphertext( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.ciphertext = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ciphertext( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.ciphertext = input; + self + } + #[allow(missing_docs)] + pub fn get_ciphertext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ciphertext + } + #[allow(missing_docs)] + pub fn key_provider_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.key_provider_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key_provider_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.key_provider_id = input; + self + } + #[allow(missing_docs)] + pub fn get_key_provider_id(&self) -> &::std::option::Option<::std::string::String> { + &self.key_provider_id + } + #[allow(missing_docs)] + pub fn key_provider_info( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.key_provider_info = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key_provider_info( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.key_provider_info = input; + self + } + #[allow(missing_docs)] + pub fn get_key_provider_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key_provider_info + } /// Consumes the builder and constructs a [`EncryptedDataKey`](crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey). pub fn build( self, @@ -93,10 +113,12 @@ pub fn get_key_provider_info(&self) -> &::std::option::Option<::aws_smithy_types crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey { - ciphertext: self.ciphertext, -key_provider_id: self.key_provider_id, -key_provider_info: self.key_provider_info, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey { + ciphertext: self.ciphertext, + key_provider_id: self.key_provider_id, + key_provider_info: self.key_provider_info, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encryption_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encryption_materials.rs index 0afffc8e5..1c95173ea 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encryption_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_encryption_materials.rs @@ -6,53 +6,78 @@ #[allow(missing_docs)] pub struct EncryptionMaterials { #[allow(missing_docs)] -pub algorithm_suite: ::std::option::Option, -#[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + #[allow(missing_docs)] + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterials { #[allow(missing_docs)] -pub fn algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } } impl EncryptionMaterials { /// Creates a new builder-style object to manufacture [`EncryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::EncryptionMaterialsBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::EncryptionMaterialsBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::EncryptionMaterialsBuilder::default() } } @@ -63,113 +88,195 @@ impl EncryptionMaterials { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct EncryptionMaterialsBuilder { - pub(crate) algorithm_suite: ::std::option::Option, -pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) symmetric_signing_keys: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + pub(crate) algorithm_suite: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) plaintext_data_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) symmetric_signing_keys: + ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, } impl EncryptionMaterialsBuilder { #[allow(missing_docs)] -pub fn algorithm_suite(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite(&self) -> &::std::option::Option { - &self.algorithm_suite -} -#[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn plaintext_data_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext_data_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext_data_key = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext_data_key -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn symmetric_signing_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_symmetric_signing_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>) -> Self { - self.symmetric_signing_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { - &self.symmetric_signing_keys -} + pub fn algorithm_suite( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, + ) -> Self { + self.algorithm_suite = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + > { + &self.algorithm_suite + } + #[allow(missing_docs)] + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn plaintext_data_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext_data_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.plaintext_data_key = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext_data_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext_data_key + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn symmetric_signing_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_symmetric_signing_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, + ) -> Self { + self.symmetric_signing_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_symmetric_signing_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>> { + &self.symmetric_signing_keys + } /// Consumes the builder and constructs a [`EncryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials). pub fn build( self, @@ -177,14 +284,16 @@ pub fn get_symmetric_signing_keys(&self) -> &::std::option::Option<::std::vec::V crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials { - algorithm_suite: self.algorithm_suite, -encrypted_data_keys: self.encrypted_data_keys, -encryption_context: self.encryption_context, -plaintext_data_key: self.plaintext_data_key, -required_encryption_context_keys: self.required_encryption_context_keys, -signing_key: self.signing_key, -symmetric_signing_keys: self.symmetric_signing_keys, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials { + algorithm_suite: self.algorithm_suite, + encrypted_data_keys: self.encrypted_data_keys, + encryption_context: self.encryption_context, + plaintext_data_key: self.plaintext_data_key, + required_encryption_context_keys: self.required_encryption_context_keys, + signing_key: self.signing_key, + symmetric_signing_keys: self.symmetric_signing_keys, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ephemeral_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ephemeral_private_key_to_static_public_key_input.rs index 381938dfd..d5d44a388 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ephemeral_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_ephemeral_private_key_to_static_public_key_input.rs @@ -6,17 +6,17 @@ /// Inputs for creating a EphemeralPrivateKeyToStaticPublicKey Configuration. pub struct EphemeralPrivateKeyToStaticPublicKeyInput { /// The recipient's public key. MUST be DER encoded. -pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EphemeralPrivateKeyToStaticPublicKeyInput { /// The recipient's public key. MUST be DER encoded. -pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} + pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } } impl EphemeralPrivateKeyToStaticPublicKeyInput { /// Creates a new builder-style object to manufacture [`EphemeralPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::EphemeralPrivateKeyToStaticPublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::EphemeralPrivateKeyToStaticPublicKeyInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::EphemeralPrivateKeyToStaticPublicKeyInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct EphemeralPrivateKeyToStaticPublicKeyInputBuilder { } impl EphemeralPrivateKeyToStaticPublicKeyInputBuilder { /// The recipient's public key. MUST be DER encoded. -pub fn recipient_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = ::std::option::Option::Some(input.into()); - self -} -/// The recipient's public key. MUST be DER encoded. -pub fn set_recipient_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = input; - self -} -/// The recipient's public key. MUST be DER encoded. -pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} + pub fn recipient_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = ::std::option::Option::Some(input.into()); + self + } + /// The recipient's public key. MUST be DER encoded. + pub fn set_recipient_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = input; + self + } + /// The recipient's public key. MUST be DER encoded. + pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } /// Consumes the builder and constructs a [`EphemeralPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput { recipient_public_key: self.recipient_public_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_algorithm_suite_id.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_algorithm_suite_id.rs index 1d452a661..cabc49496 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_algorithm_suite_id.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_algorithm_suite_id.rs @@ -5,32 +5,54 @@ #[allow(missing_docs)] pub enum EsdkAlgorithmSuiteId { AlgAes128GcmIv12Tag16NoKdf, -AlgAes192GcmIv12Tag16NoKdf, -AlgAes256GcmIv12Tag16NoKdf, -AlgAes128GcmIv12Tag16HkdfSha256, -AlgAes192GcmIv12Tag16HkdfSha256, -AlgAes256GcmIv12Tag16HkdfSha256, -AlgAes128GcmIv12Tag16HkdfSha256EcdsaP256, -AlgAes192GcmIv12Tag16HkdfSha384EcdsaP384, -AlgAes256GcmIv12Tag16HkdfSha384EcdsaP384, -AlgAes256GcmHkdfSha512CommitKey, -AlgAes256GcmHkdfSha512CommitKeyEcdsaP384, + AlgAes192GcmIv12Tag16NoKdf, + AlgAes256GcmIv12Tag16NoKdf, + AlgAes128GcmIv12Tag16HkdfSha256, + AlgAes192GcmIv12Tag16HkdfSha256, + AlgAes256GcmIv12Tag16HkdfSha256, + AlgAes128GcmIv12Tag16HkdfSha256EcdsaP256, + AlgAes192GcmIv12Tag16HkdfSha384EcdsaP384, + AlgAes256GcmIv12Tag16HkdfSha384EcdsaP384, + AlgAes256GcmHkdfSha512CommitKey, + AlgAes256GcmHkdfSha512CommitKeyEcdsaP384, } impl ::std::fmt::Display for EsdkAlgorithmSuiteId { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16NoKdf => write!(f, "ALG_AES_128_GCM_IV12_TAG16_NO_KDF"), -EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16NoKdf => write!(f, "ALG_AES_192_GCM_IV12_TAG16_NO_KDF"), -EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16NoKdf => write!(f, "ALG_AES_256_GCM_IV12_TAG16_NO_KDF"), -EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16HkdfSha256 => write!(f, "ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256"), -EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16HkdfSha256 => write!(f, "ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256"), -EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16HkdfSha256 => write!(f, "ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256"), -EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16HkdfSha256EcdsaP256 => write!(f, "ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256"), -EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16HkdfSha384EcdsaP384 => write!(f, "ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384"), -EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16HkdfSha384EcdsaP384 => write!(f, "ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384"), -EsdkAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKey => write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY"), -EsdkAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeyEcdsaP384 => write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384"), + EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16NoKdf => { + write!(f, "ALG_AES_128_GCM_IV12_TAG16_NO_KDF") + } + EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16NoKdf => { + write!(f, "ALG_AES_192_GCM_IV12_TAG16_NO_KDF") + } + EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16NoKdf => { + write!(f, "ALG_AES_256_GCM_IV12_TAG16_NO_KDF") + } + EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16HkdfSha256 => { + write!(f, "ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256") + } + EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16HkdfSha256 => { + write!(f, "ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256") + } + EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16HkdfSha256 => { + write!(f, "ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256") + } + EsdkAlgorithmSuiteId::AlgAes128GcmIv12Tag16HkdfSha256EcdsaP256 => { + write!(f, "ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256") + } + EsdkAlgorithmSuiteId::AlgAes192GcmIv12Tag16HkdfSha384EcdsaP384 => { + write!(f, "ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384") + } + EsdkAlgorithmSuiteId::AlgAes256GcmIv12Tag16HkdfSha384EcdsaP384 => { + write!(f, "ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384") + } + EsdkAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKey => { + write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY") + } + EsdkAlgorithmSuiteId::AlgAes256GcmHkdfSha512CommitKeyEcdsaP384 => { + write!(f, "ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384") + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_commitment_policy.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_commitment_policy.rs index f9b951972..5ecaefbdb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_commitment_policy.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_esdk_commitment_policy.rs @@ -5,16 +5,22 @@ #[allow(missing_docs)] pub enum EsdkCommitmentPolicy { ForbidEncryptAllowDecrypt, -RequireEncryptAllowDecrypt, -RequireEncryptRequireDecrypt, + RequireEncryptAllowDecrypt, + RequireEncryptRequireDecrypt, } impl ::std::fmt::Display for EsdkCommitmentPolicy { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { - EsdkCommitmentPolicy::ForbidEncryptAllowDecrypt => write!(f, "FORBID_ENCRYPT_ALLOW_DECRYPT"), -EsdkCommitmentPolicy::RequireEncryptAllowDecrypt => write!(f, "REQUIRE_ENCRYPT_ALLOW_DECRYPT"), -EsdkCommitmentPolicy::RequireEncryptRequireDecrypt => write!(f, "REQUIRE_ENCRYPT_REQUIRE_DECRYPT"), + EsdkCommitmentPolicy::ForbidEncryptAllowDecrypt => { + write!(f, "FORBID_ENCRYPT_ALLOW_DECRYPT") + } + EsdkCommitmentPolicy::RequireEncryptAllowDecrypt => { + write!(f, "REQUIRE_ENCRYPT_ALLOW_DECRYPT") + } + EsdkCommitmentPolicy::RequireEncryptRequireDecrypt => { + write!(f, "REQUIRE_ENCRYPT_REQUIRE_DECRYPT") + } } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_input.rs index 808a36b94..c5234bbf8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_input.rs @@ -6,17 +6,25 @@ /// Inputs for determining the Branch Key which should be used to wrap or unwrap the data key for this encryption or decryption pub struct GetBranchKeyIdInput { /// The Encryption Context used with this encryption or decryption. -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl GetBranchKeyIdInput { /// The Encryption Context used with this encryption or decryption. -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } } impl GetBranchKeyIdInput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdInput`](crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdInputBuilder::default() } } @@ -27,23 +35,39 @@ impl GetBranchKeyIdInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetBranchKeyIdInputBuilder { - pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, } impl GetBranchKeyIdInputBuilder { /// The Encryption Context used with this encryption or decryption. -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -/// The Encryption Context used with this encryption or decryption. -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + /// The Encryption Context used with this encryption or decryption. + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } /// Consumes the builder and constructs a [`GetBranchKeyIdInput`](crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput). pub fn build( self, @@ -51,8 +75,10 @@ pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collection crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput { - encryption_context: self.encryption_context, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput { + encryption_context: self.encryption_context, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_output.rs index a553ad5ed..cdca8f4a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_branch_key_id_output.rs @@ -6,17 +6,19 @@ /// Outputs for the Branch Key responsible for wrapping or unwrapping the data key in this encryption or decryption. pub struct GetBranchKeyIdOutput { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub branch_key_id: ::std::option::Option<::std::string::String>, + pub branch_key_id: ::std::option::Option<::std::string::String>, } impl GetBranchKeyIdOutput { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } } impl GetBranchKeyIdOutput { /// Creates a new builder-style object to manufacture [`GetBranchKeyIdOutput`](crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdOutputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::GetBranchKeyIdOutputBuilder::default() } } @@ -31,19 +33,25 @@ pub struct GetBranchKeyIdOutputBuilder { } impl GetBranchKeyIdOutputBuilder { /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn branch_key_id(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.branch_key_id = ::std::option::Option::Some(input.into()); - self -} -/// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn set_branch_key_id(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.branch_key_id = input; - self -} -/// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. -pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { - &self.branch_key_id -} + pub fn branch_key_id( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.branch_key_id = ::std::option::Option::Some(input.into()); + self + } + /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. + pub fn set_branch_key_id( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.branch_key_id = input; + self + } + /// The identifier of the Branch Key that should be responsible for wrapping or unwrapping the data key in this encryption or decryption. + pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> { + &self.branch_key_id + } /// Consumes the builder and constructs a [`GetBranchKeyIdOutput`](crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_branch_key_id(&self) -> &::std::option::Option<::std::string::String> crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput { - branch_key_id: self.branch_key_id, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput { + branch_key_id: self.branch_key_id, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_input.rs index 4c41c7c8e..8f743b766 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_input.rs @@ -6,23 +6,25 @@ #[allow(missing_docs)] pub struct GetCacheEntryInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub bytes_used: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetCacheEntryInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl GetCacheEntryInput { /// Creates a new builder-style object to manufacture [`GetCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryInputBuilder::default() } } @@ -34,37 +36,43 @@ impl GetCacheEntryInput { )] pub struct GetCacheEntryInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i64>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`GetCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput). pub fn build( self, @@ -72,9 +80,11 @@ pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput { - bytes_used: self.bytes_used, -identifier: self.identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput { + bytes_used: self.bytes_used, + identifier: self.identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_output.rs index eec078890..5eaf57dad 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_cache_entry_output.rs @@ -6,41 +6,47 @@ #[allow(missing_docs)] pub struct GetCacheEntryOutput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub creation_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub expiry_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, -#[allow(missing_docs)] -pub messages_used: ::std::option::Option<::std::primitive::i32>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub creation_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub expiry_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub materials: + ::std::option::Option, + #[allow(missing_docs)] + pub messages_used: ::std::option::Option<::std::primitive::i32>, } impl GetCacheEntryOutput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } } impl GetCacheEntryOutput { /// Creates a new builder-style object to manufacture [`GetCacheEntryOutput`](crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryOutputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::GetCacheEntryOutputBuilder::default() } } @@ -52,82 +58,108 @@ impl GetCacheEntryOutput { )] pub struct GetCacheEntryOutputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) materials: ::std::option::Option, -pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, + pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) materials: + ::std::option::Option, + pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, } impl GetCacheEntryOutputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.creation_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_creation_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.creation_time = input; - self -} -#[allow(missing_docs)] -pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.expiry_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.expiry_time = input; - self -} -#[allow(missing_docs)] -pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.messages_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_messages_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.messages_used = input; - self -} -#[allow(missing_docs)] -pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.creation_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_creation_time( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.creation_time = input; + self + } + #[allow(missing_docs)] + pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.expiry_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.expiry_time = input; + self + } + #[allow(missing_docs)] + pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.messages_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_messages_used( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.messages_used = input; + self + } + #[allow(missing_docs)] + pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } /// Consumes the builder and constructs a [`GetCacheEntryOutput`](crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput). pub fn build( self, @@ -135,12 +167,14 @@ pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput { - bytes_used: self.bytes_used, -creation_time: self.creation_time, -expiry_time: self.expiry_time, -materials: self.materials, -messages_used: self.messages_used, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput { + bytes_used: self.bytes_used, + creation_time: self.creation_time, + expiry_time: self.expiry_time, + materials: self.materials, + messages_used: self.messages_used, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_client_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_client_input.rs index 83a9f7232..c6722bfbc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_client_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_client_input.rs @@ -6,17 +6,19 @@ /// Inputs for getting a AWS KMS Client. pub struct GetClientInput { /// The region the client should be created in. -pub region: ::std::option::Option<::std::string::String>, + pub region: ::std::option::Option<::std::string::String>, } impl GetClientInput { /// The region the client should be created in. -pub fn region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } } impl GetClientInput { /// Creates a new builder-style object to manufacture [`GetClientInput`](crate::deps::aws_cryptography_materialProviders::types::GetClientInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetClientInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::GetClientInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::GetClientInputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct GetClientInputBuilder { } impl GetClientInputBuilder { /// The region the client should be created in. -pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.region = ::std::option::Option::Some(input.into()); - self -} -/// The region the client should be created in. -pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.region = input; - self -} -/// The region the client should be created in. -pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { - &self.region -} + pub fn region(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { + self.region = ::std::option::Option::Some(input.into()); + self + } + /// The region the client should be created in. + pub fn set_region(mut self, input: ::std::option::Option<::std::string::String>) -> Self { + self.region = input; + self + } + /// The region the client should be created in. + pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { + &self.region + } /// Consumes the builder and constructs a [`GetClientInput`](crate::deps::aws_cryptography_materialProviders::types::GetClientInput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_region(&self) -> &::std::option::Option<::std::string::String> { crate::deps::aws_cryptography_materialProviders::types::GetClientInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetClientInput { - region: self.region, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetClientInput { + region: self.region, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_input.rs index c00f8437f..8e0ef393a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_input.rs @@ -6,41 +6,62 @@ #[allow(missing_docs)] pub struct GetEncryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub max_plaintext_length: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub max_plaintext_length: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl GetEncryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.max_plaintext_length -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.max_plaintext_length + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } } impl GetEncryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`GetEncryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsInputBuilder::default() } } @@ -51,83 +72,146 @@ impl GetEncryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetEncryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) max_plaintext_length: ::std::option::Option<::std::primitive::i64>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) max_plaintext_length: ::std::option::Option<::std::primitive::i64>, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl GetEncryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn max_plaintext_length(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.max_plaintext_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_max_plaintext_length(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.max_plaintext_length = input; - self -} -#[allow(missing_docs)] -pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.max_plaintext_length -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn max_plaintext_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.max_plaintext_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_max_plaintext_length( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.max_plaintext_length = input; + self + } + #[allow(missing_docs)] + pub fn get_max_plaintext_length(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.max_plaintext_length + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } /// Consumes the builder and constructs a [`GetEncryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput). pub fn build( self, @@ -135,12 +219,14 @@ pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::s crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput { - algorithm_suite_id: self.algorithm_suite_id, -commitment_policy: self.commitment_policy, -encryption_context: self.encryption_context, -max_plaintext_length: self.max_plaintext_length, -required_encryption_context_keys: self.required_encryption_context_keys, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput { + algorithm_suite_id: self.algorithm_suite_id, + commitment_policy: self.commitment_policy, + encryption_context: self.encryption_context, + max_plaintext_length: self.max_plaintext_length, + required_encryption_context_keys: self.required_encryption_context_keys, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_output.rs index f6a08e67a..bf6393697 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_get_encryption_materials_output.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct GetEncryptionMaterialsOutput { #[allow(missing_docs)] -pub encryption_materials: ::std::option::Option, + pub encryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl GetEncryptionMaterialsOutput { #[allow(missing_docs)] -pub fn encryption_materials(&self) -> &::std::option::Option { - &self.encryption_materials -} + pub fn encryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.encryption_materials + } } impl GetEncryptionMaterialsOutput { /// Creates a new builder-style object to manufacture [`GetEncryptionMaterialsOutput`](crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsOutputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::GetEncryptionMaterialsOutputBuilder::default() } } @@ -27,23 +33,39 @@ impl GetEncryptionMaterialsOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetEncryptionMaterialsOutputBuilder { - pub(crate) encryption_materials: ::std::option::Option, + pub(crate) encryption_materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl GetEncryptionMaterialsOutputBuilder { #[allow(missing_docs)] -pub fn encryption_materials(mut self, input: impl ::std::convert::Into) -> Self { - self.encryption_materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_materials(mut self, input: ::std::option::Option) -> Self { - self.encryption_materials = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_materials(&self) -> &::std::option::Option { - &self.encryption_materials -} + pub fn encryption_materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.encryption_materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.encryption_materials = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.encryption_materials + } /// Consumes the builder and constructs a [`GetEncryptionMaterialsOutput`](crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput). pub fn build( self, @@ -51,8 +73,10 @@ pub fn get_encryption_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput { - encryption_materials: self.encryption_materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput { + encryption_materials: self.encryption_materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_hkdf.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_hkdf.rs index bef68bd11..0908a8fcc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_hkdf.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_hkdf.rs @@ -6,35 +6,40 @@ #[allow(missing_docs)] pub struct Hkdf { #[allow(missing_docs)] -pub hmac: ::std::option::Option, -#[allow(missing_docs)] -pub input_key_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub output_key_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub salt_length: ::std::option::Option<::std::primitive::i32>, + pub hmac: + ::std::option::Option, + #[allow(missing_docs)] + pub input_key_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub output_key_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub salt_length: ::std::option::Option<::std::primitive::i32>, } impl Hkdf { #[allow(missing_docs)] -pub fn hmac(&self) -> &::std::option::Option { - &self.hmac -} -#[allow(missing_docs)] -pub fn input_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.input_key_length -} -#[allow(missing_docs)] -pub fn output_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.output_key_length -} -#[allow(missing_docs)] -pub fn salt_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.salt_length -} + pub fn hmac( + &self, + ) -> &::std::option::Option + { + &self.hmac + } + #[allow(missing_docs)] + pub fn input_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.input_key_length + } + #[allow(missing_docs)] + pub fn output_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.output_key_length + } + #[allow(missing_docs)] + pub fn salt_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.salt_length + } } impl Hkdf { /// Creates a new builder-style object to manufacture [`Hkdf`](crate::deps::aws_cryptography_materialProviders::types::Hkdf). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::HkdfBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::HkdfBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::HkdfBuilder::default() } } @@ -45,68 +50,94 @@ impl Hkdf { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfBuilder { - pub(crate) hmac: ::std::option::Option, -pub(crate) input_key_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) output_key_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) salt_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) hmac: + ::std::option::Option, + pub(crate) input_key_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) output_key_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) salt_length: ::std::option::Option<::std::primitive::i32>, } impl HkdfBuilder { #[allow(missing_docs)] -pub fn hmac(mut self, input: impl ::std::convert::Into) -> Self { - self.hmac = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_hmac(mut self, input: ::std::option::Option) -> Self { - self.hmac = input; - self -} -#[allow(missing_docs)] -pub fn get_hmac(&self) -> &::std::option::Option { - &self.hmac -} -#[allow(missing_docs)] -pub fn input_key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.input_key_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_input_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.input_key_length = input; - self -} -#[allow(missing_docs)] -pub fn get_input_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.input_key_length -} -#[allow(missing_docs)] -pub fn output_key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.output_key_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_output_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.output_key_length = input; - self -} -#[allow(missing_docs)] -pub fn get_output_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.output_key_length -} -#[allow(missing_docs)] -pub fn salt_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.salt_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.salt_length = input; - self -} -#[allow(missing_docs)] -pub fn get_salt_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.salt_length -} + pub fn hmac( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.hmac = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_hmac( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.hmac = input; + self + } + #[allow(missing_docs)] + pub fn get_hmac( + &self, + ) -> &::std::option::Option + { + &self.hmac + } + #[allow(missing_docs)] + pub fn input_key_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.input_key_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_input_key_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.input_key_length = input; + self + } + #[allow(missing_docs)] + pub fn get_input_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.input_key_length + } + #[allow(missing_docs)] + pub fn output_key_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.output_key_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_output_key_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.output_key_length = input; + self + } + #[allow(missing_docs)] + pub fn get_output_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.output_key_length + } + #[allow(missing_docs)] + pub fn salt_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.salt_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.salt_length = input; + self + } + #[allow(missing_docs)] + pub fn get_salt_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.salt_length + } /// Consumes the builder and constructs a [`Hkdf`](crate::deps::aws_cryptography_materialProviders::types::Hkdf). pub fn build( self, @@ -114,11 +145,13 @@ pub fn get_salt_length(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_materialProviders::types::Hkdf, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::Hkdf { - hmac: self.hmac, -input_key_length: self.input_key_length, -output_key_length: self.output_key_length, -salt_length: self.salt_length, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::Hkdf { + hmac: self.hmac, + input_key_length: self.input_key_length, + output_key_length: self.output_key_length, + salt_length: self.salt_length, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_identity.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_identity.rs index f0651dff7..e5319c5b2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_identity.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_identity.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct Identity { - -} -impl Identity { - -} +pub struct Identity {} +impl Identity {} impl Identity { /// Creates a new builder-style object to manufacture [`Identity`](crate::deps::aws_cryptography_materialProviders::types::Identity). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::IdentityBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::IdentityBuilder { crate::deps::aws_cryptography_materialProviders::types::builders::IdentityBuilder::default() } } @@ -22,11 +19,8 @@ impl Identity { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct IdentityBuilder { - -} +pub struct IdentityBuilder {} impl IdentityBuilder { - /// Consumes the builder and constructs a [`Identity`](crate::deps::aws_cryptography_materialProviders::types::Identity). pub fn build( self, @@ -34,8 +28,8 @@ impl IdentityBuilder { crate::deps::aws_cryptography_materialProviders::types::Identity, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::Identity { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::Identity {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_decryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_decryption_materials_input.rs index db818b29f..d50b9b712 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_decryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_decryption_materials_input.rs @@ -6,29 +6,44 @@ #[allow(missing_docs)] pub struct InitializeDecryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl InitializeDecryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } } impl InitializeDecryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`InitializeDecryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::InitializeDecryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::InitializeDecryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::InitializeDecryptionMaterialsInputBuilder::default() } } @@ -39,53 +54,94 @@ impl InitializeDecryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct InitializeDecryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, } impl InitializeDecryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } /// Consumes the builder and constructs a [`InitializeDecryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_encryption_materials_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_encryption_materials_input.rs index 6d3ca6801..7ac2cf034 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_encryption_materials_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_initialize_encryption_materials_input.rs @@ -6,41 +6,56 @@ #[allow(missing_docs)] pub struct InitializeEncryptionMaterialsInput { #[allow(missing_docs)] -pub algorithm_suite_id: ::std::option::Option, -#[allow(missing_docs)] -pub encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -#[allow(missing_docs)] -pub required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + #[allow(missing_docs)] + pub required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl InitializeEncryptionMaterialsInput { #[allow(missing_docs)] -pub fn algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl InitializeEncryptionMaterialsInput { /// Creates a new builder-style object to manufacture [`InitializeEncryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::InitializeEncryptionMaterialsInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::InitializeEncryptionMaterialsInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::InitializeEncryptionMaterialsInputBuilder::default() } } @@ -51,83 +66,136 @@ impl InitializeEncryptionMaterialsInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct InitializeEncryptionMaterialsInputBuilder { - pub(crate) algorithm_suite_id: ::std::option::Option, -pub(crate) encryption_context: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>, -pub(crate) required_encryption_context_keys: ::std::option::Option<::std::vec::Vec<::std::string::String>>, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) algorithm_suite_id: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) encryption_context: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + pub(crate) required_encryption_context_keys: + ::std::option::Option<::std::vec::Vec<::std::string::String>>, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl InitializeEncryptionMaterialsInputBuilder { #[allow(missing_docs)] -pub fn algorithm_suite_id(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm_suite_id = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm_suite_id(mut self, input: ::std::option::Option) -> Self { - self.algorithm_suite_id = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm_suite_id(&self) -> &::std::option::Option { - &self.algorithm_suite_id -} -#[allow(missing_docs)] -pub fn encryption_context(mut self, input: impl ::std::convert::Into<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encryption_context(mut self, input: ::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) -> Self { - self.encryption_context = input; - self -} -#[allow(missing_docs)] -pub fn get_encryption_context(&self) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>> { - &self.encryption_context -} -#[allow(missing_docs)] -pub fn required_encryption_context_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_required_encryption_context_keys(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self { - self.required_encryption_context_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_required_encryption_context_keys(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { - &self.required_encryption_context_keys -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn algorithm_suite_id( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm_suite_id( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm_suite_id = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm_suite_id( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm_suite_id + } + #[allow(missing_docs)] + pub fn encryption_context( + mut self, + input: impl ::std::convert::Into< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encryption_context( + mut self, + input: ::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, + ) -> Self { + self.encryption_context = input; + self + } + #[allow(missing_docs)] + pub fn get_encryption_context( + &self, + ) -> &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + > { + &self.encryption_context + } + #[allow(missing_docs)] + pub fn required_encryption_context_keys( + mut self, + input: impl ::std::convert::Into<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_required_encryption_context_keys( + mut self, + input: ::std::option::Option<::std::vec::Vec<::std::string::String>>, + ) -> Self { + self.required_encryption_context_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_required_encryption_context_keys( + &self, + ) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> { + &self.required_encryption_context_keys + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`InitializeEncryptionMaterialsInput`](crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_intermediate_key_wrapping.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_intermediate_key_wrapping.rs index d4fd182a3..e9bd45cd8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_intermediate_key_wrapping.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_intermediate_key_wrapping.rs @@ -6,29 +6,45 @@ #[allow(missing_docs)] pub struct IntermediateKeyWrapping { #[allow(missing_docs)] -pub key_encryption_key_kdf: ::std::option::Option, -#[allow(missing_docs)] -pub mac_key_kdf: ::std::option::Option, -#[allow(missing_docs)] -pub pdk_encrypt_algorithm: ::std::option::Option, + pub key_encryption_key_kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub mac_key_kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + #[allow(missing_docs)] + pub pdk_encrypt_algorithm: + ::std::option::Option, } impl IntermediateKeyWrapping { #[allow(missing_docs)] -pub fn key_encryption_key_kdf(&self) -> &::std::option::Option { - &self.key_encryption_key_kdf -} -#[allow(missing_docs)] -pub fn mac_key_kdf(&self) -> &::std::option::Option { - &self.mac_key_kdf -} -#[allow(missing_docs)] -pub fn pdk_encrypt_algorithm(&self) -> &::std::option::Option { - &self.pdk_encrypt_algorithm -} + pub fn key_encryption_key_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.key_encryption_key_kdf + } + #[allow(missing_docs)] + pub fn mac_key_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.mac_key_kdf + } + #[allow(missing_docs)] + pub fn pdk_encrypt_algorithm( + &self, + ) -> &::std::option::Option + { + &self.pdk_encrypt_algorithm + } } impl IntermediateKeyWrapping { /// Creates a new builder-style object to manufacture [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::IntermediateKeyWrappingBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::IntermediateKeyWrappingBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::IntermediateKeyWrappingBuilder::default() } } @@ -39,53 +55,99 @@ impl IntermediateKeyWrapping { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct IntermediateKeyWrappingBuilder { - pub(crate) key_encryption_key_kdf: ::std::option::Option, -pub(crate) mac_key_kdf: ::std::option::Option, -pub(crate) pdk_encrypt_algorithm: ::std::option::Option, + pub(crate) key_encryption_key_kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) mac_key_kdf: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + pub(crate) pdk_encrypt_algorithm: + ::std::option::Option, } impl IntermediateKeyWrappingBuilder { #[allow(missing_docs)] -pub fn key_encryption_key_kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.key_encryption_key_kdf = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key_encryption_key_kdf(mut self, input: ::std::option::Option) -> Self { - self.key_encryption_key_kdf = input; - self -} -#[allow(missing_docs)] -pub fn get_key_encryption_key_kdf(&self) -> &::std::option::Option { - &self.key_encryption_key_kdf -} -#[allow(missing_docs)] -pub fn mac_key_kdf(mut self, input: impl ::std::convert::Into) -> Self { - self.mac_key_kdf = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_mac_key_kdf(mut self, input: ::std::option::Option) -> Self { - self.mac_key_kdf = input; - self -} -#[allow(missing_docs)] -pub fn get_mac_key_kdf(&self) -> &::std::option::Option { - &self.mac_key_kdf -} -#[allow(missing_docs)] -pub fn pdk_encrypt_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.pdk_encrypt_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_pdk_encrypt_algorithm(mut self, input: ::std::option::Option) -> Self { - self.pdk_encrypt_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_pdk_encrypt_algorithm(&self) -> &::std::option::Option { - &self.pdk_encrypt_algorithm -} + pub fn key_encryption_key_kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.key_encryption_key_kdf = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key_encryption_key_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.key_encryption_key_kdf = input; + self + } + #[allow(missing_docs)] + pub fn get_key_encryption_key_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.key_encryption_key_kdf + } + #[allow(missing_docs)] + pub fn mac_key_kdf( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.mac_key_kdf = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_mac_key_kdf( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, + ) -> Self { + self.mac_key_kdf = input; + self + } + #[allow(missing_docs)] + pub fn get_mac_key_kdf( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + > { + &self.mac_key_kdf + } + #[allow(missing_docs)] + pub fn pdk_encrypt_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.pdk_encrypt_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_pdk_encrypt_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Encrypt, + >, + ) -> Self { + self.pdk_encrypt_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_pdk_encrypt_algorithm( + &self, + ) -> &::std::option::Option + { + &self.pdk_encrypt_algorithm + } /// Consumes the builder and constructs a [`IntermediateKeyWrapping`](crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping). pub fn build( self, @@ -93,10 +155,12 @@ pub fn get_pdk_encrypt_algorithm(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping { - key_encryption_key_kdf: self.key_encryption_key_kdf, -mac_key_kdf: self.mac_key_kdf, -pdk_encrypt_algorithm: self.pdk_encrypt_algorithm, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping { + key_encryption_key_kdf: self.key_encryption_key_kdf, + mac_key_kdf: self.mac_key_kdf, + pdk_encrypt_algorithm: self.pdk_encrypt_algorithm, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_key_agreement_scheme.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_key_agreement_scheme.rs index 50edab16c..4c52db014 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_key_agreement_scheme.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_key_agreement_scheme.rs @@ -6,7 +6,9 @@ /// Supported ECDH Key Agreement Schemes. pub enum KeyAgreementScheme { #[allow(missing_docs)] -StaticConfiguration(crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations), + StaticConfiguration( + crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations, + ), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -19,18 +21,23 @@ StaticConfiguration(crate::deps::aws_cryptography_materialProviders::types::Stat } impl KeyAgreementScheme { /// Tries to convert the enum instance into [`StaticConfiguration`](crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_static_configuration(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_static_configuration( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`StaticConfiguration`](crate::deps::aws_cryptography_materialProviders::types::KeyAgreementScheme::StaticConfiguration). -pub fn is_static_configuration(&self) -> ::std::primitive::bool { - self.as_static_configuration().is_ok() -} + pub fn is_static_configuration(&self) -> ::std::primitive::bool { + self.as_static_configuration().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_ecdh_static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_ecdh_static_configurations.rs index 6d28c8d9a..8546772f5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_ecdh_static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_ecdh_static_configurations.rs @@ -6,9 +6,13 @@ /// Allowed configurations when using KmsEcdhStaticConfigurations. pub enum KmsEcdhStaticConfigurations { #[allow(missing_docs)] -KmsPublicKeyDiscovery(crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput), -#[allow(missing_docs)] -KmsPrivateKeyToStaticPublicKey(crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput), + KmsPublicKeyDiscovery( + crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, + ), + #[allow(missing_docs)] + KmsPrivateKeyToStaticPublicKey( + crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, + ), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +25,36 @@ KmsPrivateKeyToStaticPublicKey(crate::deps::aws_cryptography_materialProviders:: } impl KmsEcdhStaticConfigurations { /// Tries to convert the enum instance into [`KmsPublicKeyDiscovery`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_kms_public_key_discovery(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_kms_public_key_discovery( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`KmsPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_kms_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey(val) = &self { + } + /// Tries to convert the enum instance into [`KmsPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_kms_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, &Self>{ + if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`KmsPublicKeyDiscovery`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery). -pub fn is_kms_public_key_discovery(&self) -> ::std::primitive::bool { - self.as_kms_public_key_discovery().is_ok() -} -/// Returns true if this is a [`KmsPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey). -pub fn is_kms_private_key_to_static_public_key(&self) -> ::std::primitive::bool { - self.as_kms_private_key_to_static_public_key().is_ok() -} + pub fn is_kms_public_key_discovery(&self) -> ::std::primitive::bool { + self.as_kms_public_key_discovery().is_ok() + } + /// Returns true if this is a [`KmsPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey). + pub fn is_kms_private_key_to_static_public_key(&self) -> ::std::primitive::bool { + self.as_kms_private_key_to_static_public_key().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_private_key_to_static_public_key_input.rs index bc6b891b6..8508af7fa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_private_key_to_static_public_key_input.rs @@ -6,29 +6,29 @@ /// Inputs for creating a KmsPrivateKeyToStaticPublicKey Configuration. pub struct KmsPrivateKeyToStaticPublicKeyInput { /// Recipient Public Key. This MUST be a raw public ECC key in DER format. -pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -/// AWS KMS Key Identifier belonging to the sender. -pub sender_kms_identifier: ::std::option::Option<::std::string::String>, -/// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. -pub sender_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + /// AWS KMS Key Identifier belonging to the sender. + pub sender_kms_identifier: ::std::option::Option<::std::string::String>, + /// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. + pub sender_public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl KmsPrivateKeyToStaticPublicKeyInput { /// Recipient Public Key. This MUST be a raw public ECC key in DER format. -pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} -/// AWS KMS Key Identifier belonging to the sender. -pub fn sender_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.sender_kms_identifier -} -/// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. -pub fn sender_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.sender_public_key -} + pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } + /// AWS KMS Key Identifier belonging to the sender. + pub fn sender_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.sender_kms_identifier + } + /// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. + pub fn sender_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.sender_public_key + } } impl KmsPrivateKeyToStaticPublicKeyInput { /// Creates a new builder-style object to manufacture [`KmsPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::KmsPrivateKeyToStaticPublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::KmsPrivateKeyToStaticPublicKeyInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::KmsPrivateKeyToStaticPublicKeyInputBuilder::default() } } @@ -40,52 +40,70 @@ impl KmsPrivateKeyToStaticPublicKeyInput { )] pub struct KmsPrivateKeyToStaticPublicKeyInputBuilder { pub(crate) recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) sender_kms_identifier: ::std::option::Option<::std::string::String>, -pub(crate) sender_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) sender_kms_identifier: ::std::option::Option<::std::string::String>, + pub(crate) sender_public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl KmsPrivateKeyToStaticPublicKeyInputBuilder { /// Recipient Public Key. This MUST be a raw public ECC key in DER format. -pub fn recipient_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = ::std::option::Option::Some(input.into()); - self -} -/// Recipient Public Key. This MUST be a raw public ECC key in DER format. -pub fn set_recipient_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = input; - self -} -/// Recipient Public Key. This MUST be a raw public ECC key in DER format. -pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} -/// AWS KMS Key Identifier belonging to the sender. -pub fn sender_kms_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.sender_kms_identifier = ::std::option::Option::Some(input.into()); - self -} -/// AWS KMS Key Identifier belonging to the sender. -pub fn set_sender_kms_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.sender_kms_identifier = input; - self -} -/// AWS KMS Key Identifier belonging to the sender. -pub fn get_sender_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.sender_kms_identifier -} -/// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. -pub fn sender_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.sender_public_key = ::std::option::Option::Some(input.into()); - self -} -/// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. -pub fn set_sender_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.sender_public_key = input; - self -} -/// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. -pub fn get_sender_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.sender_public_key -} + pub fn recipient_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = ::std::option::Option::Some(input.into()); + self + } + /// Recipient Public Key. This MUST be a raw public ECC key in DER format. + pub fn set_recipient_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = input; + self + } + /// Recipient Public Key. This MUST be a raw public ECC key in DER format. + pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } + /// AWS KMS Key Identifier belonging to the sender. + pub fn sender_kms_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.sender_kms_identifier = ::std::option::Option::Some(input.into()); + self + } + /// AWS KMS Key Identifier belonging to the sender. + pub fn set_sender_kms_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.sender_kms_identifier = input; + self + } + /// AWS KMS Key Identifier belonging to the sender. + pub fn get_sender_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.sender_kms_identifier + } + /// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. + pub fn sender_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.sender_public_key = ::std::option::Option::Some(input.into()); + self + } + /// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. + pub fn set_sender_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.sender_public_key = input; + self + } + /// Sender Public Key. This is the raw public ECC key in DER format that belongs to the senderKmsIdentifier. + pub fn get_sender_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.sender_public_key + } /// Consumes the builder and constructs a [`KmsPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_public_key_discovery_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_public_key_discovery_input.rs index cdabc8c70..0b0a199cc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_public_key_discovery_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_kms_public_key_discovery_input.rs @@ -6,17 +6,17 @@ /// Inputs for creating a KmsPublicKeyDiscovery Configuration. This is a DECRYPT ONLY configuration. pub struct KmsPublicKeyDiscoveryInput { /// AWS KMS key identifier belonging to the recipient. -pub recipient_kms_identifier: ::std::option::Option<::std::string::String>, + pub recipient_kms_identifier: ::std::option::Option<::std::string::String>, } impl KmsPublicKeyDiscoveryInput { /// AWS KMS key identifier belonging to the recipient. -pub fn recipient_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.recipient_kms_identifier -} + pub fn recipient_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.recipient_kms_identifier + } } impl KmsPublicKeyDiscoveryInput { /// Creates a new builder-style object to manufacture [`KmsPublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::KmsPublicKeyDiscoveryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::KmsPublicKeyDiscoveryInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::KmsPublicKeyDiscoveryInputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct KmsPublicKeyDiscoveryInputBuilder { } impl KmsPublicKeyDiscoveryInputBuilder { /// AWS KMS key identifier belonging to the recipient. -pub fn recipient_kms_identifier(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self { - self.recipient_kms_identifier = ::std::option::Option::Some(input.into()); - self -} -/// AWS KMS key identifier belonging to the recipient. -pub fn set_recipient_kms_identifier(mut self, input: ::std::option::Option<::std::string::String>) -> Self { - self.recipient_kms_identifier = input; - self -} -/// AWS KMS key identifier belonging to the recipient. -pub fn get_recipient_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { - &self.recipient_kms_identifier -} + pub fn recipient_kms_identifier( + mut self, + input: impl ::std::convert::Into<::std::string::String>, + ) -> Self { + self.recipient_kms_identifier = ::std::option::Option::Some(input.into()); + self + } + /// AWS KMS key identifier belonging to the recipient. + pub fn set_recipient_kms_identifier( + mut self, + input: ::std::option::Option<::std::string::String>, + ) -> Self { + self.recipient_kms_identifier = input; + self + } + /// AWS KMS key identifier belonging to the recipient. + pub fn get_recipient_kms_identifier(&self) -> &::std::option::Option<::std::string::String> { + &self.recipient_kms_identifier + } /// Consumes the builder and constructs a [`KmsPublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_recipient_kms_identifier(&self) -> &::std::option::Option<::std::stri crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput { - recipient_kms_identifier: self.recipient_kms_identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput { + recipient_kms_identifier: self.recipient_kms_identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_materials.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_materials.rs index 3153f54be..ed576e5ef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_materials.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_materials.rs @@ -6,13 +6,13 @@ #[allow(missing_docs)] pub enum Materials { #[allow(missing_docs)] -Encryption(crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials), -#[allow(missing_docs)] -Decryption(crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials), -#[allow(missing_docs)] -BranchKey(crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials), -#[allow(missing_docs)] -BeaconKey(crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials), + Encryption(crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials), + #[allow(missing_docs)] + Decryption(crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials), + #[allow(missing_docs)] + BranchKey(crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials), + #[allow(missing_docs)] + BeaconKey(crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -25,57 +25,85 @@ BeaconKey(crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials), } impl Materials { /// Tries to convert the enum instance into [`Encryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_encryption(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_encryption( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`Decryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_decryption(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`Decryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials`](crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_decryption( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`BranchKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_branch_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`BranchKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_branch_key( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`BeaconKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_beacon_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`BeaconKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey), extracting the inner [`crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials`](crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_beacon_key( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey(val) = + &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`Encryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption). -pub fn is_encryption(&self) -> ::std::primitive::bool { - self.as_encryption().is_ok() -} -/// Returns true if this is a [`Decryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption). -pub fn is_decryption(&self) -> ::std::primitive::bool { - self.as_decryption().is_ok() -} -/// Returns true if this is a [`BranchKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey). -pub fn is_branch_key(&self) -> ::std::primitive::bool { - self.as_branch_key().is_ok() -} -/// Returns true if this is a [`BeaconKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey). -pub fn is_beacon_key(&self) -> ::std::primitive::bool { - self.as_beacon_key().is_ok() -} + pub fn is_encryption(&self) -> ::std::primitive::bool { + self.as_encryption().is_ok() + } + /// Returns true if this is a [`Decryption`](crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption). + pub fn is_decryption(&self) -> ::std::primitive::bool { + self.as_decryption().is_ok() + } + /// Returns true if this is a [`BranchKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey). + pub fn is_branch_key(&self) -> ::std::primitive::bool { + self.as_branch_key().is_ok() + } + /// Returns true if this is a [`BeaconKey`](crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey). + pub fn is_beacon_key(&self) -> ::std::primitive::bool { + self.as_beacon_key().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_multi_threaded_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_multi_threaded_cache.rs index f3db56d0e..5fa08eb37 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_multi_threaded_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_multi_threaded_cache.rs @@ -6,23 +6,25 @@ /// A cache that is safe for use in a multi threaded environment, but no extra functionality. pub struct MultiThreadedCache { /// Maximum number of entries cached. -pub entry_capacity: ::std::option::Option<::std::primitive::i32>, -/// Number of entries to prune at a time. -pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + pub entry_capacity: ::std::option::Option<::std::primitive::i32>, + /// Number of entries to prune at a time. + pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, } impl MultiThreadedCache { /// Maximum number of entries cached. -pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} + pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } } impl MultiThreadedCache { /// Creates a new builder-style object to manufacture [`MultiThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::MultiThreadedCacheBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::MultiThreadedCacheBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::MultiThreadedCacheBuilder::default() } } @@ -34,37 +36,49 @@ impl MultiThreadedCache { )] pub struct MultiThreadedCacheBuilder { pub(crate) entry_capacity: ::std::option::Option<::std::primitive::i32>, -pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, } impl MultiThreadedCacheBuilder { /// Maximum number of entries cached. -pub fn entry_capacity(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_capacity = ::std::option::Option::Some(input.into()); - self -} -/// Maximum number of entries cached. -pub fn set_entry_capacity(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_capacity = input; - self -} -/// Maximum number of entries cached. -pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); - self -} -/// Number of entries to prune at a time. -pub fn set_entry_pruning_tail_size(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = input; - self -} -/// Number of entries to prune at a time. -pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} + pub fn entry_capacity( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = ::std::option::Option::Some(input.into()); + self + } + /// Maximum number of entries cached. + pub fn set_entry_capacity( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = input; + self + } + /// Maximum number of entries cached. + pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); + self + } + /// Number of entries to prune at a time. + pub fn set_entry_pruning_tail_size( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = input; + self + } + /// Number of entries to prune at a time. + pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } /// Consumes the builder and constructs a [`MultiThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache). pub fn build( self, @@ -72,9 +86,11 @@ pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primi crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache { - entry_capacity: self.entry_capacity, -entry_pruning_tail_size: self.entry_pruning_tail_size, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache { + entry_capacity: self.entry_capacity, + entry_pruning_tail_size: self.entry_pruning_tail_size, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_no_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_no_cache.rs index 6e51e7dd5..2e137eab7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_no_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_no_cache.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] /// Nothing should ever be cached. -pub struct NoCache { - -} -impl NoCache { - -} +pub struct NoCache {} +impl NoCache {} impl NoCache { /// Creates a new builder-style object to manufacture [`NoCache`](crate::deps::aws_cryptography_materialProviders::types::NoCache). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::NoCacheBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::NoCacheBuilder { crate::deps::aws_cryptography_materialProviders::types::builders::NoCacheBuilder::default() } } @@ -22,11 +19,8 @@ impl NoCache { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct NoCacheBuilder { - -} +pub struct NoCacheBuilder {} impl NoCacheBuilder { - /// Consumes the builder and constructs a [`NoCache`](crate::deps::aws_cryptography_materialProviders::types::NoCache). pub fn build( self, @@ -34,8 +28,8 @@ impl NoCacheBuilder { crate::deps::aws_cryptography_materialProviders::types::NoCache, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::NoCache { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::NoCache {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_none.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_none.rs index b6ff73666..348d8c663 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_none.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_none.rs @@ -4,15 +4,12 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct None { - -} -impl None { - -} +pub struct None {} +impl None {} impl None { /// Creates a new builder-style object to manufacture [`None`](crate::deps::aws_cryptography_materialProviders::types::None). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::NoneBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::NoneBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::NoneBuilder::default() } } @@ -22,11 +19,8 @@ impl None { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct NoneBuilder { - -} +pub struct NoneBuilder {} impl NoneBuilder { - /// Consumes the builder and constructs a [`None`](crate::deps::aws_cryptography_materialProviders::types::None). pub fn build( self, @@ -34,8 +28,6 @@ impl NoneBuilder { crate::deps::aws_cryptography_materialProviders::types::None, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::None { - - }) + ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::None {}) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_input.rs index 49bc4997f..e48c382e3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_input.rs @@ -6,23 +6,37 @@ #[allow(missing_docs)] pub struct OnDecryptInput { #[allow(missing_docs)] -pub encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, + pub encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + #[allow(missing_docs)] + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptInput { #[allow(missing_docs)] -pub fn encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } } impl OnDecryptInput { /// Creates a new builder-style object to manufacture [`OnDecryptInput`](crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptInputBuilder::default() } } @@ -33,38 +47,74 @@ impl OnDecryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnDecryptInputBuilder { - pub(crate) encrypted_data_keys: ::std::option::Option<::std::vec::Vec>, -pub(crate) materials: ::std::option::Option, + pub(crate) encrypted_data_keys: ::std::option::Option< + ::std::vec::Vec, + >, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptInputBuilder { #[allow(missing_docs)] -pub fn encrypted_data_keys(mut self, input: impl ::std::convert::Into<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_encrypted_data_keys(mut self, input: ::std::option::Option<::std::vec::Vec>) -> Self { - self.encrypted_data_keys = input; - self -} -#[allow(missing_docs)] -pub fn get_encrypted_data_keys(&self) -> &::std::option::Option<::std::vec::Vec> { - &self.encrypted_data_keys -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn encrypted_data_keys( + mut self, + input: impl ::std::convert::Into< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_encrypted_data_keys( + mut self, + input: ::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, + >, + ) -> Self { + self.encrypted_data_keys = input; + self + } + #[allow(missing_docs)] + pub fn get_encrypted_data_keys( + &self, + ) -> &::std::option::Option< + ::std::vec::Vec, + > { + &self.encrypted_data_keys + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnDecryptInput`](crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput). pub fn build( self, @@ -72,9 +122,11 @@ pub fn get_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput { - encrypted_data_keys: self.encrypted_data_keys, -materials: self.materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput { + encrypted_data_keys: self.encrypted_data_keys, + materials: self.materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_output.rs index 0903bd800..90a9e1d3f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_decrypt_output.rs @@ -6,17 +6,25 @@ #[allow(missing_docs)] pub struct OnDecryptOutput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptOutput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } } impl OnDecryptOutput { /// Creates a new builder-style object to manufacture [`OnDecryptOutput`](crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptOutputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::OnDecryptOutputBuilder::default() } } @@ -27,23 +35,39 @@ impl OnDecryptOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnDecryptOutputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl OnDecryptOutputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnDecryptOutput`](crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput). pub fn build( self, @@ -51,8 +75,10 @@ pub fn get_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput { - materials: self.materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput { + materials: self.materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_input.rs index 640653938..1a2bd80e0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_input.rs @@ -6,17 +6,25 @@ #[allow(missing_docs)] pub struct OnEncryptInput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptInput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } } impl OnEncryptInput { /// Creates a new builder-style object to manufacture [`OnEncryptInput`](crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptInputBuilder::default() } } @@ -27,23 +35,39 @@ impl OnEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnEncryptInputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptInputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnEncryptInput`](crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput). pub fn build( self, @@ -51,8 +75,10 @@ pub fn get_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput { - materials: self.materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput { + materials: self.materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_output.rs index 34e4de58b..4270009b9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_on_encrypt_output.rs @@ -6,17 +6,25 @@ #[allow(missing_docs)] pub struct OnEncryptOutput { #[allow(missing_docs)] -pub materials: ::std::option::Option, + pub materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptOutput { #[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } } impl OnEncryptOutput { /// Creates a new builder-style object to manufacture [`OnEncryptOutput`](crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptOutputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::OnEncryptOutputBuilder::default() } } @@ -27,23 +35,39 @@ impl OnEncryptOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct OnEncryptOutputBuilder { - pub(crate) materials: ::std::option::Option, + pub(crate) materials: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl OnEncryptOutputBuilder { #[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.materials + } /// Consumes the builder and constructs a [`OnEncryptOutput`](crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput). pub fn build( self, @@ -51,8 +75,10 @@ pub fn get_materials(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput { - materials: self.materials, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput { + materials: self.materials, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_padding_scheme.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_padding_scheme.rs index cc79292c6..a06698575 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_padding_scheme.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_padding_scheme.rs @@ -5,20 +5,20 @@ #[allow(missing_docs)] pub enum PaddingScheme { Pkcs1, -OaepSha1Mgf1, -OaepSha256Mgf1, -OaepSha384Mgf1, -OaepSha512Mgf1, + OaepSha1Mgf1, + OaepSha256Mgf1, + OaepSha384Mgf1, + OaepSha512Mgf1, } impl ::std::fmt::Display for PaddingScheme { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { PaddingScheme::Pkcs1 => write!(f, "PKCS1"), -PaddingScheme::OaepSha1Mgf1 => write!(f, "OAEP_SHA1_MGF1"), -PaddingScheme::OaepSha256Mgf1 => write!(f, "OAEP_SHA256_MGF1"), -PaddingScheme::OaepSha384Mgf1 => write!(f, "OAEP_SHA384_MGF1"), -PaddingScheme::OaepSha512Mgf1 => write!(f, "OAEP_SHA512_MGF1"), + PaddingScheme::OaepSha1Mgf1 => write!(f, "OAEP_SHA1_MGF1"), + PaddingScheme::OaepSha256Mgf1 => write!(f, "OAEP_SHA256_MGF1"), + PaddingScheme::OaepSha384Mgf1 => write!(f, "OAEP_SHA384_MGF1"), + PaddingScheme::OaepSha512Mgf1 => write!(f, "OAEP_SHA512_MGF1"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_public_key_discovery_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_public_key_discovery_input.rs index d2b386d3c..32091e315 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_public_key_discovery_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_public_key_discovery_input.rs @@ -6,17 +6,17 @@ /// Inputs for creating a PublicKeyDiscovery Configuration. pub struct PublicKeyDiscoveryInput { /// The sender's private key. MUST be PEM encoded. -pub recipient_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub recipient_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl PublicKeyDiscoveryInput { /// The sender's private key. MUST be PEM encoded. -pub fn recipient_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_static_private_key -} + pub fn recipient_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_static_private_key + } } impl PublicKeyDiscoveryInput { /// Creates a new builder-style object to manufacture [`PublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::PublicKeyDiscoveryInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::PublicKeyDiscoveryInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::PublicKeyDiscoveryInputBuilder::default() } } @@ -31,19 +31,27 @@ pub struct PublicKeyDiscoveryInputBuilder { } impl PublicKeyDiscoveryInputBuilder { /// The sender's private key. MUST be PEM encoded. -pub fn recipient_static_private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.recipient_static_private_key = ::std::option::Option::Some(input.into()); - self -} -/// The sender's private key. MUST be PEM encoded. -pub fn set_recipient_static_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.recipient_static_private_key = input; - self -} -/// The sender's private key. MUST be PEM encoded. -pub fn get_recipient_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_static_private_key -} + pub fn recipient_static_private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_static_private_key = ::std::option::Option::Some(input.into()); + self + } + /// The sender's private key. MUST be PEM encoded. + pub fn set_recipient_static_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_static_private_key = input; + self + } + /// The sender's private key. MUST be PEM encoded. + pub fn get_recipient_static_private_key( + &self, + ) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_static_private_key + } /// Consumes the builder and constructs a [`PublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_recipient_static_private_key(&self) -> &::std::option::Option<::aws_s crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput { - recipient_static_private_key: self.recipient_static_private_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput { + recipient_static_private_key: self.recipient_static_private_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_put_cache_entry_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_put_cache_entry_input.rs index 70565aa83..7081f951a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_put_cache_entry_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_put_cache_entry_input.rs @@ -6,47 +6,53 @@ #[allow(missing_docs)] pub struct PutCacheEntryInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub creation_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub expiry_time: ::std::option::Option<::std::primitive::i64>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub materials: ::std::option::Option, -#[allow(missing_docs)] -pub messages_used: ::std::option::Option<::std::primitive::i32>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub creation_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub expiry_time: ::std::option::Option<::std::primitive::i64>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub materials: + ::std::option::Option, + #[allow(missing_docs)] + pub messages_used: ::std::option::Option<::std::primitive::i32>, } impl PutCacheEntryInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} -#[allow(missing_docs)] -pub fn materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } + #[allow(missing_docs)] + pub fn materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } } impl PutCacheEntryInput { /// Creates a new builder-style object to manufacture [`PutCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::PutCacheEntryInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::PutCacheEntryInputBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::PutCacheEntryInputBuilder::default() } } @@ -58,97 +64,129 @@ impl PutCacheEntryInput { )] pub struct PutCacheEntryInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) materials: ::std::option::Option, -pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, + pub(crate) creation_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) expiry_time: ::std::option::Option<::std::primitive::i64>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) materials: + ::std::option::Option, + pub(crate) messages_used: ::std::option::Option<::std::primitive::i32>, } impl PutCacheEntryInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn creation_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.creation_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_creation_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.creation_time = input; - self -} -#[allow(missing_docs)] -pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.creation_time -} -#[allow(missing_docs)] -pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { - self.expiry_time = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { - self.expiry_time = input; - self -} -#[allow(missing_docs)] -pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { - &self.expiry_time -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} -#[allow(missing_docs)] -pub fn materials(mut self, input: impl ::std::convert::Into) -> Self { - self.materials = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_materials(mut self, input: ::std::option::Option) -> Self { - self.materials = input; - self -} -#[allow(missing_docs)] -pub fn get_materials(&self) -> &::std::option::Option { - &self.materials -} -#[allow(missing_docs)] -pub fn messages_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.messages_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_messages_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.messages_used = input; - self -} -#[allow(missing_docs)] -pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.messages_used -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn creation_time( + mut self, + input: impl ::std::convert::Into<::std::primitive::i64>, + ) -> Self { + self.creation_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_creation_time( + mut self, + input: ::std::option::Option<::std::primitive::i64>, + ) -> Self { + self.creation_time = input; + self + } + #[allow(missing_docs)] + pub fn get_creation_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.creation_time + } + #[allow(missing_docs)] + pub fn expiry_time(mut self, input: impl ::std::convert::Into<::std::primitive::i64>) -> Self { + self.expiry_time = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expiry_time(mut self, input: ::std::option::Option<::std::primitive::i64>) -> Self { + self.expiry_time = input; + self + } + #[allow(missing_docs)] + pub fn get_expiry_time(&self) -> &::std::option::Option<::std::primitive::i64> { + &self.expiry_time + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } + #[allow(missing_docs)] + pub fn materials( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_materials( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, + ) -> Self { + self.materials = input; + self + } + #[allow(missing_docs)] + pub fn get_materials( + &self, + ) -> &::std::option::Option + { + &self.materials + } + #[allow(missing_docs)] + pub fn messages_used( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.messages_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_messages_used( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.messages_used = input; + self + } + #[allow(missing_docs)] + pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.messages_used + } /// Consumes the builder and constructs a [`PutCacheEntryInput`](crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput). pub fn build( self, @@ -156,13 +194,15 @@ pub fn get_messages_used(&self) -> &::std::option::Option<::std::primitive::i32> crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput { - bytes_used: self.bytes_used, -creation_time: self.creation_time, -expiry_time: self.expiry_time, -identifier: self.identifier, -materials: self.materials, -messages_used: self.messages_used, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput { + bytes_used: self.bytes_used, + creation_time: self.creation_time, + expiry_time: self.expiry_time, + identifier: self.identifier, + materials: self.materials, + messages_used: self.messages_used, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_ecdh_static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_ecdh_static_configurations.rs index e8f639960..27796be56 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_ecdh_static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_ecdh_static_configurations.rs @@ -23,44 +23,49 @@ EphemeralPrivateKeyToStaticPublicKey(crate::deps::aws_cryptography_materialProvi } impl RawEcdhStaticConfigurations { /// Tries to convert the enum instance into [`PublicKeyDiscovery`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput`](crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_public_key_discovery(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_public_key_discovery( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`RawPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_raw_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey(val) = &self { + } + /// Tries to convert the enum instance into [`RawPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_raw_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, &Self>{ + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`EphemeralPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_ephemeral_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey(val) = &self { + } + /// Tries to convert the enum instance into [`EphemeralPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_ephemeral_private_key_to_static_public_key(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, &Self>{ + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`PublicKeyDiscovery`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery). -pub fn is_public_key_discovery(&self) -> ::std::primitive::bool { - self.as_public_key_discovery().is_ok() -} -/// Returns true if this is a [`RawPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey). -pub fn is_raw_private_key_to_static_public_key(&self) -> ::std::primitive::bool { - self.as_raw_private_key_to_static_public_key().is_ok() -} -/// Returns true if this is a [`EphemeralPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey). -pub fn is_ephemeral_private_key_to_static_public_key(&self) -> ::std::primitive::bool { - self.as_ephemeral_private_key_to_static_public_key().is_ok() -} + pub fn is_public_key_discovery(&self) -> ::std::primitive::bool { + self.as_public_key_discovery().is_ok() + } + /// Returns true if this is a [`RawPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey). + pub fn is_raw_private_key_to_static_public_key(&self) -> ::std::primitive::bool { + self.as_raw_private_key_to_static_public_key().is_ok() + } + /// Returns true if this is a [`EphemeralPrivateKeyToStaticPublicKey`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey). + pub fn is_ephemeral_private_key_to_static_public_key(&self) -> ::std::primitive::bool { + self.as_ephemeral_private_key_to_static_public_key().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_private_key_to_static_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_private_key_to_static_public_key_input.rs index 001878f16..bf5b2ffaf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_private_key_to_static_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_raw_private_key_to_static_public_key_input.rs @@ -6,23 +6,23 @@ /// Inputs for creating a RawPrivateKeyToStaticPublicKey Configuration. pub struct RawPrivateKeyToStaticPublicKeyInput { /// The recipient's public key. MUST be DER encoded. -pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -/// The sender's private key. MUST be PEM encoded. -pub sender_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + /// The sender's private key. MUST be PEM encoded. + pub sender_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RawPrivateKeyToStaticPublicKeyInput { /// The recipient's public key. MUST be DER encoded. -pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} -/// The sender's private key. MUST be PEM encoded. -pub fn sender_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.sender_static_private_key -} + pub fn recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } + /// The sender's private key. MUST be PEM encoded. + pub fn sender_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.sender_static_private_key + } } impl RawPrivateKeyToStaticPublicKeyInput { /// Creates a new builder-style object to manufacture [`RawPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::RawPrivateKeyToStaticPublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::RawPrivateKeyToStaticPublicKeyInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::RawPrivateKeyToStaticPublicKeyInputBuilder::default() } } @@ -34,37 +34,51 @@ impl RawPrivateKeyToStaticPublicKeyInput { )] pub struct RawPrivateKeyToStaticPublicKeyInputBuilder { pub(crate) recipient_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) sender_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) sender_static_private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RawPrivateKeyToStaticPublicKeyInputBuilder { /// The recipient's public key. MUST be DER encoded. -pub fn recipient_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = ::std::option::Option::Some(input.into()); - self -} -/// The recipient's public key. MUST be DER encoded. -pub fn set_recipient_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.recipient_public_key = input; - self -} -/// The recipient's public key. MUST be DER encoded. -pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.recipient_public_key -} -/// The sender's private key. MUST be PEM encoded. -pub fn sender_static_private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.sender_static_private_key = ::std::option::Option::Some(input.into()); - self -} -/// The sender's private key. MUST be PEM encoded. -pub fn set_sender_static_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.sender_static_private_key = input; - self -} -/// The sender's private key. MUST be PEM encoded. -pub fn get_sender_static_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.sender_static_private_key -} + pub fn recipient_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = ::std::option::Option::Some(input.into()); + self + } + /// The recipient's public key. MUST be DER encoded. + pub fn set_recipient_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.recipient_public_key = input; + self + } + /// The recipient's public key. MUST be DER encoded. + pub fn get_recipient_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.recipient_public_key + } + /// The sender's private key. MUST be PEM encoded. + pub fn sender_static_private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.sender_static_private_key = ::std::option::Option::Some(input.into()); + self + } + /// The sender's private key. MUST be PEM encoded. + pub fn set_sender_static_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.sender_static_private_key = input; + self + } + /// The sender's private key. MUST be PEM encoded. + pub fn get_sender_static_private_key( + &self, + ) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.sender_static_private_key + } /// Consumes the builder and constructs a [`RawPrivateKeyToStaticPublicKeyInput`](crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_signature_algorithm.rs index f521441e6..ddd17dc9e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_signature_algorithm.rs @@ -6,9 +6,9 @@ #[allow(missing_docs)] pub enum SignatureAlgorithm { #[allow(missing_docs)] -Ecdsa(crate::deps::aws_cryptography_materialProviders::types::Ecdsa), -#[allow(missing_docs)] -None(crate::deps::aws_cryptography_materialProviders::types::None), + Ecdsa(crate::deps::aws_cryptography_materialProviders::types::Ecdsa), + #[allow(missing_docs)] + None(crate::deps::aws_cryptography_materialProviders::types::None), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,43 @@ None(crate::deps::aws_cryptography_materialProviders::types::None), } impl SignatureAlgorithm { /// Tries to convert the enum instance into [`Ecdsa`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::Ecdsa`](crate::deps::aws_cryptography_materialProviders::types::Ecdsa). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_ecdsa(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::Ecdsa, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_ecdsa( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::Ecdsa, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} -/// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_none(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None(val) = &self { - ::std::result::Result::Ok(val) - } else { - ::std::result::Result::Err(self) + /// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_none( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None( + val, + ) = &self + { + ::std::result::Result::Ok(val) + } else { + ::std::result::Result::Err(self) + } } -} /// Returns true if this is a [`Ecdsa`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa). -pub fn is_ecdsa(&self) -> ::std::primitive::bool { - self.as_ecdsa().is_ok() -} -/// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None). -pub fn is_none(&self) -> ::std::primitive::bool { - self.as_none().is_ok() -} + pub fn is_ecdsa(&self) -> ::std::primitive::bool { + self.as_ecdsa().is_ok() + } + /// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None). + pub fn is_none(&self) -> ::std::primitive::bool { + self.as_none().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_single_threaded_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_single_threaded_cache.rs index 8f509cfd0..fcb243fc2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_single_threaded_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_single_threaded_cache.rs @@ -6,23 +6,25 @@ /// A cache that is NOT safe for use in a multi threaded environment. pub struct SingleThreadedCache { /// Maximum number of entries cached. -pub entry_capacity: ::std::option::Option<::std::primitive::i32>, -/// Number of entries to prune at a time. -pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + pub entry_capacity: ::std::option::Option<::std::primitive::i32>, + /// Number of entries to prune at a time. + pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, } impl SingleThreadedCache { /// Maximum number of entries cached. -pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} + pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } } impl SingleThreadedCache { /// Creates a new builder-style object to manufacture [`SingleThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::SingleThreadedCacheBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::SingleThreadedCacheBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::SingleThreadedCacheBuilder::default() } } @@ -34,37 +36,49 @@ impl SingleThreadedCache { )] pub struct SingleThreadedCacheBuilder { pub(crate) entry_capacity: ::std::option::Option<::std::primitive::i32>, -pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, } impl SingleThreadedCacheBuilder { /// Maximum number of entries cached. -pub fn entry_capacity(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_capacity = ::std::option::Option::Some(input.into()); - self -} -/// Maximum number of entries cached. -pub fn set_entry_capacity(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_capacity = input; - self -} -/// Maximum number of entries cached. -pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); - self -} -/// Number of entries to prune at a time. -pub fn set_entry_pruning_tail_size(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = input; - self -} -/// Number of entries to prune at a time. -pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} + pub fn entry_capacity( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = ::std::option::Option::Some(input.into()); + self + } + /// Maximum number of entries cached. + pub fn set_entry_capacity( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = input; + self + } + /// Maximum number of entries cached. + pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); + self + } + /// Number of entries to prune at a time. + pub fn set_entry_pruning_tail_size( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = input; + self + } + /// Number of entries to prune at a time. + pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } /// Consumes the builder and constructs a [`SingleThreadedCache`](crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache). pub fn build( self, @@ -72,9 +86,11 @@ pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primi crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache { - entry_capacity: self.entry_capacity, -entry_pruning_tail_size: self.entry_pruning_tail_size, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache { + entry_capacity: self.entry_capacity, + entry_pruning_tail_size: self.entry_pruning_tail_size, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_static_configurations.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_static_configurations.rs index be7f8e7fb..02c218415 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_static_configurations.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_static_configurations.rs @@ -6,9 +6,9 @@ /// Supported configurations for the StaticConfiguration Key Agreement Scheme. pub enum StaticConfigurations { #[allow(missing_docs)] -AwsKmsEcdh(crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations), -#[allow(missing_docs)] -RawEcdh(crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations), + AwsKmsEcdh(crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations), + #[allow(missing_docs)] + RawEcdh(crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,41 @@ RawEcdh(crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticCon } impl StaticConfigurations { /// Tries to convert the enum instance into [`AwsKmsEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations`](crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_aws_kms_ecdh(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_aws_kms_ecdh( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`RawEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_raw_ecdh(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh(val) = &self { + } + /// Tries to convert the enum instance into [`RawEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations`](crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_raw_ecdh( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`AwsKmsEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::AwsKmsEcdh). -pub fn is_aws_kms_ecdh(&self) -> ::std::primitive::bool { - self.as_aws_kms_ecdh().is_ok() -} -/// Returns true if this is a [`RawEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh). -pub fn is_raw_ecdh(&self) -> ::std::primitive::bool { - self.as_raw_ecdh().is_ok() -} + pub fn is_aws_kms_ecdh(&self) -> ::std::primitive::bool { + self.as_aws_kms_ecdh().is_ok() + } + /// Returns true if this is a [`RawEcdh`](crate::deps::aws_cryptography_materialProviders::types::StaticConfigurations::RawEcdh). + pub fn is_raw_ecdh(&self) -> ::std::primitive::bool { + self.as_raw_ecdh().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_storm_tracking_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_storm_tracking_cache.rs index f1b37cda4..07952d34c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_storm_tracking_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_storm_tracking_cache.rs @@ -7,65 +7,71 @@ /// and tries to prevent redundant or overly parallel backend calls. pub struct StormTrackingCache { /// Maximum number of entries cached. -pub entry_capacity: ::std::option::Option<::std::primitive::i32>, -/// Number of entries to prune at a time. -pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, -/// How many simultaneous attempts to refresh the materials. -pub fan_out: ::std::option::Option<::std::primitive::i32>, -/// How much time between attempts to refresh the materials. -pub grace_interval: ::std::option::Option<::std::primitive::i32>, -/// How much time before expiration should an attempt be made to refresh the materials. -/// If zero, use a simple cache with no storm tracking. -pub grace_period: ::std::option::Option<::std::primitive::i32>, -/// How much time until an attempt to refresh the materials should be forgotten. -pub in_flight_ttl: ::std::option::Option<::std::primitive::i32>, -/// How many milliseconds should a thread sleep if fanOut is exceeded. -pub sleep_milli: ::std::option::Option<::std::primitive::i32>, -/// The time unit for gracePeriod, graceInterval, and inFlightTTL. -/// The default is seconds. -/// If this is set to milliseconds, then these values will be treated as milliseconds. -pub time_units: ::std::option::Option, + pub entry_capacity: ::std::option::Option<::std::primitive::i32>, + /// Number of entries to prune at a time. + pub entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + /// How many simultaneous attempts to refresh the materials. + pub fan_out: ::std::option::Option<::std::primitive::i32>, + /// How much time between attempts to refresh the materials. + pub grace_interval: ::std::option::Option<::std::primitive::i32>, + /// How much time before expiration should an attempt be made to refresh the materials. + /// If zero, use a simple cache with no storm tracking. + pub grace_period: ::std::option::Option<::std::primitive::i32>, + /// How much time until an attempt to refresh the materials should be forgotten. + pub in_flight_ttl: ::std::option::Option<::std::primitive::i32>, + /// How many milliseconds should a thread sleep if fanOut is exceeded. + pub sleep_milli: ::std::option::Option<::std::primitive::i32>, + /// The time unit for gracePeriod, graceInterval, and inFlightTTL. + /// The default is seconds. + /// If this is set to milliseconds, then these values will be treated as milliseconds. + pub time_units: + ::std::option::Option, } impl StormTrackingCache { /// Maximum number of entries cached. -pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} -/// How many simultaneous attempts to refresh the materials. -pub fn fan_out(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.fan_out -} -/// How much time between attempts to refresh the materials. -pub fn grace_interval(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.grace_interval -} -/// How much time before expiration should an attempt be made to refresh the materials. -/// If zero, use a simple cache with no storm tracking. -pub fn grace_period(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.grace_period -} -/// How much time until an attempt to refresh the materials should be forgotten. -pub fn in_flight_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.in_flight_ttl -} -/// How many milliseconds should a thread sleep if fanOut is exceeded. -pub fn sleep_milli(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.sleep_milli -} -/// The time unit for gracePeriod, graceInterval, and inFlightTTL. -/// The default is seconds. -/// If this is set to milliseconds, then these values will be treated as milliseconds. -pub fn time_units(&self) -> &::std::option::Option { - &self.time_units -} + pub fn entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } + /// How many simultaneous attempts to refresh the materials. + pub fn fan_out(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.fan_out + } + /// How much time between attempts to refresh the materials. + pub fn grace_interval(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.grace_interval + } + /// How much time before expiration should an attempt be made to refresh the materials. + /// If zero, use a simple cache with no storm tracking. + pub fn grace_period(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.grace_period + } + /// How much time until an attempt to refresh the materials should be forgotten. + pub fn in_flight_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.in_flight_ttl + } + /// How many milliseconds should a thread sleep if fanOut is exceeded. + pub fn sleep_milli(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.sleep_milli + } + /// The time unit for gracePeriod, graceInterval, and inFlightTTL. + /// The default is seconds. + /// If this is set to milliseconds, then these values will be treated as milliseconds. + pub fn time_units( + &self, + ) -> &::std::option::Option + { + &self.time_units + } } impl StormTrackingCache { /// Creates a new builder-style object to manufacture [`StormTrackingCache`](crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::StormTrackingCacheBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_materialProviders::types::builders::StormTrackingCacheBuilder + { crate::deps::aws_cryptography_materialProviders::types::builders::StormTrackingCacheBuilder::default() } } @@ -77,136 +83,174 @@ impl StormTrackingCache { )] pub struct StormTrackingCacheBuilder { pub(crate) entry_capacity: ::std::option::Option<::std::primitive::i32>, -pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, -pub(crate) fan_out: ::std::option::Option<::std::primitive::i32>, -pub(crate) grace_interval: ::std::option::Option<::std::primitive::i32>, -pub(crate) grace_period: ::std::option::Option<::std::primitive::i32>, -pub(crate) in_flight_ttl: ::std::option::Option<::std::primitive::i32>, -pub(crate) sleep_milli: ::std::option::Option<::std::primitive::i32>, -pub(crate) time_units: ::std::option::Option, + pub(crate) entry_pruning_tail_size: ::std::option::Option<::std::primitive::i32>, + pub(crate) fan_out: ::std::option::Option<::std::primitive::i32>, + pub(crate) grace_interval: ::std::option::Option<::std::primitive::i32>, + pub(crate) grace_period: ::std::option::Option<::std::primitive::i32>, + pub(crate) in_flight_ttl: ::std::option::Option<::std::primitive::i32>, + pub(crate) sleep_milli: ::std::option::Option<::std::primitive::i32>, + pub(crate) time_units: + ::std::option::Option, } impl StormTrackingCacheBuilder { /// Maximum number of entries cached. -pub fn entry_capacity(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_capacity = ::std::option::Option::Some(input.into()); - self -} -/// Maximum number of entries cached. -pub fn set_entry_capacity(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_capacity = input; - self -} -/// Maximum number of entries cached. -pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_capacity -} -/// Number of entries to prune at a time. -pub fn entry_pruning_tail_size(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); - self -} -/// Number of entries to prune at a time. -pub fn set_entry_pruning_tail_size(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.entry_pruning_tail_size = input; - self -} -/// Number of entries to prune at a time. -pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.entry_pruning_tail_size -} -/// How many simultaneous attempts to refresh the materials. -pub fn fan_out(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.fan_out = ::std::option::Option::Some(input.into()); - self -} -/// How many simultaneous attempts to refresh the materials. -pub fn set_fan_out(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.fan_out = input; - self -} -/// How many simultaneous attempts to refresh the materials. -pub fn get_fan_out(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.fan_out -} -/// How much time between attempts to refresh the materials. -pub fn grace_interval(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.grace_interval = ::std::option::Option::Some(input.into()); - self -} -/// How much time between attempts to refresh the materials. -pub fn set_grace_interval(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.grace_interval = input; - self -} -/// How much time between attempts to refresh the materials. -pub fn get_grace_interval(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.grace_interval -} -/// How much time before expiration should an attempt be made to refresh the materials. -/// If zero, use a simple cache with no storm tracking. -pub fn grace_period(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.grace_period = ::std::option::Option::Some(input.into()); - self -} -/// How much time before expiration should an attempt be made to refresh the materials. -/// If zero, use a simple cache with no storm tracking. -pub fn set_grace_period(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.grace_period = input; - self -} -/// How much time before expiration should an attempt be made to refresh the materials. -/// If zero, use a simple cache with no storm tracking. -pub fn get_grace_period(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.grace_period -} -/// How much time until an attempt to refresh the materials should be forgotten. -pub fn in_flight_ttl(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.in_flight_ttl = ::std::option::Option::Some(input.into()); - self -} -/// How much time until an attempt to refresh the materials should be forgotten. -pub fn set_in_flight_ttl(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.in_flight_ttl = input; - self -} -/// How much time until an attempt to refresh the materials should be forgotten. -pub fn get_in_flight_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.in_flight_ttl -} -/// How many milliseconds should a thread sleep if fanOut is exceeded. -pub fn sleep_milli(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.sleep_milli = ::std::option::Option::Some(input.into()); - self -} -/// How many milliseconds should a thread sleep if fanOut is exceeded. -pub fn set_sleep_milli(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.sleep_milli = input; - self -} -/// How many milliseconds should a thread sleep if fanOut is exceeded. -pub fn get_sleep_milli(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.sleep_milli -} -/// The time unit for gracePeriod, graceInterval, and inFlightTTL. -/// The default is seconds. -/// If this is set to milliseconds, then these values will be treated as milliseconds. -pub fn time_units(mut self, input: impl ::std::convert::Into) -> Self { - self.time_units = ::std::option::Option::Some(input.into()); - self -} -/// The time unit for gracePeriod, graceInterval, and inFlightTTL. -/// The default is seconds. -/// If this is set to milliseconds, then these values will be treated as milliseconds. -pub fn set_time_units(mut self, input: ::std::option::Option) -> Self { - self.time_units = input; - self -} -/// The time unit for gracePeriod, graceInterval, and inFlightTTL. -/// The default is seconds. -/// If this is set to milliseconds, then these values will be treated as milliseconds. -pub fn get_time_units(&self) -> &::std::option::Option { - &self.time_units -} + pub fn entry_capacity( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = ::std::option::Option::Some(input.into()); + self + } + /// Maximum number of entries cached. + pub fn set_entry_capacity( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_capacity = input; + self + } + /// Maximum number of entries cached. + pub fn get_entry_capacity(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_capacity + } + /// Number of entries to prune at a time. + pub fn entry_pruning_tail_size( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = ::std::option::Option::Some(input.into()); + self + } + /// Number of entries to prune at a time. + pub fn set_entry_pruning_tail_size( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.entry_pruning_tail_size = input; + self + } + /// Number of entries to prune at a time. + pub fn get_entry_pruning_tail_size(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.entry_pruning_tail_size + } + /// How many simultaneous attempts to refresh the materials. + pub fn fan_out(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.fan_out = ::std::option::Option::Some(input.into()); + self + } + /// How many simultaneous attempts to refresh the materials. + pub fn set_fan_out(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.fan_out = input; + self + } + /// How many simultaneous attempts to refresh the materials. + pub fn get_fan_out(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.fan_out + } + /// How much time between attempts to refresh the materials. + pub fn grace_interval( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.grace_interval = ::std::option::Option::Some(input.into()); + self + } + /// How much time between attempts to refresh the materials. + pub fn set_grace_interval( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.grace_interval = input; + self + } + /// How much time between attempts to refresh the materials. + pub fn get_grace_interval(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.grace_interval + } + /// How much time before expiration should an attempt be made to refresh the materials. + /// If zero, use a simple cache with no storm tracking. + pub fn grace_period(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.grace_period = ::std::option::Option::Some(input.into()); + self + } + /// How much time before expiration should an attempt be made to refresh the materials. + /// If zero, use a simple cache with no storm tracking. + pub fn set_grace_period(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.grace_period = input; + self + } + /// How much time before expiration should an attempt be made to refresh the materials. + /// If zero, use a simple cache with no storm tracking. + pub fn get_grace_period(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.grace_period + } + /// How much time until an attempt to refresh the materials should be forgotten. + pub fn in_flight_ttl( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.in_flight_ttl = ::std::option::Option::Some(input.into()); + self + } + /// How much time until an attempt to refresh the materials should be forgotten. + pub fn set_in_flight_ttl( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.in_flight_ttl = input; + self + } + /// How much time until an attempt to refresh the materials should be forgotten. + pub fn get_in_flight_ttl(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.in_flight_ttl + } + /// How many milliseconds should a thread sleep if fanOut is exceeded. + pub fn sleep_milli(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.sleep_milli = ::std::option::Option::Some(input.into()); + self + } + /// How many milliseconds should a thread sleep if fanOut is exceeded. + pub fn set_sleep_milli(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.sleep_milli = input; + self + } + /// How many milliseconds should a thread sleep if fanOut is exceeded. + pub fn get_sleep_milli(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.sleep_milli + } + /// The time unit for gracePeriod, graceInterval, and inFlightTTL. + /// The default is seconds. + /// If this is set to milliseconds, then these values will be treated as milliseconds. + pub fn time_units( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::TimeUnits, + >, + ) -> Self { + self.time_units = ::std::option::Option::Some(input.into()); + self + } + /// The time unit for gracePeriod, graceInterval, and inFlightTTL. + /// The default is seconds. + /// If this is set to milliseconds, then these values will be treated as milliseconds. + pub fn set_time_units( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::TimeUnits, + >, + ) -> Self { + self.time_units = input; + self + } + /// The time unit for gracePeriod, graceInterval, and inFlightTTL. + /// The default is seconds. + /// If this is set to milliseconds, then these values will be treated as milliseconds. + pub fn get_time_units( + &self, + ) -> &::std::option::Option + { + &self.time_units + } /// Consumes the builder and constructs a [`StormTrackingCache`](crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache). pub fn build( self, @@ -214,15 +258,17 @@ pub fn get_time_units(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache { - entry_capacity: self.entry_capacity, -entry_pruning_tail_size: self.entry_pruning_tail_size, -fan_out: self.fan_out, -grace_interval: self.grace_interval, -grace_period: self.grace_period, -in_flight_ttl: self.in_flight_ttl, -sleep_milli: self.sleep_milli, -time_units: self.time_units, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache { + entry_capacity: self.entry_capacity, + entry_pruning_tail_size: self.entry_pruning_tail_size, + fan_out: self.fan_out, + grace_interval: self.grace_interval, + grace_period: self.grace_period, + in_flight_ttl: self.in_flight_ttl, + sleep_milli: self.sleep_milli, + time_units: self.time_units, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_symmetric_signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_symmetric_signature_algorithm.rs index 144ced21d..40101cf2c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_symmetric_signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_symmetric_signature_algorithm.rs @@ -6,9 +6,9 @@ #[allow(missing_docs)] pub enum SymmetricSignatureAlgorithm { #[allow(missing_docs)] -Hmac(crate::deps::aws_cryptography_primitives::types::DigestAlgorithm), -#[allow(missing_docs)] -None(crate::deps::aws_cryptography_materialProviders::types::None), + Hmac(crate::deps::aws_cryptography_primitives::types::DigestAlgorithm), + #[allow(missing_docs)] + None(crate::deps::aws_cryptography_materialProviders::types::None), /// The `Unknown` variant represents cases where new union variant was received. Consider upgrading the SDK to the latest available version. /// An unknown enum variant /// @@ -21,31 +21,39 @@ None(crate::deps::aws_cryptography_materialProviders::types::None), } impl SymmetricSignatureAlgorithm { /// Tries to convert the enum instance into [`Hmac`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac), extracting the inner [`crate::deps::aws_cryptography_primitives::types::DigestAlgorithm`](crate::deps::aws_cryptography_primitives::types::DigestAlgorithm). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_hmac(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(val) = &self { + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_hmac( + &self, + ) -> ::std::result::Result< + &crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + &Self, + > { + if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} -/// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). -/// Returns `Err(&Self)` if it can't be converted. -pub fn as_none(&self) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> { - if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None(val) = &self { + } + /// Tries to convert the enum instance into [`None`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None), extracting the inner [`crate::deps::aws_cryptography_materialProviders::types::None`](crate::deps::aws_cryptography_materialProviders::types::None). + /// Returns `Err(&Self)` if it can't be converted. + pub fn as_none( + &self, + ) -> ::std::result::Result<&crate::deps::aws_cryptography_materialProviders::types::None, &Self> + { + if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None(val) = &self { ::std::result::Result::Ok(val) } else { ::std::result::Result::Err(self) } -} + } /// Returns true if this is a [`Hmac`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac). -pub fn is_hmac(&self) -> ::std::primitive::bool { - self.as_hmac().is_ok() -} -/// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None). -pub fn is_none(&self) -> ::std::primitive::bool { - self.as_none().is_ok() -} + pub fn is_hmac(&self) -> ::std::primitive::bool { + self.as_hmac().is_ok() + } + /// Returns true if this is a [`None`](crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None). + pub fn is_none(&self) -> ::std::primitive::bool { + self.as_none().is_ok() + } /// Returns true if the enum instance is the `Unknown` variant. pub fn is_unknown(&self) -> ::std::primitive::bool { matches!(self, Self::Unknown) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_time_units.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_time_units.rs index ab124a7c8..a154e5679 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_time_units.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_time_units.rs @@ -5,14 +5,14 @@ #[allow(missing_docs)] pub enum TimeUnits { Seconds, -Milliseconds, + Milliseconds, } impl ::std::fmt::Display for TimeUnits { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { TimeUnits::Seconds => write!(f, "Seconds"), -TimeUnits::Milliseconds => write!(f, "Milliseconds"), + TimeUnits::Milliseconds => write!(f, "Milliseconds"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_update_usage_metadata_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_update_usage_metadata_input.rs index 49073dea8..27aa986db 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_update_usage_metadata_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_update_usage_metadata_input.rs @@ -6,23 +6,23 @@ #[allow(missing_docs)] pub struct UpdateUsageMetadataInput { #[allow(missing_docs)] -pub bytes_used: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub bytes_used: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl UpdateUsageMetadataInput { #[allow(missing_docs)] -pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } } impl UpdateUsageMetadataInput { /// Creates a new builder-style object to manufacture [`UpdateUsageMetadataInput`](crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::UpdateUsageMetadataInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::UpdateUsageMetadataInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::UpdateUsageMetadataInputBuilder::default() } } @@ -34,37 +34,43 @@ impl UpdateUsageMetadataInput { )] pub struct UpdateUsageMetadataInputBuilder { pub(crate) bytes_used: ::std::option::Option<::std::primitive::i32>, -pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) identifier: ::std::option::Option<::aws_smithy_types::Blob>, } impl UpdateUsageMetadataInputBuilder { #[allow(missing_docs)] -pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.bytes_used = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.bytes_used = input; - self -} -#[allow(missing_docs)] -pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.bytes_used -} -#[allow(missing_docs)] -pub fn identifier(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.identifier = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_identifier(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.identifier = input; - self -} -#[allow(missing_docs)] -pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.identifier -} + pub fn bytes_used(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.bytes_used = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_bytes_used(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.bytes_used = input; + self + } + #[allow(missing_docs)] + pub fn get_bytes_used(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.bytes_used + } + #[allow(missing_docs)] + pub fn identifier( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_identifier( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.identifier = input; + self + } + #[allow(missing_docs)] + pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.identifier + } /// Consumes the builder and constructs a [`UpdateUsageMetadataInput`](crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput). pub fn build( self, @@ -72,9 +78,11 @@ pub fn get_identifier(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput { - bytes_used: self.bytes_used, -identifier: self.identifier, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput { + bytes_used: self.bytes_used, + identifier: self.identifier, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_decryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_decryption_materials_transition_input.rs index a923d362c..3186a50c5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_decryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_decryption_materials_transition_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidDecryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub start: ::std::option::Option, -#[allow(missing_docs)] -pub stop: ::std::option::Option, + pub start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + #[allow(missing_docs)] + pub stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl ValidDecryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub fn start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.stop + } } impl ValidDecryptionMaterialsTransitionInput { /// Creates a new builder-style object to manufacture [`ValidDecryptionMaterialsTransitionInput`](crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidDecryptionMaterialsTransitionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidDecryptionMaterialsTransitionInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::ValidDecryptionMaterialsTransitionInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidDecryptionMaterialsTransitionInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidDecryptionMaterialsTransitionInputBuilder { - pub(crate) start: ::std::option::Option, -pub(crate) stop: ::std::option::Option, + pub(crate) start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + pub(crate) stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, } impl ValidDecryptionMaterialsTransitionInputBuilder { #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.start = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.start = input; - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.stop = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.stop = input; - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.start = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.start = input; + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.stop = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, + ) -> Self { + self.stop = input; + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + > { + &self.stop + } /// Consumes the builder and constructs a [`ValidDecryptionMaterialsTransitionInput`](crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput { start: self.start, stop: self.stop, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_encryption_materials_transition_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_encryption_materials_transition_input.rs index 268786ff5..bd54b8a3d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_encryption_materials_transition_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_valid_encryption_materials_transition_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidEncryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub start: ::std::option::Option, -#[allow(missing_docs)] -pub stop: ::std::option::Option, + pub start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + #[allow(missing_docs)] + pub stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl ValidEncryptionMaterialsTransitionInput { #[allow(missing_docs)] -pub fn start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.stop + } } impl ValidEncryptionMaterialsTransitionInput { /// Creates a new builder-style object to manufacture [`ValidEncryptionMaterialsTransitionInput`](crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidEncryptionMaterialsTransitionInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidEncryptionMaterialsTransitionInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::ValidEncryptionMaterialsTransitionInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidEncryptionMaterialsTransitionInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidEncryptionMaterialsTransitionInputBuilder { - pub(crate) start: ::std::option::Option, -pub(crate) stop: ::std::option::Option, + pub(crate) start: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + pub(crate) stop: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, } impl ValidEncryptionMaterialsTransitionInputBuilder { #[allow(missing_docs)] -pub fn start(mut self, input: impl ::std::convert::Into) -> Self { - self.start = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_start(mut self, input: ::std::option::Option) -> Self { - self.start = input; - self -} -#[allow(missing_docs)] -pub fn get_start(&self) -> &::std::option::Option { - &self.start -} -#[allow(missing_docs)] -pub fn stop(mut self, input: impl ::std::convert::Into) -> Self { - self.stop = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_stop(mut self, input: ::std::option::Option) -> Self { - self.stop = input; - self -} -#[allow(missing_docs)] -pub fn get_stop(&self) -> &::std::option::Option { - &self.stop -} + pub fn start( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.start = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_start( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.start = input; + self + } + #[allow(missing_docs)] + pub fn get_start( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.start + } + #[allow(missing_docs)] + pub fn stop( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.stop = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_stop( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, + ) -> Self { + self.stop = input; + self + } + #[allow(missing_docs)] + pub fn get_stop( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + > { + &self.stop + } /// Consumes the builder and constructs a [`ValidEncryptionMaterialsTransitionInput`](crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput { start: self.start, stop: self.stop, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_decrypt_input.rs index 5a3d7a987..5cdfcb33f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_decrypt_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidateCommitmentPolicyOnDecryptInput { #[allow(missing_docs)] -pub algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, + pub algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnDecryptInput { #[allow(missing_docs)] -pub fn algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } } impl ValidateCommitmentPolicyOnDecryptInput { /// Creates a new builder-style object to manufacture [`ValidateCommitmentPolicyOnDecryptInput`](crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnDecryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnDecryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnDecryptInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidateCommitmentPolicyOnDecryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidateCommitmentPolicyOnDecryptInputBuilder { - pub(crate) algorithm: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, + pub(crate) algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnDecryptInputBuilder { #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } /// Consumes the builder and constructs a [`ValidateCommitmentPolicyOnDecryptInput`](crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput { algorithm: self.algorithm, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_encrypt_input.rs index cf9553e74..36eb671bd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/_validate_commitment_policy_on_encrypt_input.rs @@ -6,23 +6,35 @@ #[allow(missing_docs)] pub struct ValidateCommitmentPolicyOnEncryptInput { #[allow(missing_docs)] -pub algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub commitment_policy: ::std::option::Option, + pub algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + #[allow(missing_docs)] + pub commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnEncryptInput { #[allow(missing_docs)] -pub fn algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } } impl ValidateCommitmentPolicyOnEncryptInput { /// Creates a new builder-style object to manufacture [`ValidateCommitmentPolicyOnEncryptInput`](crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnEncryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnEncryptInputBuilder{ crate::deps::aws_cryptography_materialProviders::types::builders::ValidateCommitmentPolicyOnEncryptInputBuilder::default() } } @@ -33,45 +45,77 @@ impl ValidateCommitmentPolicyOnEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidateCommitmentPolicyOnEncryptInputBuilder { - pub(crate) algorithm: ::std::option::Option, -pub(crate) commitment_policy: ::std::option::Option, + pub(crate) algorithm: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + pub(crate) commitment_policy: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, } impl ValidateCommitmentPolicyOnEncryptInputBuilder { #[allow(missing_docs)] -pub fn algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_algorithm(mut self, input: ::std::option::Option) -> Self { - self.algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_algorithm(&self) -> &::std::option::Option { - &self.algorithm -} -#[allow(missing_docs)] -pub fn commitment_policy(mut self, input: impl ::std::convert::Into) -> Self { - self.commitment_policy = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_commitment_policy(mut self, input: ::std::option::Option) -> Self { - self.commitment_policy = input; - self -} -#[allow(missing_docs)] -pub fn get_commitment_policy(&self) -> &::std::option::Option { - &self.commitment_policy -} + pub fn algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, + ) -> Self { + self.algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + > { + &self.algorithm + } + #[allow(missing_docs)] + pub fn commitment_policy( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_commitment_policy( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, + ) -> Self { + self.commitment_policy = input; + self + } + #[allow(missing_docs)] + pub fn get_commitment_policy( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + > { + &self.commitment_policy + } /// Consumes the builder and constructs a [`ValidateCommitmentPolicyOnEncryptInput`](crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput { algorithm: self.algorithm, commitment_policy: self.commitment_policy, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/branch_key_id_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/branch_key_id_supplier.rs index a5bc831e2..5976f08a7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/branch_key_id_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/branch_key_id_supplier.rs @@ -3,7 +3,7 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait BranchKeyIdSupplier { +pub trait BranchKeyIdSupplier: Send + Sync { fn get_branch_key_id( &self, input: crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput, @@ -16,18 +16,20 @@ pub trait BranchKeyIdSupplier { #[derive(::std::clone::Clone)] /// A reference to a BranchKeyIdSupplier pub struct BranchKeyIdSupplierRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for BranchKeyIdSupplierRef { +impl From for BranchKeyIdSupplierRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for BranchKeyIdSupplierRef { fn eq(&self, other: &BranchKeyIdSupplierRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier.rs index 22a186c68..8bba21b0d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier.rs @@ -3,31 +3,33 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait ClientSupplier { +pub trait ClientSupplier: Send + Sync { fn get_client( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, - ) -> Result< - crate::deps::com_amazonaws_kms::client::Client, - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, + ) -> Result< + crate::deps::com_amazonaws_kms::client::Client, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + >; } #[derive(::std::clone::Clone)] /// A reference to a ClientSupplier pub struct ClientSupplierRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for ClientSupplierRef { +impl From for ClientSupplierRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for ClientSupplierRef { fn eq(&self, other: &ClientSupplierRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier/get_client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier/get_client.rs index e05a1a060..3e18174d1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier/get_client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/client_supplier/get_client.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_materialProviders::types::client_supplier::Cl /// - On success, responds with [`GetClientOutput`](crate::operation::get_client::GetClientOutput) with field(s): /// - [`client(Option)`](crate::operation::get_client::GetClientOutput::client): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_client::GetClientError) - pub fn get_client(&self) -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientFluentBuilder { + pub fn get_client(&self) -> crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::get_client::builders::GetClientFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_cache.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_cache.rs index 4521824f8..31397a806 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_cache.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_cache.rs @@ -3,24 +3,18 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait CryptographicMaterialsCache { +pub trait CryptographicMaterialsCache: Send + Sync { fn put_cache_entry( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput, - ) -> Result< - (), - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput, + ) -> Result<(), crate::deps::aws_cryptography_materialProviders::types::error::Error>; - fn update_usage_metadata( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput, - ) -> Result< - (), - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; + fn update_usage_metadata( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput, + ) -> Result<(), crate::deps::aws_cryptography_materialProviders::types::error::Error>; - fn get_cache_entry( + fn get_cache_entry( &self, input: crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput, ) -> Result< @@ -28,30 +22,29 @@ pub trait CryptographicMaterialsCache { crate::deps::aws_cryptography_materialProviders::types::error::Error, >; - fn delete_cache_entry( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput, - ) -> Result< - (), - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; + fn delete_cache_entry( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput, + ) -> Result<(), crate::deps::aws_cryptography_materialProviders::types::error::Error>; } #[derive(::std::clone::Clone)] /// A reference to a CryptographicMaterialsCache pub struct CryptographicMaterialsCacheRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for CryptographicMaterialsCacheRef { +impl From for CryptographicMaterialsCacheRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for CryptographicMaterialsCacheRef { fn eq(&self, other: &CryptographicMaterialsCacheRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_manager.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_manager.rs index 9e9b06713..09fe34c2f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_manager.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/cryptographic_materials_manager.rs @@ -3,7 +3,7 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait CryptographicMaterialsManager { +pub trait CryptographicMaterialsManager: Send + Sync { fn get_encryption_materials( &self, input: crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput, @@ -12,7 +12,7 @@ pub trait CryptographicMaterialsManager { crate::deps::aws_cryptography_materialProviders::types::error::Error, >; - fn decrypt_materials( + fn decrypt_materials( &self, input: crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput, ) -> Result< @@ -24,18 +24,20 @@ pub trait CryptographicMaterialsManager { #[derive(::std::clone::Clone)] /// A reference to a CryptographicMaterialsManager pub struct CryptographicMaterialsManagerRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for CryptographicMaterialsManagerRef { +impl From for CryptographicMaterialsManagerRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for CryptographicMaterialsManagerRef { fn eq(&self, other: &CryptographicMaterialsManagerRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/error.rs index b13185f69..6be7d1055 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/error.rs @@ -4,85 +4,85 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -AwsCryptographicMaterialProvidersException { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -EntryAlreadyExists { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -EntryDoesNotExist { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InFlightTtlExceeded { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidAlgorithmSuiteInfo { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidAlgorithmSuiteInfoOnDecrypt { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidAlgorithmSuiteInfoOnEncrypt { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidDecryptionMaterials { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidDecryptionMaterialsTransition { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidEncryptionMaterials { - message: ::std::string::String, -}, - -#[allow(missing_docs)] -InvalidEncryptionMaterialsTransition { - message: ::std::string::String, -}, - -AwsCryptographicPrimitivesError { - error: crate::deps::aws_cryptography_primitives::types::error::Error, -}, - -DynamoDB_20120810Error { - error: crate::deps::com_amazonaws_dynamodb::types::error::Error, -}, - -TrentServiceError { - error: crate::deps::com_amazonaws_kms::types::error::Error, -}, - -KeyStoreError { - error: crate::deps::aws_cryptography_keyStore::types::error::Error, -}, + AwsCryptographicMaterialProvidersException { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + EntryAlreadyExists { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + EntryDoesNotExist { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InFlightTtlExceeded { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidAlgorithmSuiteInfo { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidAlgorithmSuiteInfoOnDecrypt { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidAlgorithmSuiteInfoOnEncrypt { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidDecryptionMaterials { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidDecryptionMaterialsTransition { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidEncryptionMaterials { + message: ::std::string::String, + }, + + #[allow(missing_docs)] + InvalidEncryptionMaterialsTransition { + message: ::std::string::String, + }, + + AwsCryptographicPrimitivesError { + error: crate::deps::aws_cryptography_primitives::types::error::Error, + }, + + DynamoDB_20120810Error { + error: crate::deps::com_amazonaws_dynamodb::types::error::Error, + }, + + TrentServiceError { + error: crate::deps::com_amazonaws_kms::types::error::Error, + }, + + KeyStoreError { + error: crate::deps::aws_cryptography_keyStore::types::error::Error, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -110,18 +110,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring.rs index fdc6253e2..603a1282c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring.rs @@ -3,39 +3,41 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(missing_docs)] -pub trait Keyring { +pub trait Keyring: Send + Sync { fn on_encrypt( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, - ) -> Result< - crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; - - fn on_decrypt( - &self, - input: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, - ) -> Result< - crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, - crate::deps::aws_cryptography_materialProviders::types::error::Error, - >; + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, + ) -> Result< + crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + >; + + fn on_decrypt( + &self, + input: crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, + ) -> Result< + crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, + crate::deps::aws_cryptography_materialProviders::types::error::Error, + >; } #[derive(::std::clone::Clone)] /// A reference to a Keyring pub struct KeyringRef { - pub inner: ::std::rc::Rc> + pub inner: ::dafny_runtime::Rc<::dafny_runtime::RefCell>, } -impl From for KeyringRef { +impl From for KeyringRef { fn from(value: T) -> Self { - Self { inner: std::rc::Rc::new(std::cell::RefCell::new(value)) } + Self { + inner: dafny_runtime::Rc::new(::dafny_runtime::RefCell::new(value)), + } } } impl ::std::cmp::PartialEq for KeyringRef { fn eq(&self, other: &KeyringRef) -> bool { - ::std::rc::Rc::ptr_eq(&self.inner, &other.inner) + ::dafny_runtime::Rc::ptr_eq(&self.inner, &other.inner) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_decrypt.rs index 3adcc6c9d..f8ef62e20 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_decrypt.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef /// - On success, responds with [`OnDecryptOutput`](crate::operation::on_decrypt::OnDecryptOutput) with field(s): /// - [`materials(Option)`](crate::operation::on_decrypt::OnDecryptOutput::materials): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::on_decrypt::OnDecryptError) - pub fn on_decrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptFluentBuilder { + pub fn on_decrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::builders::OnDecryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_encrypt.rs index d2d53481e..ac6bdbce3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/keyring/on_encrypt.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef /// - On success, responds with [`OnEncryptOutput`](crate::operation::on_encrypt::OnEncryptOutput) with field(s): /// - [`materials(Option)`](crate::operation::on_encrypt::OnEncryptOutput::materials): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::on_encrypt::OnEncryptError) - pub fn on_encrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptFluentBuilder { + pub fn on_encrypt(&self) -> crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptFluentBuilder{ crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::builders::OnEncryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/material_providers_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/material_providers_config.rs index ce505a466..8ea72cccc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/material_providers_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/types/material_providers_config.rs @@ -4,15 +4,11 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct MaterialProvidersConfig { - -} -impl MaterialProvidersConfig { - -} +pub struct MaterialProvidersConfig {} +impl MaterialProvidersConfig {} impl MaterialProvidersConfig { /// Creates a new builder-style object to manufacture [`MaterialProvidersConfig`](crate::deps::aws_cryptography_materialProviders::types::MaterialProvidersConfig). - pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfigBuilder { + pub fn builder() -> crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfigBuilder{ crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfigBuilder::default() } } @@ -22,18 +18,15 @@ impl MaterialProvidersConfig { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct MaterialProvidersConfigBuilder { - -} +pub struct MaterialProvidersConfigBuilder {} impl MaterialProvidersConfigBuilder { - /// Consumes the builder and constructs a [`MaterialProvidersConfig`](crate::deps::aws_cryptography_materialProviders::types::MaterialProvidersConfig). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig { }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/validation.rs index e9d12b768..f3a45abef 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_materialProviders/validation.rs @@ -1,4537 +1,5423 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(&input.beacon_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.beacon_key)?; -validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.hmac_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "beacon_key_identifier", - "beacon_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(&input.branch_key_identifier)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(&input.branch_key_version)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.branch_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key", - "branch_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_identifier", - "branch_key_identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_version", - "branch_key_version is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input: &::std::collections::HashMap<::std::string::String, ::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?; - validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?; - validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAccountIdList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HAccountIdList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAccountIdList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DESDK(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DDBE(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DDBE(input: &crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DESDK(input: &crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo(input: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did(&input.id)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId(&input.binary_id)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion(&input.message_version)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt(&input.encrypt)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf(&input.kdf)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment(&input.commitment)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature(&input.signature)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature(&input.symmetric_signature)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping(&input.edk_wrapping)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_for_AwsCryptographicMaterialProviders_ValidAlgorithmSuiteInfo(input: &crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did(&input.id)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId(&input.binary_id)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion(&input.message_version)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt(&input.encrypt)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf(&input.kdf)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment(&input.commitment)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature(&input.signature)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature(&input.symmetric_signature)?; -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping(&input.edk_wrapping)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "binary_id", - "binary_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "commitment", - "commitment is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "edk_wrapping", - "edk_wrapping is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypt", - "encrypt is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncrypt(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "id", - "id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kdf", - "kdf is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "message_version", - "message_version is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature", - "signature is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "symmetric_signature", - "symmetric_signature is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input: &crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType(input: &crate::deps::aws_cryptography_materialProviders::types::CacheType) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DDefault(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CacheType::No(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DNo(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DSingleThreaded(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DMultiThreaded(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DStormTracking(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCacheType_DShared(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DDefault(input: &crate::deps::aws_cryptography_materialProviders::types::DefaultCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDefaultCache(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DMultiThreaded(input: &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DNo(input: &crate::deps::aws_cryptography_materialProviders::types::NoCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HNoCache(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DShared(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DSingleThreaded(input: &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DStormTracking(input: &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input: &crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DESDK(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DDBE(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DDBE(input: &crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DESDK(input: &crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_client", - "kms_client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions(&input.regions)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions(&input.regions)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "regions", - "regions is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HRegionList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme(&input.key_agreement_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec(&input.curve_spec)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsEcdhKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme(&input.key_agreement_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec(&input.curve_spec)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "curve_spec", - "curve_spec is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_agreement_scheme", - "key_agreement_scheme is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_client", - "kms_client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId(&input.branch_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier(&input.branch_key_id_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore(&input.key_store)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds(&input.ttl_seconds)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache(&input.cache)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId(&input.partition_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsHierarchicalKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId(&input.branch_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier(&input.branch_key_id_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore(&input.key_store)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds(&input.ttl_seconds)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache(&input.cache)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId(&input.partition_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCacheType(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_store", - "key_store is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyStoreReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ttl_seconds", - "ttl_seconds is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "ttl_seconds", - "ttl_seconds failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_client", - "kms_client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_key_id", - "kms_key_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens(&input.grant_tokens)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion(&input.region)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens(&input.grant_tokens)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion(&input.region)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_client", - "kms_client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "region", - "region is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions(&input.regions)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions(&input.regions)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.discovery_filter)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "regions", - "regions is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HRegionList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_client", - "kms_client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_key_id", - "kms_key_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds(&input.kms_key_ids)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds(&input.kms_key_ids)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds(&input.kms_key_ids)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds(&input.kms_key_ids)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier(&input.client_supplier)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm(&input.encryption_algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsRsaKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId(&input.kms_key_id)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm(&input.encryption_algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient(&input.kms_client)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens(&input.grant_tokens)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_algorithm", - "encryption_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "kms_key_id", - "kms_key_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache(&input.cache)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_for_AwsCryptographicMaterialProviders_CreateCryptographicMaterialsCache(input: &crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache(&input.cache)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cache", - "cache is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCacheType(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_for_AwsCryptographicMaterialProviders_CreateCryptographicMaterialsCache(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials_cache", - "materials_cache is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_for_AwsCryptographicMaterialProviders_CreateDefaultCryptographicMaterialsManager(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials_manager", - "materials_manager is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierInput_for_AwsCryptographicMaterialProviders_CreateDefaultClientSupplier(input: &crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput(input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_for_AwsCryptographicMaterialProviders_CreateDefaultClientSupplier(input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "client", - "client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring(&input.keyring)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_for_AwsCryptographicMaterialProviders_CreateDefaultCryptographicMaterialsManager(input: &crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring(&input.keyring)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "keyring", - "keyring is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsHierarchicalKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawAesKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawRsaKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawEcdhKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsRsaKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsEcdhKeyring(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "keyring", - "keyring is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings(&input.child_keyrings)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateMultiKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator(&input.generator)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings(&input.child_keyrings)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "child_keyrings", - "child_keyrings is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace(&input.key_namespace)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName(&input.key_name)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey(&input.wrapping_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg(&input.wrapping_alg)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawAesKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace(&input.key_namespace)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName(&input.key_name)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey(&input.wrapping_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg(&input.wrapping_alg)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_name", - "key_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_namespace", - "key_namespace is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "wrapping_alg", - "wrapping_alg is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "wrapping_key", - "wrapping_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme(&input.key_agreement_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec(&input.curve_spec)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawEcdhKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme(&input.key_agreement_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec(&input.curve_spec)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "curve_spec", - "curve_spec is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_agreement_scheme", - "key_agreement_scheme is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace(&input.key_namespace)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName(&input.key_name)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme(&input.padding_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawRsaKeyring(input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace(&input.key_namespace)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName(&input.key_name)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme(&input.padding_scheme)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_name", - "key_name is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_namespace", - "key_namespace is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "padding_scheme", - "padding_scheme is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput(input: &crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM(&input.underlying_cmm)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring(&input.keyring)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_for_AwsCryptographicMaterialProviders_CreateRequiredEncryptionContextCMM(input: &crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM(&input.underlying_cmm)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring(&input.keyring)?; -validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "required_encryption_context_keys", - "required_encryption_context_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_for_AwsCryptographicMaterialProviders_CreateRequiredEncryptionContextCMM(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials_manager", - "materials_manager is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite(&input.algorithm_suite)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey(&input.plaintext_data_key)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey(&input.symmetric_signing_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_for_AwsCryptographicMaterialProviders_DecryptionMaterialsWithPlaintextDataKey(input: &crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite(&input.algorithm_suite)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey(&input.plaintext_data_key)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey(&input.symmetric_signing_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite", - "algorithm_suite is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "required_encryption_context_keys", - "required_encryption_context_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput(input: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy(&input.commitment_policy)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext(&input.reproduced_encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_for_CryptographicMaterialsManager_DecryptMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy(&input.commitment_policy)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext(&input.reproduced_encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite_id", - "algorithm_suite_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "commitment_policy", - "commitment_policy is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_keys", - "encrypted_data_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput(input: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials(&input.decryption_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_for_CryptographicMaterialsManager_DecryptMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials(&input.decryption_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "decryption_materials", - "decryption_materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDefaultCache(input: &crate::deps::aws_cryptography_materialProviders::types::DefaultCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDefaultCache_DentryCapacity(&input.entry_capacity)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDefaultCache_DentryCapacity(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "entry_capacity", - "entry_capacity is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "entry_capacity", - "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput(input: &crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier(&input.identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_for_CryptographicMaterialsCache_DeleteCacheEntry(input: &crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier(&input.identifier)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "identifier", - "identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input: &crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DHKDF(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DIDENTITY(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DNone(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DHKDF(input: &crate::deps::aws_cryptography_materialProviders::types::Hkdf) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HHKDF(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DIDENTITY(input: &crate::deps::aws_cryptography_materialProviders::types::Identity) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HIDENTITY(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DNone(input: &crate::deps::aws_cryptography_materialProviders::types::None) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDIRECT__KEY__WRAPPING(input: &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input: &crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_DaccountIds(&input.account_ids)?; -validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_Dpartition(&input.partition)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_DaccountIds(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "account_ids", - "account_ids is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAccountIdList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_Dpartition(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "partition", - "partition is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HECDSA(input: &crate::deps::aws_cryptography_materialProviders::types::Ecdsa) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HECDSA_Dcurve(&input.curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HECDSA_Dcurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "curve", - "curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm(input: &crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DDIRECT__KEY__WRAPPING(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DIntermediateKeyWrapping(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DDIRECT__KEY__WRAPPING(input: &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDIRECT__KEY__WRAPPING(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DIntermediateKeyWrapping(input: &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncrypt(input: &crate::deps::aws_cryptography_materialProviders::types::Encrypt) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HEncrypt_DAES__GCM(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncrypt_DAES__GCM(input: &crate::deps::aws_cryptography_primitives::types::AesGcm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(&input.key_provider_id)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(&input.key_provider_info)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(&input.ciphertext)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ciphertext", - "ciphertext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_id", - "key_provider_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_provider_info", - "key_provider_info is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input: &::std::collections::HashMap<::std::string::String, ::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for (inner_key, inner_val) in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite(&input.algorithm_suite)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey(&input.plaintext_data_key)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys(&input.symmetric_signing_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_for_AwsCryptographicMaterialProviders_EncryptionMaterialsHasPlaintextDataKey(input: &crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite(&input.algorithm_suite)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys(&input.encrypted_data_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey(&input.plaintext_data_key)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys(&input.symmetric_signing_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite", - "algorithm_suite is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_keys", - "encrypted_data_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "required_encryption_context_keys", - "required_encryption_context_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys(input: &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput(input: &crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.recipient_public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "recipient_public_key", - "recipient_public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_for_AwsCryptographicMaterialProviders_GetAlgorithmSuiteInfo(input: &crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfoInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId(&input.binary_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "binary_id", - "binary_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput(input: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_for_BranchKeyIdSupplier_GetBranchKeyId(input: &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext(&input.encryption_context)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput(input: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId(&input.branch_key_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_for_BranchKeyIdSupplier_GetBranchKeyId(input: &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId(&input.branch_key_id)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "branch_key_id", - "branch_key_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput(input: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_for_CryptographicMaterialsCache_GetCacheEntry(input: &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "identifier", - "identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput(input: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime(&input.creation_time)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime(&input.expiry_time)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed(&input.messages_used)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_for_CryptographicMaterialsCache_GetCacheEntry(input: &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime(&input.creation_time)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime(&input.expiry_time)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed(&input.messages_used)?; -validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "bytes_used", - "bytes_used is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "bytes_used", - "bytes_used failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "creation_time", - "creation_time is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "creation_time", - "creation_time failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "expiry_time", - "expiry_time is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "expiry_time", - "expiry_time failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "messages_used", - "messages_used is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "messages_used", - "messages_used failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput(input: &crate::deps::aws_cryptography_materialProviders::types::GetClientInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion(&input.region)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_for_ClientSupplier_GetClient(input: &crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion(&input.region)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "region", - "region is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput(input: &crate::deps::com_amazonaws_kms::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_for_ClientSupplier_GetClient(input: &crate::deps::com_amazonaws_kms::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "client", - "client is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput(input: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy(&input.commitment_policy)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength(&input.max_plaintext_length)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_for_CryptographicMaterialsManager_GetEncryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy(&input.commitment_policy)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength(&input.max_plaintext_length)?; -validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "commitment_policy", - "commitment_policy is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput(input: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials(&input.encryption_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_for_CryptographicMaterialsManager_GetEncryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials(&input.encryption_materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_materials", - "encryption_materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF(input: &crate::deps::aws_cryptography_materialProviders::types::Hkdf) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HHKDF_Dhmac(&input.hmac)?; -validate_aws_Pcryptography_PmaterialProviders_HHKDF_DsaltLength(&input.salt_length)?; -validate_aws_Pcryptography_PmaterialProviders_HHKDF_DinputKeyLength(&input.input_key_length)?; -validate_aws_Pcryptography_PmaterialProviders_HHKDF_DoutputKeyLength(&input.output_key_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_Dhmac(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "hmac", - "hmac is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DinputKeyLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "input_key_length", - "input_key_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "input_key_length", - "input_key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DoutputKeyLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "output_key_length", - "output_key_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "output_key_length", - "output_key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DsaltLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "salt_length", - "salt_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "salt_length", - "salt_length failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIDENTITY(input: &crate::deps::aws_cryptography_materialProviders::types::Identity) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput(input: &crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeDecryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite_id", - "algorithm_suite_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "required_encryption_context_keys", - "required_encryption_context_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput(input: &crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey(&input.verification_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeEncryptionMaterials(input: &crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId(&input.algorithm_suite_id)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext(&input.encryption_context)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.required_encryption_context_keys)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey(&input.verification_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm_suite_id", - "algorithm_suite_id is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext(input: &::std::option::Option<::std::collections::HashMap<::std::string::String, ::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encryption_context", - "encryption_context is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys(input: &::std::option::Option<::std::vec::Vec<::std::string::String>>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "required_encryption_context_keys", - "required_encryption_context_keys is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping(input: &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DkeyEncryptionKeyKdf(&input.key_encryption_key_kdf)?; -validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DmacKeyKdf(&input.mac_key_kdf)?; -validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DpdkEncryptAlgorithm(&input.pdk_encrypt_algorithm)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DkeyEncryptionKeyKdf(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_encryption_key_kdf", - "key_encryption_key_kdf is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DmacKeyKdf(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "mac_key_kdf", - "mac_key_kdf is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DpdkEncryptAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "pdk_encrypt_algorithm", - "pdk_encrypt_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncrypt(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringList(input: &::std::vec::Vec) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HKeyringList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringList_Dmember(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyStoreReference(input: &crate::deps::aws_cryptography_keyStore::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input: &crate::deps::com_amazonaws_kms::client::Client) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations(input: &crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPublicKeyDiscovery(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPrivateKeyToStaticPublicKey(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPrivateKeyToStaticPublicKey(input: &crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPublicKeyDiscovery(input: &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput(input: &crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderKmsIdentifier(&input.sender_kms_identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderPublicKey(&input.sender_public_key)?; -validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.recipient_public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "recipient_public_key", - "recipient_public_key is required but was not specified", +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials( + input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier( + &input.r#beacon_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey(&input.r#beacon_key)?; + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys(&input.r#hmac_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DbeaconKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "beacon_key_identifier", + "beacon_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials_DhmacKeys( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials( + input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier( + &input.r#branch_key_identifier, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion( + &input.r#branch_key_version, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey(&input.r#branch_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key", + "branch_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_identifier", + "branch_key_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DbranchKeyVersion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_version", + "branch_key_version is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PkeyStore_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext( + input: &::std::collections::HashMap<::std::string::String, ::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey(inner_key)?; + validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HEncryptionContext_Dvalue( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap( + input: &::std::collections::HashMap<::std::string::String, ::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey(inner_key)?; + validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PkeyStore_HHmacKeyMap_Dvalue( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAccountIdList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HAccountIdList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAccountIdList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId( + input: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Esdk( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DESDK(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId::Dbe( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DDBE(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DDBE( + input: &crate::deps::aws_cryptography_materialProviders::types::DbeAlgorithmSuiteId, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId_DESDK( + input: &crate::deps::aws_cryptography_materialProviders::types::EsdkAlgorithmSuiteId, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo( + input: &crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did(&input.r#id)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId( + &input.r#binary_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion( + &input.r#message_version, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt(&input.r#encrypt)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf(&input.r#kdf)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment( + &input.r#commitment, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature( + &input.r#signature, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature( + &input.r#symmetric_signature, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping( + &input.r#edk_wrapping, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_for_AwsCryptographicMaterialProviders_ValidAlgorithmSuiteInfo( + input: &crate::deps::aws_cryptography_materialProviders::operation::valid_algorithm_suite_info::AlgorithmSuiteInfo, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did(&input.r#id)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId( + &input.r#binary_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion( + &input.r#message_version, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt(&input.r#encrypt)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf(&input.r#kdf)?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment( + &input.r#commitment, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature( + &input.r#signature, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature( + &input.r#symmetric_signature, + )?; + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping( + &input.r#edk_wrapping, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DbinaryId( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "binary_id", + "binary_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dcommitment( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "commitment", + "commitment is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DedkWrapping( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "edk_wrapping", + "edk_wrapping is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dencrypt( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypt", + "encrypt is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncrypt(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Did( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "id", + "id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dkdf( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kdf", + "kdf is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DmessageVersion( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "message_version", + "message_version is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_Dsignature( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature", + "signature is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo_DsymmetricSignature( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "symmetric_signature", + "symmetric_signature is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference( + input: &crate::deps::aws_cryptography_materialProviders::types::branch_key_id_supplier::BranchKeyIdSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType( + input: &crate::deps::aws_cryptography_materialProviders::types::CacheType, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Default(ref inner) = + &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DDefault(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::No(ref inner) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DNo(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::SingleThreaded( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DSingleThreaded(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::MultiThreaded( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DMultiThreaded(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::StormTracking( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DStormTracking(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CacheType::Shared(ref inner) = + &input + { + validate_aws_Pcryptography_PmaterialProviders_HCacheType_DShared(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DDefault( + input: &crate::deps::aws_cryptography_materialProviders::types::DefaultCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDefaultCache(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DMultiThreaded( + input: &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DNo( + input: &crate::deps::aws_cryptography_materialProviders::types::NoCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HNoCache(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DShared( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DSingleThreaded( + input: &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCacheType_DStormTracking( + input: &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference( + input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy( + input: &crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Esdk( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DESDK(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy::Dbe( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DDBE(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DDBE( + input: &crate::deps::aws_cryptography_materialProviders::types::DbeCommitmentPolicy, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy_DESDK( + input: &crate::deps::aws_cryptography_materialProviders::types::EsdkCommitmentPolicy, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_keyring::CreateAwsKmsDiscoveryKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DdiscoveryFilter( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_client", + "kms_client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsDiscoveryMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions( + &input.r#regions, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_discovery_multi_keyring::CreateAwsKmsDiscoveryMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions( + &input.r#regions, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DclientSupplier( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DdiscoveryFilter( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsDiscoveryMultiKeyringInput_Dregions( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "regions", + "regions is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HRegionList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsEcdhKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme(&input.r#key_agreement_scheme)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec( + &input.r#curve_spec, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsEcdhKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_ecdh_keyring::CreateAwsKmsEcdhKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme(&input.r#key_agreement_scheme)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec( + &input.r#curve_spec, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DcurveSpec( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "curve_spec", + "curve_spec is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DKeyAgreementScheme( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_agreement_scheme", + "key_agreement_scheme is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsEcdhKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_client", + "kms_client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsHierarchicalKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId(&input.r#branch_key_id)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier(&input.r#branch_key_id_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore( + &input.r#key_store, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds(&input.r#ttl_seconds)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache( + &input.r#cache, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId(&input.r#partition_id)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsHierarchicalKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_hierarchical_keyring::CreateAwsKmsHierarchicalKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId(&input.r#branch_key_id)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier(&input.r#branch_key_id_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore( + &input.r#key_store, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds(&input.r#ttl_seconds)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache( + &input.r#cache, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId(&input.r#partition_id)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DbranchKeyIdSupplier( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HBranchKeyIdSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_Dcache( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCacheType(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DkeyStore( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_store", + "key_store is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyStoreReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DpartitionId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsHierarchicalKeyringInput_DttlSeconds( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ttl_seconds", + "ttl_seconds is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "ttl_seconds", + "ttl_seconds failed to satisfy constraint: Member must be greater than or equal to 0", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderKmsIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "sender_kms_identifier", - "sender_kms_identifier is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_keyring::CreateAwsKmsKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_client", + "kms_client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsKeyringInput_DkmsKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_key_id", + "kms_key_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion( + &input.r#region, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_keyring::CreateAwsKmsMrkDiscoveryKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion( + &input.r#region, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DdiscoveryFilter( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_client", + "kms_client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryKeyringInput_Dregion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "region", + "region is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions(&input.r#regions)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_discovery_multi_keyring::CreateAwsKmsMrkDiscoveryMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions(&input.r#regions)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter(&input.r#discovery_filter)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens(&input.r#grant_tokens)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DclientSupplier( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DdiscoveryFilter( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkDiscoveryMultiKeyringInput_Dregions( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "regions", + "regions is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HRegionList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_keyring::CreateAwsKmsMrkKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_client", + "kms_client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkKeyringInput_DkmsKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_key_id", + "kms_key_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMrkMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds( + &input.r#kms_key_ids, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_mrk_multi_keyring::CreateAwsKmsMrkMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds( + &input.r#kms_key_ids, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier(&input.r#client_supplier)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DclientSupplier( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_Dgenerator( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMrkMultiKeyringInput_DkmsKeyIds( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds( + &input.r#kms_key_ids, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier( + &input.r#client_supplier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_multi_keyring::CreateAwsKmsMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds( + &input.r#kms_key_ids, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier( + &input.r#client_supplier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DclientSupplier( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_Dgenerator( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsMultiKeyringInput_DkmsKeyIds( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateAwsKmsRsaKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm(&input.r#encryption_algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateAwsKmsRsaKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_aws_kms_rsa_keyring::CreateAwsKmsRsaKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId( + &input.r#kms_key_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm(&input.r#encryption_algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient( + &input.r#kms_client, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens( + &input.r#grant_tokens, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DencryptionAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_algorithm", + "encryption_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DgrantTokens( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsClient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DkmsKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "kms_key_id", + "kms_key_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateAwsKmsRsaKeyringInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateCryptographicMaterialsCacheInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache( + &input.r#cache, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_for_AwsCryptographicMaterialProviders_CreateCryptographicMaterialsCache( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_cryptographic_materials_cache::CreateCryptographicMaterialsCacheInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache( + &input.r#cache, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheInput_Dcache( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CacheType, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cache", + "cache is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCacheType(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_for_AwsCryptographicMaterialProviders_CreateCryptographicMaterialsCache( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsCacheOutput_DmaterialsCache( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials_cache", + "materials_cache is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_for_AwsCryptographicMaterialProviders_CreateDefaultCryptographicMaterialsManager( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateCryptographicMaterialsManagerOutput_DmaterialsManager( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials_manager", + "materials_manager is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultClientSupplierInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierInput_for_AwsCryptographicMaterialProviders_CreateDefaultClientSupplier( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_default_client_supplier::CreateDefaultClientSupplierInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient( + &Some(input.clone()), + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_for_AwsCryptographicMaterialProviders_CreateDefaultClientSupplier( + input: &crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient( + &Some(input.clone()), + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultClientSupplierOutput_Dclient( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::client_supplier::ClientSupplierRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "client", + "client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HClientSupplierReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateDefaultCryptographicMaterialsManagerInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring(&input.r#keyring)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_for_AwsCryptographicMaterialProviders_CreateDefaultCryptographicMaterialsManager( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_default_cryptographic_materials_manager::CreateDefaultCryptographicMaterialsManagerInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring(&input.r#keyring)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateDefaultCryptographicMaterialsManagerInput_Dkeyring( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "keyring", + "keyring is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsHierarchicalKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawAesKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawRsaKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateRawEcdhKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMrkDiscoveryMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsRsaKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsDiscoveryKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_for_AwsCryptographicMaterialProviders_CreateAwsKmsEcdhKeyring( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateKeyringOutput_Dkeyring( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "keyring", + "keyring is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings( + &input.r#child_keyrings, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_for_AwsCryptographicMaterialProviders_CreateMultiKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_multi_keyring::CreateMultiKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator( + &input.r#generator, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings( + &input.r#child_keyrings, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_DchildKeyrings( + input: &::std::option::Option< + ::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "child_keyrings", + "child_keyrings is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateMultiKeyringInput_Dgenerator( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawAesKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace( + &input.r#key_namespace, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName( + &input.r#key_name, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey( + &input.r#wrapping_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg( + &input.r#wrapping_alg, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawAesKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_aes_keyring::CreateRawAesKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace( + &input.r#key_namespace, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName( + &input.r#key_name, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey( + &input.r#wrapping_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg( + &input.r#wrapping_alg, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_name", + "key_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DkeyNamespace( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_namespace", + "key_namespace is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingAlg( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AesWrappingAlg, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "wrapping_alg", + "wrapping_alg is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawAesKeyringInput_DwrappingKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "wrapping_key", + "wrapping_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawEcdhKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme( + &input.r#key_agreement_scheme, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec( + &input.r#curve_spec, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawEcdhKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_ecdh_keyring::CreateRawEcdhKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme( + &input.r#key_agreement_scheme, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec( + &input.r#curve_spec, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DcurveSpec( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "curve_spec", + "curve_spec is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawEcdhKeyringInput_DKeyAgreementScheme( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_agreement_scheme", + "key_agreement_scheme is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateRawRsaKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace( + &input.r#key_namespace, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName( + &input.r#key_name, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme( + &input.r#padding_scheme, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_for_AwsCryptographicMaterialProviders_CreateRawRsaKeyring( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_raw_rsa_keyring::CreateRawRsaKeyringInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace( + &input.r#key_namespace, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName( + &input.r#key_name, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme( + &input.r#padding_scheme, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyName( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_name", + "key_name is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DkeyNamespace( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_namespace", + "key_namespace is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpaddingScheme( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::PaddingScheme, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "padding_scheme", + "padding_scheme is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DprivateKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRawRsaKeyringInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput( + input: &crate::deps::aws_cryptography_materialProviders::types::CreateRequiredEncryptionContextCmmInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM(&input.r#underlying_cmm)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring(&input.r#keyring)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_for_AwsCryptographicMaterialProviders_CreateRequiredEncryptionContextCMM( + input: &crate::deps::aws_cryptography_materialProviders::operation::create_required_encryption_context_cmm::CreateRequiredEncryptionContextCmmInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM(&input.r#underlying_cmm)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring(&input.r#keyring)?; + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_Dkeyring( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "required_encryption_context_keys", + "required_encryption_context_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMInput_DunderlyingCMM( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_for_AwsCryptographicMaterialProviders_CreateRequiredEncryptionContextCMM( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCreateRequiredEncryptionContextCMMOutput_DmaterialsManager( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials_manager", + "materials_manager is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsCacheReference( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_cache::CryptographicMaterialsCacheRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HCryptographicMaterialsManagerReference( + input: &crate::deps::aws_cryptography_materialProviders::types::cryptographic_materials_manager::CryptographicMaterialsManagerRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite( + &input.r#algorithm_suite, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey( + &input.r#plaintext_data_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey( + &input.r#symmetric_signing_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_for_AwsCryptographicMaterialProviders_DecryptionMaterialsWithPlaintextDataKey( + input: &crate::deps::aws_cryptography_materialProviders::operation::decryption_materials_with_plaintext_data_key::DecryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite( + &input.r#algorithm_suite, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey( + &input.r#plaintext_data_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey( + &input.r#symmetric_signing_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DalgorithmSuite( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite", + "algorithm_suite is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DplaintextDataKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "required_encryption_context_keys", + "required_encryption_context_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DsymmetricSigningKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials_DverificationKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput( + input: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId( + &input.r#algorithm_suite_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy( + &input.r#commitment_policy, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext(&input.r#reproduced_encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_for_CryptographicMaterialsManager_DecryptMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId( + &input.r#algorithm_suite_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy( + &input.r#commitment_policy, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext(&input.r#reproduced_encryption_context)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite_id", + "algorithm_suite_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DcommitmentPolicy( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "commitment_policy", + "commitment_policy is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptedDataKeys( + input: &::std::option::Option< + ::std::vec::Vec, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_keys", + "encrypted_data_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsInput_DreproducedEncryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::DecryptMaterialsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials( + &input.r#decryption_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_for_CryptographicMaterialsManager_DecryptMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::decrypt_materials::DecryptMaterialsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials( + &input.r#decryption_materials, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDecryptMaterialsOutput_DdecryptionMaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "decryption_materials", + "decryption_materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDefaultCache( + input: &crate::deps::aws_cryptography_materialProviders::types::DefaultCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDefaultCache_DentryCapacity( + &input.r#entry_capacity, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDefaultCache_DentryCapacity( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "entry_capacity", + "entry_capacity is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "entry_capacity", + "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", )); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput( + input: &crate::deps::aws_cryptography_materialProviders::types::DeleteCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_for_CryptographicMaterialsCache_DeleteCacheEntry( + input: &crate::deps::aws_cryptography_materialProviders::operation::delete_cache_entry::DeleteCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDeleteCacheEntryInput_Didentifier( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "identifier", + "identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm( + input: &crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Hkdf( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DHKDF(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::Identity( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DIDENTITY(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm::None( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DNone(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DHKDF( + input: &crate::deps::aws_cryptography_materialProviders::types::Hkdf, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HHKDF(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DIDENTITY( + input: &crate::deps::aws_cryptography_materialProviders::types::Identity, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HIDENTITY(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm_DNone( + input: &crate::deps::aws_cryptography_materialProviders::types::None, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDIRECT__KEY__WRAPPING( + input: &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter( + input: &crate::deps::aws_cryptography_materialProviders::types::DiscoveryFilter, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_DaccountIds( + &input.r#account_ids, + )?; + validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_Dpartition(&input.r#partition)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_DaccountIds( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "account_ids", + "account_ids is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAccountIdList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HDiscoveryFilter_Dpartition( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "partition", + "partition is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HECDSA( + input: &crate::deps::aws_cryptography_materialProviders::types::Ecdsa, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HECDSA_Dcurve(&input.r#curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HECDSA_Dcurve( + input: &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "curve", + "curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm( + input: &crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::DirectKeyWrapping(ref inner) = &input { + validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DDIRECT__KEY__WRAPPING(inner)?; } -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput(input: &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput_DrecipientKmsIdentifier(&input.recipient_kms_identifier)?; - Ok(()) + if let crate::deps::aws_cryptography_materialProviders::types::EdkWrappingAlgorithm::IntermediateKeyWrapping(ref inner) = &input { + validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DIntermediateKeyWrapping(inner)?; } -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput_DrecipientKmsIdentifier(input: &::std::option::Option<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "recipient_kms_identifier", - "recipient_kms_identifier is required but was not specified", + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DDIRECT__KEY__WRAPPING( + input: &crate::deps::aws_cryptography_materialProviders::types::DirectKeyWrapping, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDIRECT__KEY__WRAPPING(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEdkWrappingAlgorithm_DIntermediateKeyWrapping( + input: &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncrypt( + input: &crate::deps::aws_cryptography_materialProviders::types::Encrypt, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::Encrypt::AesGcm(ref inner) = + &input + { + validate_aws_Pcryptography_PmaterialProviders_HEncrypt_DAES__GCM(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncrypt_DAES__GCM( + input: &crate::deps::aws_cryptography_primitives::types::AesGcm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + &input.r#key_provider_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + &input.r#key_provider_info, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + &input.r#ciphertext, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_Dciphertext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ciphertext", + "ciphertext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_id", + "key_provider_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey_DkeyProviderInfo( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_provider_info", + "key_provider_info is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList_Dmember( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptedDataKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext( + input: &::std::collections::HashMap<::std::string::String, ::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for (inner_key, inner_val) in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey(inner_key)?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue(inner_val)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dkey( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext_Dvalue( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite( + &input.r#algorithm_suite, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey( + &input.r#plaintext_data_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey( + &input.r#signing_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys( + &input.r#symmetric_signing_keys, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_for_AwsCryptographicMaterialProviders_EncryptionMaterialsHasPlaintextDataKey( + input: &crate::deps::aws_cryptography_materialProviders::operation::encryption_materials_has_plaintext_data_key::EncryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite( + &input.r#algorithm_suite, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey( + &input.r#plaintext_data_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey( + &input.r#signing_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys( + &input.r#symmetric_signing_keys, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DalgorithmSuite( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteInfo, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite", + "algorithm_suite is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteInfo(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptedDataKeys( + input: &::std::option::Option< + ::std::vec::Vec, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_keys", + "encrypted_data_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DplaintextDataKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "required_encryption_context_keys", + "required_encryption_context_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsigningKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials_DsymmetricSigningKeys( + input: &::std::option::Option<::std::vec::Vec<::aws_smithy_types::Blob>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput( + input: &crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.r#recipient_public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "recipient_public_key", + "recipient_public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId(&Some( + input.clone(), + ))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_for_AwsCryptographicMaterialProviders_GetAlgorithmSuiteInfo( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_algorithm_suite_info::GetAlgorithmSuiteInfoInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId( + &input.r#binary_id, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetAlgorithmSuiteInfoInput_DbinaryId( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "binary_id", + "binary_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext( + &input.r#encryption_context, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_for_BranchKeyIdSupplier_GetBranchKeyId( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext( + &input.r#encryption_context, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetBranchKeyIdOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId( + &input.r#branch_key_id, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_for_BranchKeyIdSupplier_GetBranchKeyId( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_branch_key_id::GetBranchKeyIdOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId( + &input.r#branch_key_id, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetBranchKeyIdOutput_DbranchKeyId( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "branch_key_id", + "branch_key_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_for_CryptographicMaterialsCache_GetCacheEntry( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_DbytesUsed( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryInput_Didentifier( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "identifier", + "identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetCacheEntryOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials( + &input.r#materials, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime( + &input.r#creation_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime( + &input.r#expiry_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed( + &input.r#messages_used, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_for_CryptographicMaterialsCache_GetCacheEntry( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_cache_entry::GetCacheEntryOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials( + &input.r#materials, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime( + &input.r#creation_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime( + &input.r#expiry_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed( + &input.r#messages_used, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DbytesUsed( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "bytes_used", + "bytes_used is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "bytes_used", + "bytes_used failed to satisfy constraint: Member must be greater than or equal to 0", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterialProvidersConfig(input: &crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials(input: &crate::deps::aws_cryptography_materialProviders::types::Materials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HMaterials_DEncryption(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HMaterials_DDecryption(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBranchKey(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBeaconKey(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBeaconKey(input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBranchKey(input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DDecryption(input: &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DEncryption(input: &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache(input: &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryCapacity(&input.entry_capacity)?; -validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryPruningTailSize(&input.entry_pruning_tail_size)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryCapacity(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "entry_capacity", - "entry_capacity is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DcreationTime( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "creation_time", + "creation_time is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "creation_time", + "creation_time failed to satisfy constraint: Member must be greater than or equal to 0", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "entry_capacity", - "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DexpiryTime( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expiry_time", + "expiry_time is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "expiry_time", + "expiry_time failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryPruningTailSize(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "entry_pruning_tail_size", - "entry_pruning_tail_size failed to satisfy constraint: Member must be greater than or equal to 1", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetCacheEntryOutput_DmessagesUsed( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "messages_used", + "messages_used is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "messages_used", + "messages_used failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HNoCache(input: &crate::deps::aws_cryptography_materialProviders::types::NoCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HNone(input: &crate::deps::aws_cryptography_materialProviders::types::None) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput(input: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys(&input.encrypted_data_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_for_Keyring_OnDecrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys(&input.encrypted_data_keys)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys(input: &::std::option::Option<::std::vec::Vec>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "encrypted_data_keys", - "encrypted_data_keys is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetClientInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion(&input.r#region)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_for_ClientSupplier_GetClient( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_client::GetClientInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion(&input.r#region)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientInput_Dregion( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "region", + "region is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput( + input: &crate::deps::com_amazonaws_kms::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_for_ClientSupplier_GetClient( + input: &crate::deps::com_amazonaws_kms::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetClientOutput_Dclient( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "client", + "client is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy( + &input.r#commitment_policy, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId( + &input.r#algorithm_suite_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength( + &input.r#max_plaintext_length, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_for_CryptographicMaterialsManager_GetEncryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext( + &input.r#encryption_context, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy( + &input.r#commitment_policy, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId( + &input.r#algorithm_suite_id, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength( + &input.r#max_plaintext_length, + )?; + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DcommitmentPolicy( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "commitment_policy", + "commitment_policy is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DmaxPlaintextLength( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsInput_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::GetEncryptionMaterialsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials(&input.r#encryption_materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_for_CryptographicMaterialsManager_GetEncryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::get_encryption_materials::GetEncryptionMaterialsOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials(&input.r#encryption_materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGetEncryptionMaterialsOutput_DencryptionMaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_materials", + "encryption_materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HGrantTokenList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF( + input: &crate::deps::aws_cryptography_materialProviders::types::Hkdf, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HHKDF_Dhmac(&input.r#hmac)?; + validate_aws_Pcryptography_PmaterialProviders_HHKDF_DsaltLength(&input.r#salt_length)?; + validate_aws_Pcryptography_PmaterialProviders_HHKDF_DinputKeyLength(&input.r#input_key_length)?; + validate_aws_Pcryptography_PmaterialProviders_HHKDF_DoutputKeyLength( + &input.r#output_key_length, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_Dhmac( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "hmac", + "hmac is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DinputKeyLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "input_key_length", + "input_key_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "input_key_length", + "input_key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DoutputKeyLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "output_key_length", + "output_key_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "output_key_length", + "output_key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput(input: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_for_Keyring_OnDecrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HHKDF_DsaltLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "salt_length", + "salt_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "salt_length", + "salt_length failed to satisfy constraint: Member must be greater than or equal to 0", )); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIDENTITY( + input: &crate::deps::aws_cryptography_materialProviders::types::Identity, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput( + input: &crate::deps::aws_cryptography_materialProviders::types::InitializeDecryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext(&input.r#encryption_context)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeDecryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::initialize_decryption_materials::InitializeDecryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext(&input.r#encryption_context)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite_id", + "algorithm_suite_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeDecryptionMaterialsInput_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "required_encryption_context_keys", + "required_encryption_context_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput( + input: &crate::deps::aws_cryptography_materialProviders::types::InitializeEncryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext(&input.r#encryption_context)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey( + &input.r#signing_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey(&input.r#verification_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_for_AwsCryptographicMaterialProviders_InitializeEncryptionMaterials( + input: &crate::deps::aws_cryptography_materialProviders::operation::initialize_encryption_materials::InitializeEncryptionMaterialsInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId(&input.r#algorithm_suite_id)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext(&input.r#encryption_context)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys(&input.r#required_encryption_context_keys)?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey( + &input.r#signing_key, + )?; + validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey(&input.r#verification_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DalgorithmSuiteId( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm_suite_id", + "algorithm_suite_id is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DencryptionContext( + input: &::std::option::Option< + ::std::collections::HashMap<::std::string::String, ::std::string::String>, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encryption_context", + "encryption_context is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContext(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DrequiredEncryptionContextKeys( + input: &::std::option::Option<::std::vec::Vec<::std::string::String>>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "required_encryption_context_keys", + "required_encryption_context_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionContextKeys(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DsigningKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HInitializeEncryptionMaterialsInput_DverificationKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping( + input: &crate::deps::aws_cryptography_materialProviders::types::IntermediateKeyWrapping, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DkeyEncryptionKeyKdf( + &input.r#key_encryption_key_kdf, + )?; + validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DmacKeyKdf( + &input.r#mac_key_kdf, + )?; + validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DpdkEncryptAlgorithm( + &input.r#pdk_encrypt_algorithm, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DkeyEncryptionKeyKdf( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_encryption_key_kdf", + "key_encryption_key_kdf is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DmacKeyKdf( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DerivationAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "mac_key_kdf", + "mac_key_kdf is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDerivationAlgorithm(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HIntermediateKeyWrapping_DpdkEncryptAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "pdk_encrypt_algorithm", + "pdk_encrypt_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncrypt(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringList( + input: &::std::vec::Vec< + crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HKeyringList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringList_Dmember( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HKeyringReference(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyringReference( + input: &crate::deps::aws_cryptography_materialProviders::types::keyring::KeyringRef, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKeyStoreReference( + input: &crate::deps::aws_cryptography_keyStore::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsClientReference( + input: &crate::deps::com_amazonaws_kms::client::Client, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations( + input: &crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery(ref inner) = &input { + validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPublicKeyDiscovery(inner)?; } -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput(input: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_for_Keyring_OnEncrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", - )); + if let crate::deps::aws_cryptography_materialProviders::types::KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey(ref inner) = &input { + validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPrivateKeyToStaticPublicKey(inner)?; } -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput(input: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_for_Keyring_OnEncrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials(&input.materials)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPrivateKeyToStaticPublicKey( + input: &crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsEcdhStaticConfigurations_DKmsPublicKeyDiscovery( + input: &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsKeyIdList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput( + input: &crate::deps::aws_cryptography_materialProviders::types::KmsPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderKmsIdentifier(&input.r#sender_kms_identifier)?; + validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderPublicKey(&input.r#sender_public_key)?; + validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.r#recipient_public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "recipient_public_key", + "recipient_public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderKmsIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "sender_kms_identifier", + "sender_kms_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPrivateKeyToStaticPublicKeyInput_DsenderPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput( + input: &crate::deps::aws_cryptography_materialProviders::types::KmsPublicKeyDiscoveryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput_DrecipientKmsIdentifier(&input.r#recipient_kms_identifier)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HKmsPublicKeyDiscoveryInput_DrecipientKmsIdentifier( + input: &::std::option::Option<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "recipient_kms_identifier", + "recipient_kms_identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterialProvidersConfig( + input: &crate::deps::aws_cryptography_materialProviders::types::material_providers_config::MaterialProvidersConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials( + input: &crate::deps::aws_cryptography_materialProviders::types::Materials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::Materials::Encryption( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HMaterials_DEncryption(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::Materials::Decryption( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HMaterials_DDecryption(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::Materials::BranchKey(ref inner) = + &input + { + validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBranchKey(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::Materials::BeaconKey(ref inner) = + &input + { + validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBeaconKey(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBeaconKey( + input: &crate::deps::aws_cryptography_keyStore::types::BeaconKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBeaconKeyMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DBranchKey( + input: &crate::deps::aws_cryptography_keyStore::types::BranchKeyMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PkeyStore_HBranchKeyMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DDecryption( + input: &crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMaterials_DEncryption( + input: &crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache( + input: &crate::deps::aws_cryptography_materialProviders::types::MultiThreadedCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryCapacity( + &input.r#entry_capacity, + )?; + validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryPruningTailSize( + &input.r#entry_pruning_tail_size, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryCapacity( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "entry_capacity", + "entry_capacity is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "entry_capacity", + "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", )); + } + Ok(()) } -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HMultiThreadedCache_DentryPruningTailSize( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput(input: &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput_DrecipientStaticPrivateKey(&input.recipient_static_private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput_DrecipientStaticPrivateKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "recipient_static_private_key", - "recipient_static_private_key is required but was not specified", + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "entry_pruning_tail_size", + "entry_pruning_tail_size failed to satisfy constraint: Member must be greater than or equal to 1", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput(input: &crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime(&input.creation_time)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime(&input.expiry_time)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed(&input.messages_used)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_for_CryptographicMaterialsCache_PutCacheEntry(input: &crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials(&input.materials)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime(&input.creation_time)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime(&input.expiry_time)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed(&input.messages_used)?; -validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HNoCache( + input: &crate::deps::aws_cryptography_materialProviders::types::NoCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HNone( + input: &crate::deps::aws_cryptography_materialProviders::types::None, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput( + input: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials(&input.r#materials)?; + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_for_Keyring_OnDecrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials(&input.r#materials)?; + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys( + &input.r#encrypted_data_keys, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_DencryptedDataKeys( + input: &::std::option::Option< + ::std::vec::Vec, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "encrypted_data_keys", + "encrypted_data_keys is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptedDataKeyList(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptInput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::OnDecryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_for_Keyring_OnDecrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::on_decrypt::OnDecryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnDecryptOutput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput( + input: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_for_Keyring_OnEncrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptInput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput( + input: &crate::deps::aws_cryptography_materialProviders::types::OnEncryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_for_Keyring_OnEncrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::on_encrypt::OnEncryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials(&input.r#materials)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HOnEncryptOutput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput( + input: &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput_DrecipientStaticPrivateKey(&input.r#recipient_static_private_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput_DrecipientStaticPrivateKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "recipient_static_private_key", + "recipient_static_private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput( + input: &crate::deps::aws_cryptography_materialProviders::types::PutCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials( + &input.r#materials, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime( + &input.r#creation_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime( + &input.r#expiry_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed( + &input.r#messages_used, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_for_CryptographicMaterialsCache_PutCacheEntry( + input: &crate::deps::aws_cryptography_materialProviders::operation::put_cache_entry::PutCacheEntryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials( + &input.r#materials, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime( + &input.r#creation_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime( + &input.r#expiry_time, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed( + &input.r#messages_used, + )?; + validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DbytesUsed( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "bytes_used", "bytes_used failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "creation_time", - "creation_time is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DcreationTime( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "creation_time", + "creation_time is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "creation_time", "creation_time failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime(input: &::std::option::Option<::std::primitive::i64>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "expiry_time", - "expiry_time is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DexpiryTime( + input: &::std::option::Option<::std::primitive::i64>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expiry_time", + "expiry_time is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "expiry_time", "expiry_time failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "identifier", - "identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "materials", - "materials is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Didentifier( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "identifier", + "identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_Dmaterials( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::Materials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "materials", + "materials is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HPutCacheEntryInput_DmessagesUsed( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "messages_used", "messages_used failed to satisfy constraint: Member must be greater than or equal to 0", )); + } + Ok(()) } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations(input: &crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(ref inner) = &input { +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations( + input: &crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::PublicKeyDiscovery(ref inner) = &input { validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DPublicKeyDiscovery(inner)?; } -if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey(ref inner) = &input { + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey(ref inner) = &input { validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DRawPrivateKeyToStaticPublicKey(inner)?; } -if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey(ref inner) = &input { + if let crate::deps::aws_cryptography_materialProviders::types::RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey(ref inner) = &input { validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DEphemeralPrivateKeyToStaticPublicKey(inner)?; } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DEphemeralPrivateKeyToStaticPublicKey(input: &crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DPublicKeyDiscovery(input: &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DRawPrivateKeyToStaticPublicKey(input: &crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput(input: &crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DsenderStaticPrivateKey(&input.sender_static_private_key)?; -validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.recipient_public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "recipient_public_key", - "recipient_public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DsenderStaticPrivateKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "sender_static_private_key", - "sender_static_private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRegionList(input: &::std::vec::Vec<::std::string::String>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HRegionList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRegionList_Dmember(input: &::std::string::String) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm(input: &crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DECDSA(inner)?; -} -if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None(ref inner) = &input { - validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DNone(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DECDSA(input: &crate::deps::aws_cryptography_materialProviders::types::Ecdsa) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HECDSA(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DNone(input: &crate::deps::aws_cryptography_materialProviders::types::None) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache(input: &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryCapacity(&input.entry_capacity)?; -validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryPruningTailSize(&input.entry_pruning_tail_size)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryCapacity(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "entry_capacity", - "entry_capacity is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DEphemeralPrivateKeyToStaticPublicKey( + input: &crate::deps::aws_cryptography_materialProviders::types::EphemeralPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HEphemeralPrivateKeyToStaticPublicKeyInput( + input, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DPublicKeyDiscovery( + input: &crate::deps::aws_cryptography_materialProviders::types::PublicKeyDiscoveryInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HPublicKeyDiscoveryInput(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawEcdhStaticConfigurations_DRawPrivateKeyToStaticPublicKey( + input: &crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput( + input: &crate::deps::aws_cryptography_materialProviders::types::RawPrivateKeyToStaticPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DsenderStaticPrivateKey(&input.r#sender_static_private_key)?; + validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey(&input.r#recipient_public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DrecipientPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "recipient_public_key", + "recipient_public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRawPrivateKeyToStaticPublicKeyInput_DsenderStaticPrivateKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "sender_static_private_key", + "sender_static_private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRegionList( + input: &::std::vec::Vec<::std::string::String>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HRegionList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HRegionList_Dmember( + input: &::std::string::String, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm( + input: &crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::Ecdsa( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DECDSA(inner)?; + } + if let crate::deps::aws_cryptography_materialProviders::types::SignatureAlgorithm::None( + ref inner, + ) = &input + { + validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DNone(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DECDSA( + input: &crate::deps::aws_cryptography_materialProviders::types::Ecdsa, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HECDSA(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSignatureAlgorithm_DNone( + input: &crate::deps::aws_cryptography_materialProviders::types::None, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache( + input: &crate::deps::aws_cryptography_materialProviders::types::SingleThreadedCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryCapacity( + &input.r#entry_capacity, + )?; + validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryPruningTailSize( + &input.r#entry_pruning_tail_size, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryCapacity( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "entry_capacity", + "entry_capacity is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "entry_capacity", "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", )); + } + Ok(()) } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryPruningTailSize(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSingleThreadedCache_DentryPruningTailSize( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "entry_pruning_tail_size", "entry_pruning_tail_size failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache(input: &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryCapacity(&input.entry_capacity)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryPruningTailSize(&input.entry_pruning_tail_size)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgracePeriod(&input.grace_period)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgraceInterval(&input.grace_interval)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DfanOut(&input.fan_out)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DinFlightTTL(&input.in_flight_ttl)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DsleepMilli(&input.sleep_milli)?; -validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DtimeUnits(&input.time_units)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryCapacity(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "entry_capacity", - "entry_capacity is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache( + input: &crate::deps::aws_cryptography_materialProviders::types::StormTrackingCache, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryCapacity( + &input.r#entry_capacity, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryPruningTailSize( + &input.r#entry_pruning_tail_size, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgracePeriod( + &input.r#grace_period, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgraceInterval( + &input.r#grace_interval, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DfanOut(&input.r#fan_out)?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DinFlightTTL( + &input.r#in_flight_ttl, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DsleepMilli( + &input.r#sleep_milli, + )?; + validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DtimeUnits( + &input.r#time_units, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryCapacity( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "entry_capacity", + "entry_capacity is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "entry_capacity", "entry_capacity failed to satisfy constraint: Member must be greater than or equal to 1", )); + } + Ok(()) } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryPruningTailSize(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DentryPruningTailSize( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "entry_pruning_tail_size", "entry_pruning_tail_size failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DfanOut(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "fan_out", - "fan_out is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "fan_out", - "fan_out failed to satisfy constraint: Member must be greater than or equal to 1", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgraceInterval(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "grace_interval", - "grace_interval is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DfanOut( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "fan_out", + "fan_out is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::invalid_field( + "fan_out", + "fan_out failed to satisfy constraint: Member must be greater than or equal to 1", + ), + ); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgraceInterval( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "grace_interval", + "grace_interval is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "grace_interval", "grace_interval failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgracePeriod(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "grace_period", - "grace_period is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DgracePeriod( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "grace_period", + "grace_period is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "grace_period", "grace_period failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DinFlightTTL(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "in_flight_ttl", - "in_flight_ttl is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DinFlightTTL( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "in_flight_ttl", + "in_flight_ttl is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "in_flight_ttl", "in_flight_ttl failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DsleepMilli(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "sleep_milli", - "sleep_milli is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DsleepMilli( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "sleep_milli", + "sleep_milli is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "sleep_milli", "sleep_milli failed to satisfy constraint: Member must be greater than or equal to 1", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DtimeUnits(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm(input: &crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(ref inner) = &input { + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HStormTrackingCache_DtimeUnits( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::TimeUnits, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm( + input: &crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::Hmac(ref inner) = &input { validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DHMAC(inner)?; } -if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None(ref inner) = &input { + if let crate::deps::aws_cryptography_materialProviders::types::SymmetricSignatureAlgorithm::None(ref inner) = &input { validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DNone(inner)?; } - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DHMAC(input: &crate::deps::aws_cryptography_primitives::types::DigestAlgorithm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DNone(input: &crate::deps::aws_cryptography_materialProviders::types::None) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList(input: &::std::vec::Vec<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - for inner in input.iter() { - validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList_Dmember(inner)?; -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList_Dmember(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput(input: &crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_for_CryptographicMaterialsCache_UpdateUsageMetadata(input: &crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier(&input.identifier)?; -validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed(&input.bytes_used)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "bytes_used", - "bytes_used is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DHMAC( + input: &crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSignatureAlgorithm_DNone( + input: &crate::deps::aws_cryptography_materialProviders::types::None, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HNone(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList( + input: &::std::vec::Vec<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + for inner in input.iter() { + validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList_Dmember(inner)?; + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HSymmetricSigningKeyList_Dmember( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput( + input: &crate::deps::aws_cryptography_materialProviders::types::UpdateUsageMetadataInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_for_CryptographicMaterialsCache_UpdateUsageMetadata( + input: &crate::deps::aws_cryptography_materialProviders::operation::update_usage_metadata::UpdateUsageMetadataInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier( + &input.r#identifier, + )?; + validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed( + &input.r#bytes_used, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_DbytesUsed( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "bytes_used", + "bytes_used is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "bytes_used", "bytes_used failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "identifier", - "identifier is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput(input: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm(&input.algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy(&input.commitment_policy)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnDecrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm(&input.algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy(&input.commitment_policy)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm", - "algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "commitment_policy", - "commitment_policy is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput(input: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm(&input.algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy(&input.commitment_policy)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnEncrypt(input: &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm(&input.algorithm)?; -validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy(&input.commitment_policy)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "algorithm", - "algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "commitment_policy", - "commitment_policy is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput(input: &crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart(&input.start)?; -validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop(&input.stop)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidDecryptionMaterialsTransition(input: &crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart(&input.start)?; -validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop(&input.stop)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "start", - "start is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "stop", - "stop is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput(input: &crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart(&input.start)?; -validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop(&input.stop)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidEncryptionMaterialsTransition(input: &crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart(&input.start)?; -validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop(&input.stop)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "start", - "start is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "stop", - "stop is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM(input: &crate::deps::aws_cryptography_primitives::types::AesGcm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(&input.key_length)?; -validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(&input.tag_length)?; -validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(&input.iv_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "iv_length", - "iv_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..=255).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HUpdateUsageMetadataInput_Didentifier( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "identifier", + "identifier is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput( + input: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm(&input.r#algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy(&input.r#commitment_policy)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnDecrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_decrypt::ValidateCommitmentPolicyOnDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm(&input.r#algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy(&input.r#commitment_policy)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_Dalgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm", + "algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnDecryptInput_DcommitmentPolicy( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "commitment_policy", + "commitment_policy is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput( + input: &crate::deps::aws_cryptography_materialProviders::types::ValidateCommitmentPolicyOnEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm(&input.r#algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy(&input.r#commitment_policy)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_for_AwsCryptographicMaterialProviders_ValidateCommitmentPolicyOnEncrypt( + input: &crate::deps::aws_cryptography_materialProviders::operation::validate_commitment_policy_on_encrypt::ValidateCommitmentPolicyOnEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm(&input.r#algorithm)?; + validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy(&input.r#commitment_policy)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_Dalgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::AlgorithmSuiteId, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "algorithm", + "algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HAlgorithmSuiteId(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidateCommitmentPolicyOnEncryptInput_DcommitmentPolicy( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::CommitmentPolicy, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "commitment_policy", + "commitment_policy is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HCommitmentPolicy(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput( + input: &crate::deps::aws_cryptography_materialProviders::types::ValidDecryptionMaterialsTransitionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart( + &input.r#start, + )?; + validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop( + &input.r#stop, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidDecryptionMaterialsTransition( + input: &crate::deps::aws_cryptography_materialProviders::operation::valid_decryption_materials_transition::ValidDecryptionMaterialsTransitionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart( + &input.r#start, + )?; + validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop( + &input.r#stop, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstart( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "start", + "start is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidDecryptionMaterialsTransitionInput_Dstop( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::DecryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "stop", + "stop is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HDecryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput( + input: &crate::deps::aws_cryptography_materialProviders::types::ValidEncryptionMaterialsTransitionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart( + &input.r#start, + )?; + validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop( + &input.r#stop, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_for_AwsCryptographicMaterialProviders_ValidEncryptionMaterialsTransition( + input: &crate::deps::aws_cryptography_materialProviders::operation::valid_encryption_materials_transition::ValidEncryptionMaterialsTransitionInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart( + &input.r#start, + )?; + validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop( + &input.r#stop, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstart( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "start", + "start is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_PmaterialProviders_HValidEncryptionMaterialsTransitionInput_Dstop( + input: &::std::option::Option< + crate::deps::aws_cryptography_materialProviders::types::EncryptionMaterials, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "stop", + "stop is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_PmaterialProviders_HEncryptionMaterials(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM( + input: &crate::deps::aws_cryptography_primitives::types::AesGcm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(&input.r#key_length)?; + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(&input.r#tag_length)?; + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(&input.r#iv_length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "iv_length", + "iv_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..=255).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "iv_length", "iv_length failed to satisfy constraint: Member must be between 0 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_length", - "key_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_length", + "key_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "key_length", "key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "tag_length", - "tag_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "tag_length", + "tag_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "tag_length", "tag_length failed to satisfy constraint: Member must be between 0 and 32, inclusive", )); + } + Ok(()) } - Ok(()) -} -pub(crate) fn validate_smithy_Papi_HUnit(input: &()) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) +pub(crate) fn validate_smithy_Papi_HUnit( + input: &(), +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } -pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo(input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) +pub(crate) fn validate_smithy_Papi_HUnit_for_KeyStore_GetKeyStoreInfo( + input: &crate::deps::aws_cryptography_keyStore::operation::get_key_store_info::Unit, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives.rs index e3614bb67..1211c3943 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives.rs @@ -2,11 +2,11 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod client; -pub mod types; +pub mod conversions; +pub mod deps; /// Common errors and error handling utilities. pub mod error; /// All operations that this crate can perform. pub mod operation; -pub mod conversions; +pub mod types; pub mod validation; -pub mod deps; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client.rs index dd322ebb2..4f56d7981 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client.rs @@ -25,10 +25,14 @@ impl Client { inner.as_ref(), crate::_Wrappers_Compile::Result::Failure { .. } ) { - return Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny(inner.as_ref().error().clone())); + return Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner.as_ref().error().clone(), + ), + ); } Ok(Self { - dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()) + dafny_client: ::dafny_runtime::upcast_object()(inner.Extract()), }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_decrypt.rs index e5e702114..655882116 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_decrypt.rs @@ -14,7 +14,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`AesDecryptOutput`](crate::operation::aes_decrypt::AesDecryptOutput) with field(s): /// - [`plaintext(Option<::aws_smithy_types::Blob>)`](crate::operation::aes_decrypt::AESDecryptOutput::plaintext): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::aes_decrypt::AesDecryptError) - pub fn aes_decrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptFluentBuilder { + pub fn aes_decrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_encrypt.rs index 7ec9e22a2..8507de702 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_encrypt.rs @@ -14,7 +14,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - [`auth_tag(Option<::aws_smithy_types::Blob>)`](crate::operation::aes_encrypt::AESEncryptOutput::auth_tag): (undocumented) /// - [`cipher_text(Option<::aws_smithy_types::Blob>)`](crate::operation::aes_encrypt::AESEncryptOutput::cipher_text): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::aes_encrypt::AesEncryptError) - pub fn aes_encrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptFluentBuilder { + pub fn aes_encrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_kdf_counter_mode.rs index 37abc3432..1d87fc801 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/aes_kdf_counter_mode.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`AesKdfCtrOutput`](crate::operation::aes_kdf_counter_mode::AesKdfCtrOutput) with field(s): /// - [`okm(Option<::aws_smithy_types::Blob>)`](crate::operation::aes_kdf_counter_mode::AesKdfCtrOutput::okm): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::aes_kdf_counter_mode::AesKdfCounterModeError) - pub fn aes_kdf_counter_mode(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCounterModeFluentBuilder { + pub fn aes_kdf_counter_mode(&self) -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCounterModeFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCounterModeFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/compress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/compress_public_key.rs index 4e2266c09..8668dd211 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/compress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/compress_public_key.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`CompressPublicKeyOutput`](crate::operation::compress_public_key::CompressPublicKeyOutput) with field(s): /// - [`compressed_public_key(Option<::aws_smithy_types::Blob>)`](crate::operation::compress_public_key::CompressPublicKeyOutput::compressed_public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::compress_public_key::CompressPublicKeyError) - pub fn compress_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyFluentBuilder { + pub fn compress_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/decompress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/decompress_public_key.rs index d1b9b6038..42d15cb02 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/decompress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/decompress_public_key.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`DecompressPublicKeyOutput`](crate::operation::decompress_public_key::DecompressPublicKeyOutput) with field(s): /// - [`public_key(Option)`](crate::operation::decompress_public_key::DecompressPublicKeyOutput::public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::decompress_public_key::DecompressPublicKeyError) - pub fn decompress_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyFluentBuilder { + pub fn decompress_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/derive_shared_secret.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/derive_shared_secret.rs index 9c98fb8d8..6666dcc7c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/derive_shared_secret.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/derive_shared_secret.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`DeriveSharedSecretOutput`](crate::operation::derive_shared_secret::DeriveSharedSecretOutput) with field(s): /// - [`shared_secret(Option<::aws_smithy_types::Blob>)`](crate::operation::derive_shared_secret::DeriveSharedSecretOutput::shared_secret): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::derive_shared_secret::DeriveSharedSecretError) - pub fn derive_shared_secret(&self) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretFluentBuilder { + pub fn derive_shared_secret(&self) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/digest.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/digest.rs index e24e84609..09085a106 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/digest.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/digest.rs @@ -10,7 +10,10 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`DigestOutput`](crate::operation::digest::DigestOutput) with field(s): /// - [`digest(Option<::aws_smithy_types::Blob>)`](crate::operation::digest::DigestOutput::digest): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::digest::DigestError) - pub fn digest(&self) -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestFluentBuilder { + pub fn digest( + &self, + ) -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestFluentBuilder + { crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_sign.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_sign.rs index b5e62418e..5a433f578 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_sign.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_sign.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`EcdsaSignOutput`](crate::operation::ecdsa_sign::EcdsaSignOutput) with field(s): /// - [`signature(Option<::aws_smithy_types::Blob>)`](crate::operation::ecdsa_sign::ECDSASignOutput::signature): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::ecdsa_sign::EcdsaSignError) - pub fn ecdsa_sign(&self) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignFluentBuilder { + pub fn ecdsa_sign(&self) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_verify.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_verify.rs index 114c48283..3b4e0596d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_verify.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/ecdsa_verify.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`EcdsaVerifyOutput`](crate::operation::ecdsa_verify::EcdsaVerifyOutput) with field(s): /// - [`success(Option<::std::primitive::bool>)`](crate::operation::ecdsa_verify::ECDSAVerifyOutput::success): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::ecdsa_verify::EcdsaVerifyError) - pub fn ecdsa_verify(&self) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyFluentBuilder { + pub fn ecdsa_verify(&self) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecc_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecc_key_pair.rs index 1d373b9a6..c457b5a4d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecc_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecc_key_pair.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - [`private_key(Option)`](crate::operation::generate_ecc_key_pair::GenerateECCKeyPairOutput::private_key): (undocumented) /// - [`public_key(Option)`](crate::operation::generate_ecc_key_pair::GenerateECCKeyPairOutput::public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::generate_ecc_key_pair::GenerateEccKeyPairError) - pub fn generate_ecc_key_pair(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairFluentBuilder { + pub fn generate_ecc_key_pair(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecdsa_signature_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecdsa_signature_key.rs index 141761f71..0cf00adfb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecdsa_signature_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_ecdsa_signature_key.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - [`signing_key(Option<::aws_smithy_types::Blob>)`](crate::operation::generate_ecdsa_signature_key::GenerateECDSASignatureKeyOutput::signing_key): (undocumented) /// - [`verification_key(Option<::aws_smithy_types::Blob>)`](crate::operation::generate_ecdsa_signature_key::GenerateECDSASignatureKeyOutput::verification_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyError) - pub fn generate_ecdsa_signature_key(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyFluentBuilder { + pub fn generate_ecdsa_signature_key(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_random_bytes.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_random_bytes.rs index 8a43799ca..86bf9fbba 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_random_bytes.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_random_bytes.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`GenerateRandomBytesOutput`](crate::operation::generate_random_bytes::GenerateRandomBytesOutput) with field(s): /// - [`data(Option<::aws_smithy_types::Blob>)`](crate::operation::generate_random_bytes::GenerateRandomBytesOutput::data): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::generate_random_bytes::GenerateRandomBytesError) - pub fn generate_random_bytes(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesFluentBuilder { + pub fn generate_random_bytes(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_rsa_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_rsa_key_pair.rs index d2f3b2d82..0099656e4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_rsa_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/generate_rsa_key_pair.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - [`private_key(Option)`](crate::operation::generate_rsa_key_pair::GenerateRSAKeyPairOutput::private_key): (undocumented) /// - [`public_key(Option)`](crate::operation::generate_rsa_key_pair::GenerateRSAKeyPairOutput::public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::generate_rsa_key_pair::GenerateRsaKeyPairError) - pub fn generate_rsa_key_pair(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairFluentBuilder { + pub fn generate_rsa_key_pair(&self) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_public_key_from_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_public_key_from_private_key.rs index 80f5b2da5..0984fb573 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_public_key_from_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_public_key_from_private_key.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - [`private_key(Option)`](crate::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput::private_key): (undocumented) /// - [`public_key(Option<::aws_smithy_types::Blob>)`](crate::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput::public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyError) - pub fn get_public_key_from_private_key(&self) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyFluentBuilder { + pub fn get_public_key_from_private_key(&self) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_rsa_key_modulus_length.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_rsa_key_modulus_length.rs index 6ce384f82..6ee7ad9ae 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_rsa_key_modulus_length.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/get_rsa_key_modulus_length.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`GetRsaKeyModulusLengthOutput`](crate::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput) with field(s): /// - [`length(Option<::std::primitive::i32>)`](crate::operation::get_rsa_key_modulus_length::GetRSAKeyModulusLengthOutput::length): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthError) - pub fn get_rsa_key_modulus_length(&self) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthFluentBuilder { + pub fn get_rsa_key_modulus_length(&self) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/h_mac.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/h_mac.rs index 1bcaf32a6..50e04633e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/h_mac.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/h_mac.rs @@ -11,7 +11,12 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`HMacOutput`](crate::operation::h_mac::HMacOutput) with field(s): /// - [`digest(Option<::aws_smithy_types::Blob>)`](crate::operation::h_mac::HMacOutput::digest): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::h_mac::HMacError) - pub fn h_mac(&self) -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacFluentBuilder { - crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacFluentBuilder::new(self.clone()) + pub fn h_mac( + &self, + ) -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacFluentBuilder + { + crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf.rs index 02c903fd0..f0c55702b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf.rs @@ -13,7 +13,12 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`HkdfOutput`](crate::operation::hkdf::HkdfOutput) with field(s): /// - [`okm(Option<::aws_smithy_types::Blob>)`](crate::operation::hkdf::HkdfOutput::okm): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::hkdf::HkdfError) - pub fn hkdf(&self) -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfFluentBuilder { - crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfFluentBuilder::new(self.clone()) + pub fn hkdf( + &self, + ) -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfFluentBuilder + { + crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfFluentBuilder::new( + self.clone(), + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_expand.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_expand.rs index f17e2798f..50e177c55 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_expand.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_expand.rs @@ -12,7 +12,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`HkdfExpandOutput`](crate::operation::hkdf_expand::HkdfExpandOutput) with field(s): /// - [`okm(Option<::aws_smithy_types::Blob>)`](crate::operation::hkdf_expand::HkdfExpandOutput::okm): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::hkdf_expand::HkdfExpandError) - pub fn hkdf_expand(&self) -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandFluentBuilder { + pub fn hkdf_expand(&self) -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_extract.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_extract.rs index 089a02d0e..0f4035d3b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_extract.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/hkdf_extract.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`HkdfExtractOutput`](crate::operation::hkdf_extract::HkdfExtractOutput) with field(s): /// - [`prk(Option<::aws_smithy_types::Blob>)`](crate::operation::hkdf_extract::HkdfExtractOutput::prk): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::hkdf_extract::HkdfExtractError) - pub fn hkdf_extract(&self) -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractFluentBuilder { + pub fn hkdf_extract(&self) -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/kdf_counter_mode.rs index 7ffe93300..8c389b646 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/kdf_counter_mode.rs @@ -13,7 +13,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`KdfCtrOutput`](crate::operation::kdf_counter_mode::KdfCtrOutput) with field(s): /// - [`okm(Option<::aws_smithy_types::Blob>)`](crate::operation::kdf_counter_mode::KdfCtrOutput::okm): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::kdf_counter_mode::KdfCounterModeError) - pub fn kdf_counter_mode(&self) -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCounterModeFluentBuilder { + pub fn kdf_counter_mode(&self) -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCounterModeFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCounterModeFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/parse_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/parse_public_key.rs index 8b4e71ef0..4e7c0352a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/parse_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/parse_public_key.rs @@ -9,7 +9,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`ParsePublicKeyOutput`](crate::operation::parse_public_key::ParsePublicKeyOutput) with field(s): /// - [`public_key(Option)`](crate::operation::parse_public_key::ParsePublicKeyOutput::public_key): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::parse_public_key::ParsePublicKeyError) - pub fn parse_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyFluentBuilder { + pub fn parse_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_decrypt.rs index 16f035a44..329fd2a30 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_decrypt.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`RsaDecryptOutput`](crate::operation::rsa_decrypt::RsaDecryptOutput) with field(s): /// - [`plaintext(Option<::aws_smithy_types::Blob>)`](crate::operation::rsa_decrypt::RSADecryptOutput::plaintext): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::rsa_decrypt::RsaDecryptError) - pub fn rsa_decrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptFluentBuilder { + pub fn rsa_decrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_encrypt.rs index 118ff50ab..ae2335073 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/rsa_encrypt.rs @@ -11,7 +11,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`RsaEncryptOutput`](crate::operation::rsa_encrypt::RsaEncryptOutput) with field(s): /// - [`cipher_text(Option<::aws_smithy_types::Blob>)`](crate::operation::rsa_encrypt::RSAEncryptOutput::cipher_text): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::rsa_encrypt::RsaEncryptError) - pub fn rsa_encrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptFluentBuilder { + pub fn rsa_encrypt(&self) -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/validate_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/validate_public_key.rs index a3cbdb423..17ec2fa45 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/validate_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/client/validate_public_key.rs @@ -10,7 +10,7 @@ impl crate::deps::aws_cryptography_primitives::client::Client { /// - On success, responds with [`ValidatePublicKeyOutput`](crate::operation::validate_public_key::ValidatePublicKeyOutput) with field(s): /// - [`success(Option<::std::primitive::bool>)`](crate::operation::validate_public_key::ValidatePublicKeyOutput::success): (undocumented) /// - On failure, responds with [`SdkError`](crate::operation::validate_public_key::ValidatePublicKeyError) - pub fn validate_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyFluentBuilder { + pub fn validate_public_key(&self) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyFluentBuilder{ crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyFluentBuilder::new(self.clone()) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions.rs index 26a7070b8..280788af1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions.rs @@ -3,144 +3,144 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod aes_ctr; - pub mod aes_decrypt; +pub mod aes_decrypt; - pub mod aes_decrypt_input; +pub mod aes_decrypt_input; - pub mod aes_encrypt; +pub mod aes_encrypt; - pub mod aes_encrypt_input; +pub mod aes_encrypt_input; - pub mod aes_encrypt_output; +pub mod aes_encrypt_output; - pub mod aes_gcm; +pub mod aes_gcm; - pub mod aes_kdf_counter_mode; +pub mod aes_kdf_counter_mode; - pub mod aes_kdf_ctr_input; +pub mod aes_kdf_ctr_input; - pub mod client; +pub mod client; - pub mod compress_public_key; +pub mod compress_public_key; - pub mod compress_public_key_input; +pub mod compress_public_key_input; - pub mod compress_public_key_output; +pub mod compress_public_key_output; - pub mod decompress_public_key; +pub mod decompress_public_key; - pub mod decompress_public_key_input; +pub mod decompress_public_key_input; - pub mod decompress_public_key_output; +pub mod decompress_public_key_output; - pub mod derive_shared_secret; +pub mod derive_shared_secret; - pub mod derive_shared_secret_input; +pub mod derive_shared_secret_input; - pub mod derive_shared_secret_output; +pub mod derive_shared_secret_output; - pub mod digest; +pub mod digest; - pub mod digest_algorithm; +pub mod digest_algorithm; - pub mod digest_input; +pub mod digest_input; - pub mod ecc_private_key; +pub mod ecc_private_key; - pub mod ecc_public_key; +pub mod ecc_public_key; - pub mod ecdh_curve_spec; +pub mod ecdh_curve_spec; - pub mod ecdsa_sign; +pub mod ecdsa_sign; - pub mod ecdsa_sign_input; +pub mod ecdsa_sign_input; - pub mod ecdsa_signature_algorithm; +pub mod ecdsa_signature_algorithm; - pub mod ecdsa_verify; +pub mod ecdsa_verify; - pub mod ecdsa_verify_input; +pub mod ecdsa_verify_input; - pub mod error; +pub mod error; - pub mod generate_ecc_key_pair; +pub mod generate_ecc_key_pair; - pub mod generate_ecc_key_pair_input; +pub mod generate_ecc_key_pair_input; - pub mod generate_ecc_key_pair_output; +pub mod generate_ecc_key_pair_output; - pub mod generate_ecdsa_signature_key; +pub mod generate_ecdsa_signature_key; - pub mod generate_ecdsa_signature_key_input; +pub mod generate_ecdsa_signature_key_input; - pub mod generate_ecdsa_signature_key_output; +pub mod generate_ecdsa_signature_key_output; - pub mod generate_random_bytes; +pub mod generate_random_bytes; - pub mod generate_random_bytes_input; +pub mod generate_random_bytes_input; - pub mod generate_rsa_key_pair; +pub mod generate_rsa_key_pair; - pub mod generate_rsa_key_pair_input; +pub mod generate_rsa_key_pair_input; - pub mod generate_rsa_key_pair_output; +pub mod generate_rsa_key_pair_output; - pub mod get_public_key_from_private_key; +pub mod get_public_key_from_private_key; - pub mod get_public_key_from_private_key_input; +pub mod get_public_key_from_private_key_input; - pub mod get_public_key_from_private_key_output; +pub mod get_public_key_from_private_key_output; - pub mod get_rsa_key_modulus_length; +pub mod get_rsa_key_modulus_length; - pub mod get_rsa_key_modulus_length_input; +pub mod get_rsa_key_modulus_length_input; - pub mod get_rsa_key_modulus_length_output; +pub mod get_rsa_key_modulus_length_output; - pub mod h_mac; +pub mod h_mac; - pub mod h_mac_input; +pub mod h_mac_input; - pub mod hkdf; +pub mod hkdf; - pub mod hkdf_expand; +pub mod hkdf_expand; - pub mod hkdf_expand_input; +pub mod hkdf_expand_input; - pub mod hkdf_extract; +pub mod hkdf_extract; - pub mod hkdf_extract_input; +pub mod hkdf_extract_input; - pub mod hkdf_input; +pub mod hkdf_input; - pub mod kdf_counter_mode; +pub mod kdf_counter_mode; - pub mod kdf_ctr_input; +pub mod kdf_ctr_input; - pub mod parse_public_key; +pub mod parse_public_key; - pub mod parse_public_key_input; +pub mod parse_public_key_input; - pub mod parse_public_key_output; +pub mod parse_public_key_output; - pub mod rsa_decrypt; +pub mod rsa_decrypt; - pub mod rsa_decrypt_input; +pub mod rsa_decrypt_input; - pub mod rsa_encrypt; +pub mod rsa_encrypt; - pub mod rsa_encrypt_input; +pub mod rsa_encrypt_input; - pub mod rsa_padding_mode; +pub mod rsa_padding_mode; - pub mod rsa_private_key; +pub mod rsa_private_key; - pub mod rsa_public_key; +pub mod rsa_public_key; - pub mod validate_public_key; +pub mod validate_public_key; - pub mod validate_public_key_input; +pub mod validate_public_key_input; - pub mod validate_public_key_output; +pub mod validate_public_key_output; pub mod crypto_config; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_ctr.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_ctr.rs index 9cd984fed..372b7cfd5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_ctr.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_ctr.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesCtr, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -16,27 +16,31 @@ pub fn to_dafny_plain( ) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR { crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR::AES_CTR { keyLength: value.key_length.clone().unwrap(), - nonceLength: value.nonce_length.clone().unwrap(), + nonceLength: value.nonce_length.clone().unwrap(), } } #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR, >, ) -> crate::deps::aws_cryptography_primitives::types::AesCtr { @@ -59,9 +63,13 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, + dafny_value: ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_CTR, + >, + >, + >, ) -> ::std::option::Option { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt.rs index ffb1a3974..d14a9e5d1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _aes_decrypt_input; +pub mod _aes_decrypt_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt/_aes_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt/_aes_decrypt_input.rs index 0aa3f5869..0db2875be 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt/_aes_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt/_aes_decrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput::AESDecryptInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput::AESDecryptInput { encAlg: crate::deps::aws_cryptography_primitives::conversions::aes_gcm::to_dafny(&value.enc_alg.clone().unwrap()) , key: crate::standard_library_conversions::blob_to_dafny(&value.key.unwrap()), @@ -17,20 +17,33 @@ pub fn to_dafny( aad: crate::standard_library_conversions::blob_to_dafny(&value.aad.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput { crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput::builder() - .set_enc_alg(Some( crate::deps::aws_cryptography_primitives::conversions::aes_gcm::from_dafny(dafny_value.encAlg().clone()) - )) - .set_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.key().clone()))) - .set_cipher_txt(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.cipherTxt().clone()))) - .set_auth_tag(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.authTag().clone()))) - .set_iv(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.iv().clone()))) - .set_aad(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.aad().clone()))) + .set_enc_alg(Some( + crate::deps::aws_cryptography_primitives::conversions::aes_gcm::from_dafny( + dafny_value.encAlg().clone(), + ), + )) + .set_key(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.key().clone(), + ))) + .set_cipher_txt(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.cipherTxt().clone(), + ))) + .set_auth_tag(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.authTag().clone(), + ))) + .set_iv(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.iv().clone(), + ))) + .set_aad(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.aad().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt_input.rs index 7a20f6ba9..04c405d3e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_decrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -28,20 +28,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput, >, ) -> crate::deps::aws_cryptography_primitives::types::AesDecryptInput { @@ -69,7 +69,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt.rs index 4ab6f77ac..ca5f979a2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _aes_encrypt_input; +pub mod _aes_encrypt_input; - pub mod _aes_encrypt_output; +pub mod _aes_encrypt_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_input.rs index b501637b5..206c6dadf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput::AESEncryptInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput::AESEncryptInput { encAlg: crate::deps::aws_cryptography_primitives::conversions::aes_gcm::to_dafny(&value.enc_alg.clone().unwrap()) , iv: crate::standard_library_conversions::blob_to_dafny(&value.iv.unwrap()), @@ -16,19 +16,30 @@ pub fn to_dafny( aad: crate::standard_library_conversions::blob_to_dafny(&value.aad.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput { crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput::builder() - .set_enc_alg(Some( crate::deps::aws_cryptography_primitives::conversions::aes_gcm::from_dafny(dafny_value.encAlg().clone()) - )) - .set_iv(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.iv().clone()))) - .set_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.key().clone()))) - .set_msg(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.msg().clone()))) - .set_aad(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.aad().clone()))) + .set_enc_alg(Some( + crate::deps::aws_cryptography_primitives::conversions::aes_gcm::from_dafny( + dafny_value.encAlg().clone(), + ), + )) + .set_iv(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.iv().clone(), + ))) + .set_key(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.key().clone(), + ))) + .set_msg(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.msg().clone(), + ))) + .set_aad(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.aad().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_output.rs index 3f2fea36e..fca859b93 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt/_aes_encrypt_output.rs @@ -4,23 +4,27 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput::AESEncryptOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput::AESEncryptOutput { cipherText: crate::standard_library_conversions::blob_to_dafny(&value.cipher_text.unwrap()), authTag: crate::standard_library_conversions::blob_to_dafny(&value.auth_tag.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput, >, ) -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput { crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput::builder() - .set_cipher_text(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.cipherText().clone()))) - .set_auth_tag(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.authTag().clone()))) + .set_cipher_text(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.cipherText().clone(), + ))) + .set_auth_tag(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.authTag().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_input.rs index 7227104f5..8a23c2bc4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -27,20 +27,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput, >, ) -> crate::deps::aws_cryptography_primitives::types::AesEncryptInput { @@ -67,7 +67,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_output.rs index 74c67361f..5f54c8219 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_encrypt_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesEncryptOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::AesEncryptOutput { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_gcm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_gcm.rs index 3fa77a592..856fbd35e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_gcm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_gcm.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesGcm, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -16,28 +16,32 @@ pub fn to_dafny_plain( ) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM { crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM::AES_GCM { keyLength: value.key_length.clone().unwrap(), - tagLength: value.tag_length.clone().unwrap(), - ivLength: value.iv_length.clone().unwrap(), + tagLength: value.tag_length.clone().unwrap(), + ivLength: value.iv_length.clone().unwrap(), } } #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM, >, ) -> crate::deps::aws_cryptography_primitives::types::AesGcm { @@ -61,9 +65,13 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, + dafny_value: ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::AES_GCM, + >, + >, + >, ) -> ::std::option::Option { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode.rs index bad93bdb9..bf77c5a83 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _aes_kdf_counter_mode_input; +pub mod _aes_kdf_counter_mode_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode/_aes_kdf_counter_mode_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode/_aes_kdf_counter_mode_input.rs index ac9e3eb7c..4e187acdf 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode/_aes_kdf_counter_mode_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_counter_mode/_aes_kdf_counter_mode_input.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::AesKdfCtrInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput::AesKdfCtrInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput::AesKdfCtrInput { ikm: crate::standard_library_conversions::blob_to_dafny(&value.ikm.unwrap()), expectedLength: value.expected_length.clone().unwrap(), nonce: crate::standard_library_conversions::oblob_to_dafny(&value.nonce), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::AesKdfCtrInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_ctr_input.rs index 2d34b38c5..ce0919edd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/aes_kdf_ctr_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput, >, ) -> crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput { @@ -61,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/client.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/client.rs index 44de94031..cfd8b43c9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/client.rs @@ -20,5 +20,7 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient >, ) -> crate::deps::aws_cryptography_primitives::client::Client { - crate::deps::aws_cryptography_primitives::client::Client { dafny_client: dafny_value } + crate::deps::aws_cryptography_primitives::client::Client { + dafny_client: dafny_value, + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key.rs index 45fb534e5..162d28fc3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _compress_public_key_input; +pub mod _compress_public_key_input; - pub mod _compress_public_key_output; +pub mod _compress_public_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_input.rs index c681ffafc..5ac25f98e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_input.rs @@ -4,21 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput::CompressPublicKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput::CompressPublicKeyInput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput { +) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput +{ crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput::builder() .set_public_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::from_dafny(dafny_value.publicKey().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_output.rs index 2d4607b50..ff8cd0674 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key/_compress_public_key_output.rs @@ -4,19 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput::CompressPublicKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput::CompressPublicKeyOutput { compressedPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.compressed_public_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput { +) -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput +{ crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput::builder() .set_compressed_public_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.compressedPublicKey().clone()))) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_input.rs index a90723dde..e4ce586a5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput +{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput::CompressPublicKeyInput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , @@ -24,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput { @@ -61,10 +62,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_output.rs index 4613bfea8..f34cf5dec 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/compress_public_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput::CompressPublicKeyOutput { compressedPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.compressed_public_key.unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/crypto_config/_crypto_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/crypto_config/_crypto_config.rs index 25ff96bbc..d784449fa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/crypto_config/_crypto_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/crypto_config/_crypto_config.rs @@ -5,22 +5,21 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CryptoConfig, > { - ::std::rc::Rc::new(to_dafny_plain(value)) + ::dafny_runtime::Rc::new(to_dafny_plain(value)) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::CryptoConfig, >, ) -> crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig { plain_from_dafny(&*dafny_value) } - #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key.rs index 6c6f388cf..e2a0f8e98 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _decompress_public_key_input; +pub mod _decompress_public_key_input; - pub mod _decompress_public_key_output; +pub mod _decompress_public_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_input.rs index 61ccf0333..c0abec195 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_input.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput::DecompressPublicKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput::DecompressPublicKeyInput { compressedPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.compressed_public_key.unwrap()), eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput { +) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput{ crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput::builder() .set_compressed_public_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.compressedPublicKey().clone()))) .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_output.rs index fb0ce52ce..f0437e121 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key/_decompress_public_key_output.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput::DecompressPublicKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput::DecompressPublicKeyOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput { +) -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput{ crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput::builder() .set_public_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::from_dafny(dafny_value.publicKey().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_input.rs index de620cdc1..88b688984 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput::DecompressPublicKeyInput { compressedPublicKey: crate::standard_library_conversions::blob_to_dafny(&value.compressed_public_key.unwrap()), eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_output.rs index 547519ad8..ca3a56e21 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/decompress_public_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput::DecompressPublicKeyOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput { @@ -59,10 +59,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret.rs index aec0c2794..1389fc78f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _derive_shared_secret_input; +pub mod _derive_shared_secret_input; - pub mod _derive_shared_secret_output; +pub mod _derive_shared_secret_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_input.rs index e12cffbb2..ec88bec11 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput::DeriveSharedSecretInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput::DeriveSharedSecretInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) , @@ -15,12 +15,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput { +) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput{ crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .set_private_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::from_dafny(dafny_value.privateKey().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_output.rs index 54286d5c7..112e8cc05 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret/_derive_shared_secret_output.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput::DeriveSharedSecretOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput::DeriveSharedSecretOutput { sharedSecret: crate::standard_library_conversions::blob_to_dafny(&value.shared_secret.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput { +) -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput{ crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput::builder() .set_shared_secret(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.sharedSecret().clone()))) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_input.rs index c7d236d62..bb0dee5d0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput::DeriveSharedSecretInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) @@ -26,20 +26,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput, >, ) -> crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput { @@ -65,10 +65,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_output.rs index 769dcab92..f37f41d2b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/derive_shared_secret_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput::DeriveSharedSecretOutput { sharedSecret: crate::standard_library_conversions::blob_to_dafny(&value.shared_secret.unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest.rs index 1236a68b6..786355f30 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _digest_input; +pub mod _digest_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest/_digest_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest/_digest_input.rs index ac621374d..f2e4ed865 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest/_digest_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest/_digest_input.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::digest::DigestInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput::DigestInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput::DigestInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), message: crate::standard_library_conversions::blob_to_dafny(&value.message.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::digest::DigestInput { crate::deps::aws_cryptography_primitives::operation::digest::DigestInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_message(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.message().clone()))) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_message(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.message().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_algorithm.rs index b042c4750..814243d48 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_algorithm.rs @@ -5,15 +5,17 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_primitives::types::DigestAlgorithm::Sha512 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm::SHA_512 {}, crate::deps::aws_cryptography_primitives::types::DigestAlgorithm::Sha384 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm::SHA_384 {}, crate::deps::aws_cryptography_primitives::types::DigestAlgorithm::Sha256 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm::SHA_256 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm, ) -> crate::deps::aws_cryptography_primitives::types::DigestAlgorithm { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_input.rs index 89a27b3af..27bd1122e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/digest_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::DigestInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,21 +22,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::DigestInput, >, ) -> crate::deps::aws_cryptography_primitives::types::DigestInput { @@ -59,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_private_key.rs index 3de60a56e..769585985 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_private_key.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::EccPrivateKey, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECCPrivateKey, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECCPrivateKey, >, ) -> crate::deps::aws_cryptography_primitives::types::EccPrivateKey { @@ -57,7 +57,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_public_key.rs index 33a364f53..5417ffc88 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecc_public_key.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::EccPublicKey, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECCPublicKey, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -21,21 +21,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECCPublicKey, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECCPublicKey, >, ) -> crate::deps::aws_cryptography_primitives::types::EccPublicKey { @@ -57,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdh_curve_spec.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdh_curve_spec.rs index e8695973c..3107057cb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdh_curve_spec.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdh_curve_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec::EccNistP256 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec::ECC_NIST_P256 {}, crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec::EccNistP384 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec::ECC_NIST_P384 {}, crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec::EccNistP521 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec::ECC_NIST_P521 {}, @@ -14,7 +16,7 @@ crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec::Sm2 => crate::r# _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec, ) -> crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign.rs index ba8481fd7..d44fbbf1f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _ecdsa_sign_input; +pub mod _ecdsa_sign_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign/_ecdsa_sign_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign/_ecdsa_sign_input.rs index bcfa9e90d..615a8045d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign/_ecdsa_sign_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign/_ecdsa_sign_input.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput::ECDSASignInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput::ECDSASignInput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), signingKey: crate::standard_library_conversions::blob_to_dafny(&value.signing_key.unwrap()), message: crate::standard_library_conversions::blob_to_dafny(&value.message.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign_input.rs index 84d5ab4a2..1d704e31a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_sign_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::EcdsaSignInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput, >, ) -> crate::deps::aws_cryptography_primitives::types::EcdsaSignInput { @@ -61,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_signature_algorithm.rs index d56904660..95b3a03a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_signature_algorithm.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm::EcdsaP384 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm::ECDSA_P384 {}, crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm::EcdsaP256 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm::ECDSA_P256 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm, ) -> crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify.rs index 36b744c48..fa2f1eab5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _ecdsa_verify_input; +pub mod _ecdsa_verify_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify/_ecdsa_verify_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify/_ecdsa_verify_input.rs index e4d4aaa8c..a724c984b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify/_ecdsa_verify_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify/_ecdsa_verify_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput::ECDSAVerifyInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput::ECDSAVerifyInput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), verificationKey: crate::standard_library_conversions::blob_to_dafny(&value.verification_key.unwrap()), message: crate::standard_library_conversions::blob_to_dafny(&value.message.unwrap()), signature: crate::standard_library_conversions::blob_to_dafny(&value.signature.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify_input.rs index a8f733346..9f17cb63b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/ecdsa_verify_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/error.rs index 8b5b852be..54fa50a09 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/error.rs @@ -2,15 +2,21 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -19,22 +25,26 @@ pub fn to_opaque_error(value: String) -> } /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure -pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< - crate::_Wrappers_Compile::Result< - T, - ::std::rc::Rc - > - > -{ - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { +pub fn to_opaque_error_result( + value: String, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Result< + T, + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error, + >, + >, +> { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::error::Error, -) -> ::std::rc::Rc { - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_primitives::types::error::Error::AwsCryptographicPrimitivesError { message } => crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error::AwsCryptographicPrimitivesError { message: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&message), @@ -47,7 +57,7 @@ pub fn to_dafny( crate::deps::aws_cryptography_primitives::types::error::Error::ValidationError(inner) => crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error::Opaque { obj: { - let rc = ::std::rc::Rc::new(inner) as ::std::rc::Rc; + let rc = ::dafny_runtime::Rc::new(inner) as ::dafny_runtime::Rc<::dafny_runtime::DynAny>; // safety: `rc` is new, ensuring it has refcount 1 and is uniquely owned. // we should use `dafny_runtime_conversions::rc_struct_to_dafny_class` once it // accepts unsized types (https://github.com/dafny-lang/dafny/pull/5769) @@ -68,7 +78,7 @@ pub fn to_dafny( #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::Error, >, ) -> crate::deps::aws_cryptography_primitives::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair.rs index 81677e94f..efd6d0908 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _generate_ecc_key_pair_input; +pub mod _generate_ecc_key_pair_input; - pub mod _generate_ecc_key_pair_output; +pub mod _generate_ecc_key_pair_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs index 0237175f7..e54b70059 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput::GenerateECCKeyPairInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput::GenerateECCKeyPairInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput{ crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs index 05830f6cb..814af7ff1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput::GenerateECCKeyPairOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput::GenerateECCKeyPairOutput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) , @@ -15,12 +15,12 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput{ crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .set_private_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::from_dafny(dafny_value.privateKey().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_input.rs index c51310ce3..39297e610 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput::GenerateECCKeyPairInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_output.rs index c8473a738..9935bbe74 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecc_key_pair_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput::GenerateECCKeyPairOutput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) @@ -26,20 +26,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput { @@ -65,10 +65,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key.rs index 56386fe9e..222db7ac6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _generate_ecdsa_signature_key_input; +pub mod _generate_ecdsa_signature_key_input; - pub mod _generate_ecdsa_signature_key_output; +pub mod _generate_ecdsa_signature_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs index 5aa62ce59..264c866de 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput{ crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput::builder() .set_signature_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::from_dafny(dafny_value.signatureAlgorithm()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs index 6c8acd84d..965c576d8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), verificationKey: crate::standard_library_conversions::blob_to_dafny(&value.verification_key.unwrap()), signingKey: crate::standard_library_conversions::blob_to_dafny(&value.signing_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput{ crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput::builder() .set_signature_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::from_dafny(dafny_value.signatureAlgorithm()) )) .set_verification_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.verificationKey().clone()))) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_input.rs index feda0baad..b0d806854 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_output.rs index eb4043199..636ff206e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_ecdsa_signature_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput { signatureAlgorithm: crate::deps::aws_cryptography_primitives::conversions::ecdsa_signature_algorithm::to_dafny(value.signature_algorithm.clone().unwrap()), verificationKey: crate::standard_library_conversions::blob_to_dafny(&value.verification_key.unwrap()), @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput { @@ -61,10 +61,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes.rs index edea89e9d..3acaf60fd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _generate_random_bytes_input; +pub mod _generate_random_bytes_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes/_generate_random_bytes_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes/_generate_random_bytes_input.rs index d5e68caeb..38e94854d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes/_generate_random_bytes_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes/_generate_random_bytes_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput::GenerateRandomBytesInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput::GenerateRandomBytesInput { length: value.length.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput{ crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput::builder() .set_length(Some( dafny_value.length() .clone() )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes_input.rs index 0f1940009..8ce4b4e71 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_random_bytes_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput::GenerateRandomBytesInput { length: value.length.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair.rs index 5e92b854f..0a33c398c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _generate_rsa_key_pair_input; +pub mod _generate_rsa_key_pair_input; - pub mod _generate_rsa_key_pair_output; +pub mod _generate_rsa_key_pair_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs index 4e5e5189c..546a195c7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput::GenerateRSAKeyPairInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput::GenerateRSAKeyPairInput { lengthBits: value.length_bits.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput{ crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput::builder() .set_length_bits(Some( dafny_value.lengthBits() .clone() )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs index 847254da6..beffac7a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::rsa_public_key::to_dafny(&value.public_key.clone().unwrap()) , privateKey: crate::deps::aws_cryptography_primitives::conversions::rsa_private_key::to_dafny(&value.private_key.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput { +) -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput{ crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput::builder() .set_public_key(Some( crate::deps::aws_cryptography_primitives::conversions::rsa_public_key::from_dafny(dafny_value.publicKey().clone()) )) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_input.rs index f6b5d0854..2df42e033 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput::GenerateRSAKeyPairInput { lengthBits: value.length_bits.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_output.rs index 985ec87db..e382d6b60 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/generate_rsa_key_pair_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::rsa_public_key::to_dafny(&value.public_key.clone().unwrap()) , @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput { @@ -63,10 +63,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key.rs index 3fe9e1bca..2b6c1a5c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_public_key_from_private_key_input; +pub mod _get_public_key_from_private_key_input; - pub mod _get_public_key_from_private_key_output; +pub mod _get_public_key_from_private_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs index 93e79fd16..511176bd5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput { +) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput{ crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .set_private_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::from_dafny(dafny_value.privateKey().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs index 016fdeaf1..f96de2f5a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) , publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput { +) -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput{ crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .set_private_key(Some( crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::from_dafny(dafny_value.privateKey().clone()) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_input.rs index 025d80560..288956335 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput { @@ -61,10 +61,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_output.rs index cec3b2ea6..10ce19c13 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_public_key_from_private_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), privateKey: crate::deps::aws_cryptography_primitives::conversions::ecc_private_key::to_dafny(&value.private_key.clone().unwrap()) @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput { @@ -63,10 +63,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length.rs index c16e83b52..edea92be6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _get_rsa_key_modulus_length_input; +pub mod _get_rsa_key_modulus_length_input; - pub mod _get_rsa_key_modulus_length_output; +pub mod _get_rsa_key_modulus_length_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs index 5b350dd6a..91c7781f3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput { publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput { +) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput{ crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput::builder() .set_public_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.publicKey().clone()))) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs index 4673dd251..a95dfdc46 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput { length: value.length.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput { +) -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput{ crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput::builder() .set_length(Some( dafny_value.length() .clone() )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_input.rs index 3c1e46e26..058b6b501 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput { publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput, >, ) -> crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_output.rs index 19e59f535..6e2ed9085 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/get_rsa_key_modulus_length_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput { length: value.length.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput { @@ -57,10 +57,12 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput, +> { match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac.rs index bb9f9c152..ddf3fa1cd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _h_mac_input; +pub mod _h_mac_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac/_h_mac_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac/_h_mac_input.rs index bfb2b1bac..ab22fe0bc 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac/_h_mac_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac/_h_mac_input.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput::HMacInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput::HMacInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), key: crate::standard_library_conversions::blob_to_dafny(&value.key.unwrap()), message: crate::standard_library_conversions::blob_to_dafny(&value.message.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput { crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.key().clone()))) - .set_message(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.message().clone()))) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_key(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.key().clone(), + ))) + .set_message(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.message().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac_input.rs index 84ba50913..3dbde114e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/h_mac_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::HMacInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -23,21 +23,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HMacInput, >, ) -> crate::deps::aws_cryptography_primitives::types::HMacInput { @@ -61,7 +65,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf.rs index aaa7ec49b..1a927bffe 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _hkdf_input; +pub mod _hkdf_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf/_hkdf_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf/_hkdf_input.rs index 57ee7e5d3..5b536fca0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf/_hkdf_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf/_hkdf_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput::HkdfInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput::HkdfInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), salt: crate::standard_library_conversions::oblob_to_dafny(&value.salt), ikm: crate::standard_library_conversions::blob_to_dafny(&value.ikm.unwrap()), @@ -15,18 +15,28 @@ pub fn to_dafny( expectedLength: value.expected_length.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput { crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_salt(crate::standard_library_conversions::oblob_from_dafny(dafny_value.salt().clone())) - .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.ikm().clone()))) - .set_info(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.info().clone()))) - .set_expected_length(Some( dafny_value.expectedLength() .clone() )) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_salt(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.salt().clone(), + )) + .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.ikm().clone(), + ))) + .set_info(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.info().clone(), + ))) + .set_expected_length(Some(dafny_value.expectedLength().clone())) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand.rs index 90d67d92f..26a593c24 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _hkdf_expand_input; +pub mod _hkdf_expand_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand/_hkdf_expand_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand/_hkdf_expand_input.rs index 5818a48df..d1a8bda94 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand/_hkdf_expand_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand/_hkdf_expand_input.rs @@ -4,27 +4,35 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput::HkdfExpandInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput::HkdfExpandInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), prk: crate::standard_library_conversions::blob_to_dafny(&value.prk.unwrap()), info: crate::standard_library_conversions::blob_to_dafny(&value.info.unwrap()), expectedLength: value.expected_length.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput { crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_prk(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.prk().clone()))) - .set_info(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.info().clone()))) - .set_expected_length(Some( dafny_value.expectedLength() .clone() )) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_prk(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.prk().clone(), + ))) + .set_info(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.info().clone(), + ))) + .set_expected_length(Some(dafny_value.expectedLength().clone())) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand_input.rs index d12c2ea3b..ffd45a04a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_expand_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::HkdfExpandInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -25,20 +25,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput, >, ) -> crate::deps::aws_cryptography_primitives::types::HkdfExpandInput { @@ -63,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract.rs index c7eae0189..e389ee146 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _hkdf_extract_input; +pub mod _hkdf_extract_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract/_hkdf_extract_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract/_hkdf_extract_input.rs index 9acf27d16..06eec98f3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract/_hkdf_extract_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract/_hkdf_extract_input.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput::HkdfExtractInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput::HkdfExtractInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), salt: crate::standard_library_conversions::oblob_to_dafny(&value.salt), ikm: crate::standard_library_conversions::blob_to_dafny(&value.ikm.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput { crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_salt(crate::standard_library_conversions::oblob_from_dafny(dafny_value.salt().clone())) - .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.ikm().clone()))) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_salt(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.salt().clone(), + )) + .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.ikm().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract_input.rs index 06bdb833e..27b98c1c4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_extract_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::HkdfExtractInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput, >, ) -> crate::deps::aws_cryptography_primitives::types::HkdfExtractInput { @@ -61,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_input.rs index 5c8d92eee..2acf11cea 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/hkdf_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::HkdfInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -25,21 +25,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::HkdfInput, >, ) -> crate::deps::aws_cryptography_primitives::types::HkdfInput { @@ -65,7 +69,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode.rs index 8b8068509..0b0fee087 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _kdf_counter_mode_input; +pub mod _kdf_counter_mode_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode/_kdf_counter_mode_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode/_kdf_counter_mode_input.rs index 3a35961c3..af7ca40b0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode/_kdf_counter_mode_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_counter_mode/_kdf_counter_mode_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput::KdfCtrInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput::KdfCtrInput { digestAlgorithm: crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::to_dafny(value.digest_algorithm.clone().unwrap()), ikm: crate::standard_library_conversions::blob_to_dafny(&value.ikm.unwrap()), expectedLength: value.expected_length.clone().unwrap(), @@ -15,18 +15,28 @@ pub fn to_dafny( nonce: crate::standard_library_conversions::oblob_to_dafny(&value.nonce), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput { crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput::builder() - .set_digest_algorithm(Some( crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny(dafny_value.digestAlgorithm()) )) - .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.ikm().clone()))) - .set_expected_length(Some( dafny_value.expectedLength() .clone() )) - .set_purpose(crate::standard_library_conversions::oblob_from_dafny(dafny_value.purpose().clone())) - .set_nonce(crate::standard_library_conversions::oblob_from_dafny(dafny_value.nonce().clone())) + .set_digest_algorithm(Some( + crate::deps::aws_cryptography_primitives::conversions::digest_algorithm::from_dafny( + dafny_value.digestAlgorithm(), + ), + )) + .set_ikm(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.ikm().clone(), + ))) + .set_expected_length(Some(dafny_value.expectedLength().clone())) + .set_purpose(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.purpose().clone(), + )) + .set_nonce(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.nonce().clone(), + )) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_ctr_input.rs index 382235be5..9b58177db 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/kdf_ctr_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::KdfCtrInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -25,21 +25,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput, >, ) -> crate::deps::aws_cryptography_primitives::types::KdfCtrInput { @@ -65,7 +69,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key.rs index d9dc23726..9d522592d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _parse_public_key_input; +pub mod _parse_public_key_input; - pub mod _parse_public_key_output; +pub mod _parse_public_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_input.rs index ea1c372bf..61666364d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_input.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput::ParsePublicKeyInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput::ParsePublicKeyInput { publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyInput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_output.rs index f72e623a1..b1bcb065c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key/_parse_public_key_output.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput::ParsePublicKeyOutput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput::ParsePublicKeyOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyOutput { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_input.rs index d4d93af1b..318612a04 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput +{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput::ParsePublicKeyInput { publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), } @@ -22,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput { @@ -57,7 +58,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_output.rs index b3c424c68..b2b1da446 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/parse_public_key_output.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput +{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput::ParsePublicKeyOutput { publicKey: crate::deps::aws_cryptography_primitives::conversions::ecc_public_key::to_dafny(&value.public_key.clone().unwrap()) , @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput { @@ -59,7 +60,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt.rs index 39bbfe2ac..4ce3221f0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _rsa_decrypt_input; +pub mod _rsa_decrypt_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt/_rsa_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt/_rsa_decrypt_input.rs index a3f591242..a104bfc78 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt/_rsa_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt/_rsa_decrypt_input.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput::RSADecryptInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput::RSADecryptInput { padding: crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::to_dafny(value.padding.clone().unwrap()), privateKey: crate::standard_library_conversions::blob_to_dafny(&value.private_key.unwrap()), cipherText: crate::standard_library_conversions::blob_to_dafny(&value.cipher_text.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput { crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput::builder() - .set_padding(Some( crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::from_dafny(dafny_value.padding()) )) - .set_private_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.privateKey().clone()))) - .set_cipher_text(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.cipherText().clone()))) + .set_padding(Some( + crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::from_dafny( + dafny_value.padding(), + ), + )) + .set_private_key(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.privateKey().clone(), + ))) + .set_cipher_text(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.cipherText().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt_input.rs index cb2bfaafd..14da9907d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_decrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::RsaDecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput, >, ) -> crate::deps::aws_cryptography_primitives::types::RsaDecryptInput { @@ -61,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt.rs index 084b5d2b1..37f0c6ed2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt.rs @@ -2,4 +2,4 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _rsa_encrypt_input; +pub mod _rsa_encrypt_input; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt/_rsa_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt/_rsa_encrypt_input.rs index 8fa9942cb..e8ef7b74b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt/_rsa_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt/_rsa_encrypt_input.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput::RSAEncryptInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput::RSAEncryptInput { padding: crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::to_dafny(value.padding.clone().unwrap()), publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), plaintext: crate::standard_library_conversions::blob_to_dafny(&value.plaintext.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput, >, ) -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput { crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput::builder() - .set_padding(Some( crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::from_dafny(dafny_value.padding()) )) - .set_public_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.publicKey().clone()))) - .set_plaintext(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.plaintext().clone()))) + .set_padding(Some( + crate::deps::aws_cryptography_primitives::conversions::rsa_padding_mode::from_dafny( + dafny_value.padding(), + ), + )) + .set_public_key(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.publicKey().clone(), + ))) + .set_plaintext(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.plaintext().clone(), + ))) .build() .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt_input.rs index db0220e08..005d60f71 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_encrypt_input.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::RsaEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -24,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput, >, ) -> crate::deps::aws_cryptography_primitives::types::RsaEncryptInput { @@ -61,7 +61,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_padding_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_padding_mode.rs index 7803086c3..8e2cbcc2a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_padding_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_padding_mode.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPaddingMode, +> { + ::dafny_runtime::Rc::new(match value { crate::deps::aws_cryptography_primitives::types::RsaPaddingMode::Pkcs1 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPaddingMode::PKCS1 {}, crate::deps::aws_cryptography_primitives::types::RsaPaddingMode::OaepSha1 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPaddingMode::OAEP_SHA1 {}, crate::deps::aws_cryptography_primitives::types::RsaPaddingMode::OaepSha256 => crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPaddingMode::OAEP_SHA256 {}, @@ -15,7 +17,7 @@ crate::deps::aws_cryptography_primitives::types::RsaPaddingMode::OaepSha512 => c _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPaddingMode, ) -> crate::deps::aws_cryptography_primitives::types::RsaPaddingMode { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_private_key.rs index 337f913aa..64310b31d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_private_key.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::RsaPrivateKey, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPrivateKey, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -23,20 +23,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPrivateKey, >, ) -> crate::deps::aws_cryptography_primitives::types::RsaPrivateKey { @@ -59,7 +59,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_public_key.rs index ea2445595..30738952c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/rsa_public_key.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::RsaPublicKey, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPublicKey, > { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] @@ -22,21 +22,25 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( - value: ::std::option::Option, -) -> ::std::rc::Rc>>{ - ::std::rc::Rc::new(match value { + value: ::std::option::Option, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Option< + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPublicKey, + >, + >, +> { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::RSAPublicKey, >, ) -> crate::deps::aws_cryptography_primitives::types::RsaPublicKey { @@ -59,7 +63,7 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, ) -> ::std::option::Option { diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key.rs index d62a4a550..36a2d5f5c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key.rs @@ -2,6 +2,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. - pub mod _validate_public_key_input; +pub mod _validate_public_key_input; - pub mod _validate_public_key_output; +pub mod _validate_public_key_output; diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_input.rs index 14992dbb8..2a1fdfd1b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_input.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput::ValidatePublicKeyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput::ValidatePublicKeyInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput, >, -) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput { +) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput +{ crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput::builder() .set_ecc_curve(Some( crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::from_dafny(dafny_value.eccCurve()) )) .set_public_key(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.publicKey().clone()))) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_output.rs index 35c49a69d..a556c8788 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key/_validate_public_key_output.rs @@ -4,19 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput::ValidatePublicKeyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput::ValidatePublicKeyOutput { success: value.success.clone().unwrap(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput, >, -) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput { +) -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput +{ crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput::builder() .set_success(Some( dafny_value.success() .clone() )) .build() diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_input.rs index 72861e672..2522fefaa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_input.rs @@ -4,16 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput +{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput::ValidatePublicKeyInput { eccCurve: crate::deps::aws_cryptography_primitives::conversions::ecdh_curve_spec::to_dafny(value.ecc_curve.clone().unwrap()), publicKey: crate::standard_library_conversions::blob_to_dafny(&value.public_key.unwrap()), @@ -23,20 +24,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput, >, ) -> crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput { @@ -59,10 +60,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_output.rs index b759809e6..6a432e20a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/conversions/validate_public_key_output.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput, -> { - ::std::rc::Rc::new(to_dafny_plain(value.clone())) +>{ + ::dafny_runtime::Rc::new(to_dafny_plain(value.clone())) } #[allow(dead_code)] pub fn to_dafny_plain( value: crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput, -) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput { +) -> crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput{ crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput::ValidatePublicKeyOutput { success: value.success.clone().unwrap(), } @@ -22,20 +22,20 @@ pub fn to_dafny_plain( #[allow(dead_code)] pub fn option_to_dafny( value: ::std::option::Option, -) -> ::std::rc::Rc ::dafny_runtime::Rc>>{ - ::std::rc::Rc::new(match value { + ::dafny_runtime::Rc::new(match value { ::std::option::Option::None => crate::_Wrappers_Compile::Option::None {}, ::std::option::Option::Some(x) => crate::_Wrappers_Compile::Option::Some { - value: ::std::rc::Rc::new(to_dafny_plain(x)), + value: ::dafny_runtime::Rc::new(to_dafny_plain(x)), }, }) } #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput, >, ) -> crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput { @@ -57,10 +57,11 @@ pub fn plain_from_dafny( #[allow(dead_code)] pub fn option_from_dafny( - dafny_value: ::std::rc::Rc>>, -) -> ::std::option::Option { +) -> ::std::option::Option +{ match &*dafny_value { crate::_Wrappers_Compile::Option::Some { value } => { ::std::option::Option::Some(plain_from_dafny(value)) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt.rs index b37fce66f..2b2228312 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt.rs @@ -20,20 +20,22 @@ impl AesDecrypt { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_for_AwsCryptographicPrimitives_AESDecrypt(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_decrypt::_aes_decrypt_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_decrypt::_aes_decrypt_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).AESDecrypt(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_input.rs index 4f72c51d4..598d83b13 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_input.rs @@ -6,47 +6,49 @@ #[allow(missing_docs)] pub struct AesDecryptInput { #[allow(missing_docs)] -pub aad: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub enc_alg: ::std::option::Option, -#[allow(missing_docs)] -pub iv: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, + pub aad: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub enc_alg: ::std::option::Option, + #[allow(missing_docs)] + pub iv: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesDecryptInput { #[allow(missing_docs)] -pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_txt -} -#[allow(missing_docs)] -pub fn enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} + pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_txt + } + #[allow(missing_docs)] + pub fn enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } } impl AesDecryptInput { /// Creates a new builder-style object to manufacture [`AesDecryptInput`](crate::operation::aes_decrypt::builders::AesDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptInputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptInputBuilder::default() } } @@ -58,97 +60,112 @@ impl AesDecryptInput { )] pub struct AesDecryptInputBuilder { pub(crate) aad: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) enc_alg: ::std::option::Option, -pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) enc_alg: + ::std::option::Option, + pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesDecryptInputBuilder { #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.aad = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.aad = input; - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_txt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_txt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_txt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_txt = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_txt -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.enc_alg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.enc_alg = input; - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.iv = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.iv = input; - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.aad = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.aad = input; + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_txt( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_txt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_txt( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_txt = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_txt + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.enc_alg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.enc_alg = input; + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.iv = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.iv = input; + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } /// Consumes the builder and constructs a [`AesDecryptInput`](crate::operation::operation::AesDecryptInput). pub fn build( self, @@ -156,13 +173,15 @@ pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput { - aad: self.aad, -auth_tag: self.auth_tag, -cipher_txt: self.cipher_txt, -enc_alg: self.enc_alg, -iv: self.iv, -key: self.key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput { + aad: self.aad, + auth_tag: self.auth_tag, + cipher_txt: self.cipher_txt, + enc_alg: self.enc_alg, + iv: self.iv, + key: self.key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_output.rs index 7dd94d0e4..d155c91c8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/_aes_decrypt_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct AesDecryptOutput { #[allow(missing_docs)] -pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesDecryptOutput { #[allow(missing_docs)] -pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} + pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } } impl AesDecryptOutput { /// Creates a new builder-style object to manufacture [`AesDecryptOutput`](crate::operation::aes_decrypt::builders::AesDecryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct AesDecryptOutputBuilder { } impl AesDecryptOutputBuilder { #[allow(missing_docs)] -pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} + pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.plaintext = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.plaintext = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } /// Consumes the builder and constructs a [`AesDecryptOutput`](crate::operation::operation::AesDecryptOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptOutput { - plaintext: self.plaintext, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptOutput { + plaintext: self.plaintext, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/builders.rs index 3f1aa0e78..ee09fcb48 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_decrypt/builders.rs @@ -35,7 +35,7 @@ impl AesDecryptFluentBuilder { } } /// Access the AesDecrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_decrypt::builders::AesDecryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,96 +53,115 @@ impl AesDecryptFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecrypt::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecrypt::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.aad(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_aad(input); - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_aad() -} -#[allow(missing_docs)] -pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.auth_tag(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_auth_tag(input); - self -} -#[allow(missing_docs)] -pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_auth_tag() -} -#[allow(missing_docs)] -pub fn cipher_txt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.cipher_txt(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_txt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_cipher_txt(input); - self -} -#[allow(missing_docs)] -pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_cipher_txt() -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.enc_alg(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_enc_alg(input); - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - self.inner.get_enc_alg() -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.iv(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_iv(input); - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_iv() -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_key(input); - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_key() -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.aad(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_aad(input); + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_aad() + } + #[allow(missing_docs)] + pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.auth_tag(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_auth_tag(input); + self + } + #[allow(missing_docs)] + pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_auth_tag() + } + #[allow(missing_docs)] + pub fn cipher_txt( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.cipher_txt(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_txt( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_cipher_txt(input); + self + } + #[allow(missing_docs)] + pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_cipher_txt() + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.enc_alg(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_enc_alg(input); + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + self.inner.get_enc_alg() + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.iv(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_iv(input); + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_iv() + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_key(input); + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt.rs index a76195cfd..65eb5163a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt.rs @@ -20,7 +20,7 @@ impl AesEncrypt { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_for_AwsCryptographicPrimitives_AESEncrypt(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_encrypt::_aes_encrypt_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_encrypt::_aes_encrypt_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).AESEncrypt(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl AesEncrypt { crate::deps::aws_cryptography_primitives::conversions::aes_encrypt::_aes_encrypt_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_input.rs index 97cfeda81..980934aae 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_input.rs @@ -6,41 +6,43 @@ #[allow(missing_docs)] pub struct AesEncryptInput { #[allow(missing_docs)] -pub aad: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub enc_alg: ::std::option::Option, -#[allow(missing_docs)] -pub iv: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub msg: ::std::option::Option<::aws_smithy_types::Blob>, + pub aad: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub enc_alg: ::std::option::Option, + #[allow(missing_docs)] + pub iv: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub msg: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptInput { #[allow(missing_docs)] -pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.msg -} + pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.msg + } } impl AesEncryptInput { /// Creates a new builder-style object to manufacture [`AesEncryptInput`](crate::operation::aes_encrypt::builders::AesEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptInputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptInputBuilder::default() } } @@ -52,82 +54,91 @@ impl AesEncryptInput { )] pub struct AesEncryptInputBuilder { pub(crate) aad: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) enc_alg: ::std::option::Option, -pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) msg: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) enc_alg: + ::std::option::Option, + pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) msg: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptInputBuilder { #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.aad = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.aad = input; - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.enc_alg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.enc_alg = input; - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.iv = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.iv = input; - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.msg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.msg = input; - self -} -#[allow(missing_docs)] -pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.msg -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.aad = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.aad = input; + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.enc_alg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.enc_alg = input; + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.iv = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.iv = input; + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.msg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.msg = input; + self + } + #[allow(missing_docs)] + pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.msg + } /// Consumes the builder and constructs a [`AesEncryptInput`](crate::operation::operation::AesEncryptInput). pub fn build( self, @@ -135,12 +146,14 @@ pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput { - aad: self.aad, -enc_alg: self.enc_alg, -iv: self.iv, -key: self.key, -msg: self.msg, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput { + aad: self.aad, + enc_alg: self.enc_alg, + iv: self.iv, + key: self.key, + msg: self.msg, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_output.rs index 1930dba8c..a4ee32de7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/_aes_encrypt_output.rs @@ -6,23 +6,23 @@ #[allow(missing_docs)] pub struct AesEncryptOutput { #[allow(missing_docs)] -pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptOutput { #[allow(missing_docs)] -pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } } impl AesEncryptOutput { /// Creates a new builder-style object to manufacture [`AesEncryptOutput`](crate::operation::aes_encrypt::builders::AesEncryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptOutputBuilder::default() } } @@ -34,37 +34,43 @@ impl AesEncryptOutput { )] pub struct AesEncryptOutputBuilder { pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptOutputBuilder { #[allow(missing_docs)] -pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } /// Consumes the builder and constructs a [`AesEncryptOutput`](crate::operation::operation::AesEncryptOutput). pub fn build( self, @@ -72,9 +78,11 @@ pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput { - auth_tag: self.auth_tag, -cipher_text: self.cipher_text, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput { + auth_tag: self.auth_tag, + cipher_text: self.cipher_text, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/builders.rs index ea3a69efb..ab9383f00 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_encrypt/builders.rs @@ -35,7 +35,7 @@ impl AesEncryptFluentBuilder { } } /// Access the AesEncrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::builders::AesEncryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,82 +53,95 @@ impl AesEncryptFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncrypt::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncrypt::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.aad(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_aad(input); - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_aad() -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.enc_alg(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_enc_alg(input); - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - self.inner.get_enc_alg() -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.iv(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_iv(input); - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_iv() -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_key(input); - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_key() -} -#[allow(missing_docs)] -pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.msg(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_msg(input); - self -} -#[allow(missing_docs)] -pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_msg() -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.aad(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_aad(input); + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_aad() + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.enc_alg(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_enc_alg(input); + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + self.inner.get_enc_alg() + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.iv(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_iv(input); + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_iv() + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_key(input); + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_key() + } + #[allow(missing_docs)] + pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.msg(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_msg(input); + self + } + #[allow(missing_docs)] + pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_msg() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode.rs index ba6f253bc..7e183db87 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode.rs @@ -20,20 +20,22 @@ impl AesKdfCounterMode { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_for_AwsCryptographicPrimitives_AesKdfCounterMode(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_kdf_counter_mode::_aes_kdf_counter_mode_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::aes_kdf_counter_mode::_aes_kdf_counter_mode_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).AesKdfCounterMode(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_input.rs index 94442b5f4..545b808ff 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_input.rs @@ -6,29 +6,29 @@ #[allow(missing_docs)] pub struct AesKdfCtrInput { #[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesKdfCtrInput { #[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } } impl AesKdfCtrInput { /// Creates a new builder-style object to manufacture [`AesKdfCtrInput`](crate::operation::aes_kdf_counter_mode::builders::AesKdfCtrInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrInputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrInputBuilder::default() } } @@ -40,52 +40,58 @@ impl AesKdfCtrInput { )] pub struct AesKdfCtrInputBuilder { pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesKdfCtrInputBuilder { #[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.nonce = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.nonce = input; - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.nonce = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.nonce = input; + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } /// Consumes the builder and constructs a [`AesKdfCtrInput`](crate::operation::operation::AesKdfCtrInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_output.rs index b5021d923..2c9d96440 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/_aes_kdf_ctr_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct AesKdfCtrOutput { #[allow(missing_docs)] -pub okm: ::std::option::Option<::aws_smithy_types::Blob>, + pub okm: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesKdfCtrOutput { #[allow(missing_docs)] -pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } } impl AesKdfCtrOutput { /// Creates a new builder-style object to manufacture [`AesKdfCtrOutput`](crate::operation::aes_kdf_counter_mode::builders::AesKdfCtrOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct AesKdfCtrOutputBuilder { } impl AesKdfCtrOutputBuilder { #[allow(missing_docs)] -pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.okm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.okm = input; - self -} -#[allow(missing_docs)] -pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.okm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.okm = input; + self + } + #[allow(missing_docs)] + pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } /// Consumes the builder and constructs a [`AesKdfCtrOutput`](crate::operation::operation::AesKdfCtrOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/builders.rs index 9c08bd672..1c93f44b0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/aes_kdf_counter_mode/builders.rs @@ -35,7 +35,7 @@ impl AesKdfCounterModeFluentBuilder { } } /// Access the AesKdfCounterMode as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::builders::AesKdfCtrInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,54 +53,61 @@ impl AesKdfCounterModeFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::AesKdfCounterMode::send(&self.client, input).await } #[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.expected_length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_expected_length(input); - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_expected_length() -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.ikm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_ikm(input); - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_ikm() -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.nonce(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_nonce(input); - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_nonce() -} + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.expected_length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_expected_length(input); + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_expected_length() + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.ikm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_ikm(input); + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_ikm() + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.nonce(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_nonce(input); + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_nonce() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key.rs index 2eaee37db..92e147f97 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key.rs @@ -17,10 +17,10 @@ impl CompressPublicKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_for_AwsCryptographicPrimitives_CompressPublicKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::compress_public_key::_compress_public_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::compress_public_key::_compress_public_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).CompressPublicKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl CompressPublicKey { crate::deps::aws_cryptography_primitives::conversions::compress_public_key::_compress_public_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_input.rs index fc9b97589..7db030af3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_input.rs @@ -6,23 +6,30 @@ #[allow(missing_docs)] pub struct CompressPublicKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl CompressPublicKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl CompressPublicKeyInput { /// Creates a new builder-style object to manufacture [`CompressPublicKeyInput`](crate::operation::compress_public_key::builders::CompressPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyInputBuilder::default() } } @@ -33,45 +40,66 @@ impl CompressPublicKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CompressPublicKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl CompressPublicKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`CompressPublicKeyInput`](crate::operation::operation::CompressPublicKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput { ecc_curve: self.ecc_curve, public_key: self.public_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_output.rs index 122120a85..065071734 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/_compress_public_key_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct CompressPublicKeyOutput { #[allow(missing_docs)] -pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CompressPublicKeyOutput { #[allow(missing_docs)] -pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} + pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } } impl CompressPublicKeyOutput { /// Creates a new builder-style object to manufacture [`CompressPublicKeyOutput`](crate::operation::compress_public_key::builders::CompressPublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct CompressPublicKeyOutputBuilder { } impl CompressPublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn compressed_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_compressed_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} + pub fn compressed_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_compressed_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } /// Consumes the builder and constructs a [`CompressPublicKeyOutput`](crate::operation::operation::CompressPublicKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput { compressed_public_key: self.compressed_public_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/builders.rs index 50a3ad467..b5323f396 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/compress_public_key/builders.rs @@ -13,7 +13,7 @@ impl CompressPublicKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.compress_public_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl CompressPublicKeyFluentBuilder { } } /// Access the CompressPublicKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::compress_public_key::builders::CompressPublicKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl CompressPublicKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,40 +53,60 @@ impl CompressPublicKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - self.inner.get_public_key() -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key.rs index aae37a25a..5b2244423 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key.rs @@ -17,10 +17,10 @@ impl DecompressPublicKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_for_AwsCryptographicPrimitives_DecompressPublicKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::decompress_public_key::_decompress_public_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::decompress_public_key::_decompress_public_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).DecompressPublicKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl DecompressPublicKey { crate::deps::aws_cryptography_primitives::conversions::decompress_public_key::_decompress_public_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_input.rs index 1acce1b26..404d60c80 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_input.rs @@ -6,23 +6,27 @@ #[allow(missing_docs)] pub struct DecompressPublicKeyInput { #[allow(missing_docs)] -pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, + pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub ecc_curve: + ::std::option::Option, } impl DecompressPublicKeyInput { #[allow(missing_docs)] -pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} -#[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } + #[allow(missing_docs)] + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } } impl DecompressPublicKeyInput { /// Creates a new builder-style object to manufacture [`DecompressPublicKeyInput`](crate::operation::decompress_public_key::builders::DecompressPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyInputBuilder::default() } } @@ -34,44 +38,62 @@ impl DecompressPublicKeyInput { )] pub struct DecompressPublicKeyInputBuilder { pub(crate) compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) ecc_curve: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, } impl DecompressPublicKeyInputBuilder { #[allow(missing_docs)] -pub fn compressed_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_compressed_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} -#[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn compressed_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_compressed_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } + #[allow(missing_docs)] + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } /// Consumes the builder and constructs a [`DecompressPublicKeyInput`](crate::operation::operation::DecompressPublicKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput { compressed_public_key: self.compressed_public_key, ecc_curve: self.ecc_curve, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_output.rs index 7370a12c6..86b0b1c05 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/_decompress_public_key_output.rs @@ -6,17 +6,20 @@ #[allow(missing_docs)] pub struct DecompressPublicKeyOutput { #[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub public_key: + ::std::option::Option, } impl DecompressPublicKeyOutput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl DecompressPublicKeyOutput { /// Creates a new builder-style object to manufacture [`DecompressPublicKeyOutput`](crate::operation::decompress_public_key::builders::DecompressPublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyOutputBuilder::default() } } @@ -27,30 +30,39 @@ impl DecompressPublicKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecompressPublicKeyOutputBuilder { - pub(crate) public_key: ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl DecompressPublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`DecompressPublicKeyOutput`](crate::operation::operation::DecompressPublicKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput { public_key: self.public_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/builders.rs index b0c824215..d14239877 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/decompress_public_key/builders.rs @@ -13,7 +13,7 @@ impl DecompressPublicKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.decompress_public_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl DecompressPublicKeyFluentBuilder { } } /// Access the DecompressPublicKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::builders::DecompressPublicKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl DecompressPublicKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,40 +53,58 @@ impl DecompressPublicKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn compressed_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.compressed_public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_compressed_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_compressed_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_compressed_public_key() -} -#[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} + pub fn compressed_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.compressed_public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_compressed_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_compressed_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_compressed_public_key() + } + #[allow(missing_docs)] + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret.rs index cb1e883a3..86badb063 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret.rs @@ -17,10 +17,10 @@ impl DeriveSharedSecret { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_for_AwsCryptographicPrimitives_DeriveSharedSecret(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::derive_shared_secret::_derive_shared_secret_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::derive_shared_secret::_derive_shared_secret_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).DeriveSharedSecret(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl DeriveSharedSecret { crate::deps::aws_cryptography_primitives::conversions::derive_shared_secret::_derive_shared_secret_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_input.rs index f5b49185d..c54c7f5f7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_input.rs @@ -6,29 +6,40 @@ #[allow(missing_docs)] pub struct DeriveSharedSecretInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl DeriveSharedSecretInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl DeriveSharedSecretInput { /// Creates a new builder-style object to manufacture [`DeriveSharedSecretInput`](crate::operation::derive_shared_secret::builders::DeriveSharedSecretInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretInputBuilder{ crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretInputBuilder::default() } } @@ -39,60 +50,93 @@ impl DeriveSharedSecretInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DeriveSharedSecretInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl DeriveSharedSecretInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`DeriveSharedSecretInput`](crate::operation::operation::DeriveSharedSecretInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput { ecc_curve: self.ecc_curve, private_key: self.private_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_output.rs index 2aa81ad7a..47dad24dd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/_derive_shared_secret_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct DeriveSharedSecretOutput { #[allow(missing_docs)] -pub shared_secret: ::std::option::Option<::aws_smithy_types::Blob>, + pub shared_secret: ::std::option::Option<::aws_smithy_types::Blob>, } impl DeriveSharedSecretOutput { #[allow(missing_docs)] -pub fn shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.shared_secret -} + pub fn shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.shared_secret + } } impl DeriveSharedSecretOutput { /// Creates a new builder-style object to manufacture [`DeriveSharedSecretOutput`](crate::operation::derive_shared_secret::builders::DeriveSharedSecretOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretOutputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct DeriveSharedSecretOutputBuilder { } impl DeriveSharedSecretOutputBuilder { #[allow(missing_docs)] -pub fn shared_secret(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.shared_secret = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_shared_secret(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.shared_secret = input; - self -} -#[allow(missing_docs)] -pub fn get_shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.shared_secret -} + pub fn shared_secret( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.shared_secret = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_shared_secret( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.shared_secret = input; + self + } + #[allow(missing_docs)] + pub fn get_shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.shared_secret + } /// Consumes the builder and constructs a [`DeriveSharedSecretOutput`](crate::operation::operation::DeriveSharedSecretOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput { shared_secret: self.shared_secret, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/builders.rs index 0bd13a11d..e9cdfef80 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/derive_shared_secret/builders.rs @@ -13,7 +13,7 @@ impl DeriveSharedSecretInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.derive_shared_secret(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl DeriveSharedSecretFluentBuilder { } } /// Access the DeriveSharedSecret as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::builders::DeriveSharedSecretInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl DeriveSharedSecretFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,54 +53,85 @@ impl DeriveSharedSecretFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecret::send(&self.client, input).await } #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.private_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_private_key(input); - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - self.inner.get_private_key() -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - self.inner.get_public_key() -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.private_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.inner = self.inner.set_private_key(input); + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + self.inner.get_private_key() + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest.rs index a5ccc1de7..1b1cb26ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest.rs @@ -20,20 +20,24 @@ impl Digest { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HDigestInput_for_AwsCryptographicPrimitives_Digest(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::digest::_digest_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).Digest(&inner_input); + let inner_input = + crate::deps::aws_cryptography_primitives::conversions::digest::_digest_input::to_dafny( + input, + ); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).Digest(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_input.rs index c8a2d35ef..ed3484641 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_input.rs @@ -6,23 +6,29 @@ #[allow(missing_docs)] pub struct DigestInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub message: ::std::option::Option<::aws_smithy_types::Blob>, } impl DigestInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } } impl DigestInput { /// Creates a new builder-style object to manufacture [`DigestInput`](crate::operation::digest::builders::DigestInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder + { crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder::default() } } @@ -33,38 +39,52 @@ impl DigestInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DigestInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, } impl DigestInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } /// Consumes the builder and constructs a [`DigestInput`](crate::operation::operation::DigestInput). pub fn build( self, @@ -72,9 +92,11 @@ pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::digest::DigestInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::digest::DigestInput { - digest_algorithm: self.digest_algorithm, -message: self.message, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::digest::DigestInput { + digest_algorithm: self.digest_algorithm, + message: self.message, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_output.rs index 3032ce2ed..e106de819 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/_digest_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct DigestOutput { #[allow(missing_docs)] -pub digest: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest: ::std::option::Option<::aws_smithy_types::Blob>, } impl DigestOutput { #[allow(missing_docs)] -pub fn digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.digest -} + pub fn digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.digest + } } impl DigestOutput { /// Creates a new builder-style object to manufacture [`DigestOutput`](crate::operation::digest::builders::DigestOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestOutputBuilder + { crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestOutputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct DigestOutputBuilder { } impl DigestOutputBuilder { #[allow(missing_docs)] -pub fn digest(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.digest = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.digest = input; - self -} -#[allow(missing_docs)] -pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.digest -} + pub fn digest(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.digest = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.digest = input; + self + } + #[allow(missing_docs)] + pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.digest + } /// Consumes the builder and constructs a [`DigestOutput`](crate::operation::operation::DigestOutput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::digest::DigestOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::digest::DigestOutput { - digest: self.digest, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::digest::DigestOutput { + digest: self.digest, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/builders.rs index 8f2baccde..e99ca4ea0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/digest/builders.rs @@ -24,7 +24,8 @@ impl DigestInputBuilder { #[derive(::std::clone::Clone, ::std::fmt::Debug)] pub struct DigestFluentBuilder { client: crate::deps::aws_cryptography_primitives::client::Client, - pub(crate) inner: crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder, + pub(crate) inner: + crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder, } impl DigestFluentBuilder { /// Creates a new `Digest`. @@ -35,7 +36,10 @@ impl DigestFluentBuilder { } } /// Access the Digest as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder { + pub fn as_input( + &self, + ) -> &crate::deps::aws_cryptography_primitives::operation::digest::builders::DigestInputBuilder + { &self.inner } /// Sends the request and returns the response. @@ -53,40 +57,58 @@ impl DigestFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::digest::Digest::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::digest::Digest::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.message(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_message(input); - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_message() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.message(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_message(input); + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_message() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign.rs index 7b77b80b2..51da0dbb8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign.rs @@ -20,20 +20,22 @@ impl EcdsaSign { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HECDSASignInput_for_AwsCryptographicPrimitives_ECDSASign(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::ecdsa_sign::_ecdsa_sign_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::ecdsa_sign::_ecdsa_sign_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ECDSASign(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_input.rs index 3dac47d98..c18467732 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_input.rs @@ -6,29 +6,35 @@ #[allow(missing_docs)] pub struct EcdsaSignInput { #[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub message: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaSignInput { #[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } } impl EcdsaSignInput { /// Creates a new builder-style object to manufacture [`EcdsaSignInput`](crate::operation::ecdsa_sign::builders::EcdsaSignInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignInputBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignInputBuilder::default() } } @@ -40,52 +46,74 @@ impl EcdsaSignInput { )] pub struct EcdsaSignInputBuilder { pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaSignInputBuilder { #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } /// Consumes the builder and constructs a [`EcdsaSignInput`](crate::operation::operation::EcdsaSignInput). pub fn build( self, @@ -93,10 +121,12 @@ pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput { - message: self.message, -signature_algorithm: self.signature_algorithm, -signing_key: self.signing_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput { + message: self.message, + signature_algorithm: self.signature_algorithm, + signing_key: self.signing_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_output.rs index e5674bd98..2d733882c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/_ecdsa_sign_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct EcdsaSignOutput { #[allow(missing_docs)] -pub signature: ::std::option::Option<::aws_smithy_types::Blob>, + pub signature: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaSignOutput { #[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} + pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } } impl EcdsaSignOutput { /// Creates a new builder-style object to manufacture [`EcdsaSignOutput`](crate::operation::ecdsa_sign::builders::EcdsaSignOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct EcdsaSignOutputBuilder { } impl EcdsaSignOutputBuilder { #[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} + pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } /// Consumes the builder and constructs a [`EcdsaSignOutput`](crate::operation::operation::EcdsaSignOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignOutput { - signature: self.signature, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignOutput { + signature: self.signature, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/builders.rs index 23f9f07b6..330e28512 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_sign/builders.rs @@ -35,7 +35,7 @@ impl EcdsaSignFluentBuilder { } } /// Access the EcdsaSign as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::builders::EcdsaSignInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,54 +53,79 @@ impl EcdsaSignFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSign::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSign::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.message(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_message(input); - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_message() -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.signature_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_signature_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - self.inner.get_signature_algorithm() -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.signing_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_signing_key(input); - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_signing_key() -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.message(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_message(input); + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_message() + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.signature_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_signature_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + self.inner.get_signature_algorithm() + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.signing_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_signing_key(input); + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_signing_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify.rs index 381a45a39..428dc60ab 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify.rs @@ -20,20 +20,20 @@ impl EcdsaVerify { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_for_AwsCryptographicPrimitives_ECDSAVerify(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::ecdsa_verify::_ecdsa_verify_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::ecdsa_verify::_ecdsa_verify_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ECDSAVerify(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - inner_result.value() .clone(), - ) + Ok(inner_result.value().clone()) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_input.rs index bfd32523b..9118f63f0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_input.rs @@ -6,35 +6,41 @@ #[allow(missing_docs)] pub struct EcdsaVerifyInput { #[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub message: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaVerifyInput { #[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} -#[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } + #[allow(missing_docs)] + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl EcdsaVerifyInput { /// Creates a new builder-style object to manufacture [`EcdsaVerifyInput`](crate::operation::ecdsa_verify::builders::EcdsaVerifyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyInputBuilder::default() } } @@ -46,67 +52,89 @@ impl EcdsaVerifyInput { )] pub struct EcdsaVerifyInputBuilder { pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaVerifyInputBuilder { #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`EcdsaVerifyInput`](crate::operation::operation::EcdsaVerifyInput). pub fn build( self, @@ -114,11 +142,13 @@ pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types: crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput { - message: self.message, -signature: self.signature, -signature_algorithm: self.signature_algorithm, -verification_key: self.verification_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput { + message: self.message, + signature: self.signature, + signature_algorithm: self.signature_algorithm, + verification_key: self.verification_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_output.rs index 58967b5b6..466e46fc0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/_ecdsa_verify_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct EcdsaVerifyOutput { #[allow(missing_docs)] -pub success: ::std::option::Option<::std::primitive::bool>, + pub success: ::std::option::Option<::std::primitive::bool>, } impl EcdsaVerifyOutput { #[allow(missing_docs)] -pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } } impl EcdsaVerifyOutput { /// Creates a new builder-style object to manufacture [`EcdsaVerifyOutput`](crate::operation::ecdsa_verify::builders::EcdsaVerifyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct EcdsaVerifyOutputBuilder { } impl EcdsaVerifyOutputBuilder { #[allow(missing_docs)] -pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { - self.success = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { - self.success = input; - self -} -#[allow(missing_docs)] -pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { + self.success = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { + self.success = input; + self + } + #[allow(missing_docs)] + pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } /// Consumes the builder and constructs a [`EcdsaVerifyOutput`](crate::operation::operation::EcdsaVerifyOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyOutput { - success: self.success, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyOutput { + success: self.success, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/builders.rs index 134aacac7..59497bf1f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/ecdsa_verify/builders.rs @@ -35,7 +35,7 @@ impl EcdsaVerifyFluentBuilder { } } /// Access the EcdsaVerify as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::builders::EcdsaVerifyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,68 +53,93 @@ impl EcdsaVerifyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerify::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerify::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.message(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_message(input); - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_message() -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.signature(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_signature(input); - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_signature() -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.signature_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_signature_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - self.inner.get_signature_algorithm() -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.verification_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_verification_key(input); - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_verification_key() -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.message(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_message(input); + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_message() + } + #[allow(missing_docs)] + pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.signature(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_signature(input); + self + } + #[allow(missing_docs)] + pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_signature() + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.signature_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_signature_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + self.inner.get_signature_algorithm() + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.verification_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_verification_key(input); + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_verification_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair.rs index ff66dcc75..4574ea8a8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair.rs @@ -17,10 +17,10 @@ impl GenerateEccKeyPair { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_for_AwsCryptographicPrimitives_GenerateECCKeyPair(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_ecc_key_pair::_generate_ecc_key_pair_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_ecc_key_pair::_generate_ecc_key_pair_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GenerateECCKeyPair(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GenerateEccKeyPair { crate::deps::aws_cryptography_primitives::conversions::generate_ecc_key_pair::_generate_ecc_key_pair_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs index 3fe68ae4d..1ae5304e9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_input.rs @@ -6,17 +6,21 @@ #[allow(missing_docs)] pub struct GenerateEccKeyPairInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, } impl GenerateEccKeyPairInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } } impl GenerateEccKeyPairInput { /// Creates a new builder-style object to manufacture [`GenerateEccKeyPairInput`](crate::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInputBuilder::default() } } @@ -27,30 +31,42 @@ impl GenerateEccKeyPairInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEccKeyPairInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, } impl GenerateEccKeyPairInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } /// Consumes the builder and constructs a [`GenerateEccKeyPairInput`](crate::operation::operation::GenerateEccKeyPairInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput { ecc_curve: self.ecc_curve, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs index 9d6ebf530..13ac3b3fe 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/_generate_ecc_key_pair_output.rs @@ -6,29 +6,40 @@ #[allow(missing_docs)] pub struct GenerateEccKeyPairOutput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl GenerateEccKeyPairOutput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl GenerateEccKeyPairOutput { /// Creates a new builder-style object to manufacture [`GenerateEccKeyPairOutput`](crate::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairOutputBuilder::default() } } @@ -39,60 +50,93 @@ impl GenerateEccKeyPairOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEccKeyPairOutputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl GenerateEccKeyPairOutputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`GenerateEccKeyPairOutput`](crate::operation::operation::GenerateEccKeyPairOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput { ecc_curve: self.ecc_curve, private_key: self.private_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/builders.rs index d46385bdd..5596a695e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecc_key_pair/builders.rs @@ -13,7 +13,7 @@ impl GenerateEccKeyPairInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.generate_ecc_key_pair(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl GenerateEccKeyPairFluentBuilder { } } /// Access the GenerateEccKeyPair as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::builders::GenerateEccKeyPairInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl GenerateEccKeyPairFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,26 +53,38 @@ impl GenerateEccKeyPairFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPair::send(&self.client, input).await } #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key.rs index ff551006b..89eb93eea 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key.rs @@ -17,12 +17,12 @@ impl GenerateEcdsaSignatureKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_for_AwsCryptographicPrimitives_GenerateECDSASignatureKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_ecdsa_signature_key::_generate_ecdsa_signature_key_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).GenerateECDSASignatureKey(&inner_input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_ecdsa_signature_key::_generate_ecdsa_signature_key_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .GenerateECDSASignatureKey(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -31,9 +31,11 @@ impl GenerateEcdsaSignatureKey { crate::deps::aws_cryptography_primitives::conversions::generate_ecdsa_signature_key::_generate_ecdsa_signature_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs index afb3b6219..0dd5a83e5 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_input.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct GenerateEcdsaSignatureKeyInput { #[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl GenerateEcdsaSignatureKeyInput { #[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } } impl GenerateEcdsaSignatureKeyInput { /// Creates a new builder-style object to manufacture [`GenerateEcdsaSignatureKeyInput`](crate::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInputBuilder::default() } } @@ -27,30 +33,46 @@ impl GenerateEcdsaSignatureKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEcdsaSignatureKeyInputBuilder { - pub(crate) signature_algorithm: ::std::option::Option, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl GenerateEcdsaSignatureKeyInputBuilder { #[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } /// Consumes the builder and constructs a [`GenerateEcdsaSignatureKeyInput`](crate::operation::operation::GenerateEcdsaSignatureKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput { signature_algorithm: self.signature_algorithm, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs index 0fab3b897..32445d39c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/_generate_ecdsa_signature_key_output.rs @@ -6,29 +6,35 @@ #[allow(missing_docs)] pub struct GenerateEcdsaSignatureKeyOutput { #[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GenerateEcdsaSignatureKeyOutput { #[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl GenerateEcdsaSignatureKeyOutput { /// Creates a new builder-style object to manufacture [`GenerateEcdsaSignatureKeyOutput`](crate::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyOutputBuilder::default() } } @@ -39,60 +45,88 @@ impl GenerateEcdsaSignatureKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEcdsaSignatureKeyOutputBuilder { - pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GenerateEcdsaSignatureKeyOutputBuilder { #[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`GenerateEcdsaSignatureKeyOutput`](crate::operation::operation::GenerateEcdsaSignatureKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput { signature_algorithm: self.signature_algorithm, signing_key: self.signing_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/builders.rs index 3d2e96d2d..08ea3bc9e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_ecdsa_signature_key/builders.rs @@ -13,7 +13,7 @@ impl GenerateEcdsaSignatureKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.generate_ecdsa_signature_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl GenerateEcdsaSignatureKeyFluentBuilder { } } /// Access the GenerateEcdsaSignatureKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::builders::GenerateEcdsaSignatureKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl GenerateEcdsaSignatureKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,26 +53,41 @@ impl GenerateEcdsaSignatureKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.signature_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_signature_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - self.inner.get_signature_algorithm() -} + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.signature_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_signature_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + self.inner.get_signature_algorithm() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes.rs index cc5a61a67..662e08d83 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes.rs @@ -20,20 +20,22 @@ impl GenerateRandomBytes { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_for_AwsCryptographicPrimitives_GenerateRandomBytes(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_random_bytes::_generate_random_bytes_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_random_bytes::_generate_random_bytes_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GenerateRandomBytes(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_input.rs index 32e2da209..988b5a75b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GenerateRandomBytesInput { #[allow(missing_docs)] -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GenerateRandomBytesInput { #[allow(missing_docs)] -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GenerateRandomBytesInput { /// Creates a new builder-style object to manufacture [`GenerateRandomBytesInput`](crate::operation::generate_random_bytes::builders::GenerateRandomBytesInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesInputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesInputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct GenerateRandomBytesInputBuilder { } impl GenerateRandomBytesInputBuilder { #[allow(missing_docs)] -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -#[allow(missing_docs)] -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + #[allow(missing_docs)] + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GenerateRandomBytesInput`](crate::operation::operation::GenerateRandomBytesInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput { length: self.length, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_output.rs index b7360440d..486707709 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/_generate_random_bytes_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GenerateRandomBytesOutput { #[allow(missing_docs)] -pub data: ::std::option::Option<::aws_smithy_types::Blob>, + pub data: ::std::option::Option<::aws_smithy_types::Blob>, } impl GenerateRandomBytesOutput { #[allow(missing_docs)] -pub fn data(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.data -} + pub fn data(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.data + } } impl GenerateRandomBytesOutput { /// Creates a new builder-style object to manufacture [`GenerateRandomBytesOutput`](crate::operation::generate_random_bytes::builders::GenerateRandomBytesOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesOutputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct GenerateRandomBytesOutputBuilder { } impl GenerateRandomBytesOutputBuilder { #[allow(missing_docs)] -pub fn data(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.data = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_data(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.data = input; - self -} -#[allow(missing_docs)] -pub fn get_data(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.data -} + pub fn data(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.data = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_data(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.data = input; + self + } + #[allow(missing_docs)] + pub fn get_data(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.data + } /// Consumes the builder and constructs a [`GenerateRandomBytesOutput`](crate::operation::operation::GenerateRandomBytesOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesOutput { data: self.data, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/builders.rs index d2ebf9309..f0a9cd0b3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_random_bytes/builders.rs @@ -35,7 +35,7 @@ impl GenerateRandomBytesFluentBuilder { } } /// Access the GenerateRandomBytes as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::builders::GenerateRandomBytesInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,26 +53,27 @@ impl GenerateRandomBytesFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytes::send(&self.client, input).await } #[allow(missing_docs)] -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_length(input); - self -} -#[allow(missing_docs)] -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_length() -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.inner = self.inner.length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.inner = self.inner.set_length(input); + self + } + #[allow(missing_docs)] + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_length() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair.rs index 76002db09..302cab560 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair.rs @@ -17,10 +17,10 @@ impl GenerateRsaKeyPair { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_for_AwsCryptographicPrimitives_GenerateRSAKeyPair(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_rsa_key_pair::_generate_rsa_key_pair_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::generate_rsa_key_pair::_generate_rsa_key_pair_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GenerateRSAKeyPair(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GenerateRsaKeyPair { crate::deps::aws_cryptography_primitives::conversions::generate_rsa_key_pair::_generate_rsa_key_pair_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs index 6cf24c7f8..4a34a5473 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GenerateRsaKeyPairInput { #[allow(missing_docs)] -pub length_bits: ::std::option::Option<::std::primitive::i32>, + pub length_bits: ::std::option::Option<::std::primitive::i32>, } impl GenerateRsaKeyPairInput { #[allow(missing_docs)] -pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} + pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } } impl GenerateRsaKeyPairInput { /// Creates a new builder-style object to manufacture [`GenerateRsaKeyPairInput`](crate::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct GenerateRsaKeyPairInputBuilder { } impl GenerateRsaKeyPairInputBuilder { #[allow(missing_docs)] -pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length_bits = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length_bits = input; - self -} -#[allow(missing_docs)] -pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} + pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length_bits = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length_bits = input; + self + } + #[allow(missing_docs)] + pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } /// Consumes the builder and constructs a [`GenerateRsaKeyPairInput`](crate::operation::operation::GenerateRsaKeyPairInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput { length_bits: self.length_bits, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs index c4ce32710..cc351bde2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/_generate_rsa_key_pair_output.rs @@ -6,23 +6,30 @@ #[allow(missing_docs)] pub struct GenerateRsaKeyPairOutput { #[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl GenerateRsaKeyPairOutput { #[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl GenerateRsaKeyPairOutput { /// Creates a new builder-style object to manufacture [`GenerateRsaKeyPairOutput`](crate::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairOutputBuilder::default() } } @@ -33,45 +40,66 @@ impl GenerateRsaKeyPairOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateRsaKeyPairOutputBuilder { - pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl GenerateRsaKeyPairOutputBuilder { #[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`GenerateRsaKeyPairOutput`](crate::operation::operation::GenerateRsaKeyPairOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput { private_key: self.private_key, public_key: self.public_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/builders.rs index c0ef9ed11..1fb9e2c04 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/generate_rsa_key_pair/builders.rs @@ -13,7 +13,7 @@ impl GenerateRsaKeyPairInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.generate_rsa_key_pair(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl GenerateRsaKeyPairFluentBuilder { } } /// Access the GenerateRsaKeyPair as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::builders::GenerateRsaKeyPairInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl GenerateRsaKeyPairFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,26 +53,27 @@ impl GenerateRsaKeyPairFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPair::send(&self.client, input).await } #[allow(missing_docs)] -pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.length_bits(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_length_bits(input); - self -} -#[allow(missing_docs)] -pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_length_bits() -} + pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.inner = self.inner.length_bits(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.inner = self.inner.set_length_bits(input); + self + } + #[allow(missing_docs)] + pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_length_bits() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key.rs index f568135af..17db2a671 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key.rs @@ -17,12 +17,12 @@ impl GetPublicKeyFromPrivateKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_for_AwsCryptographicPrimitives_GetPublicKeyFromPrivateKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::get_public_key_from_private_key::_get_public_key_from_private_key_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).GetPublicKeyFromPrivateKey(&inner_input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::get_public_key_from_private_key::_get_public_key_from_private_key_input::to_dafny(input); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()) + .GetPublicKeyFromPrivateKey(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } @@ -31,9 +31,11 @@ impl GetPublicKeyFromPrivateKey { crate::deps::aws_cryptography_primitives::conversions::get_public_key_from_private_key::_get_public_key_from_private_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs index 6356bc9ed..6719fe4aa 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_input.rs @@ -6,23 +6,31 @@ #[allow(missing_docs)] pub struct GetPublicKeyFromPrivateKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, } impl GetPublicKeyFromPrivateKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } } impl GetPublicKeyFromPrivateKeyInput { /// Creates a new builder-style object to manufacture [`GetPublicKeyFromPrivateKeyInput`](crate::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInputBuilder::default() } } @@ -33,45 +41,69 @@ impl GetPublicKeyFromPrivateKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetPublicKeyFromPrivateKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, } impl GetPublicKeyFromPrivateKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } /// Consumes the builder and constructs a [`GetPublicKeyFromPrivateKeyInput`](crate::operation::operation::GetPublicKeyFromPrivateKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput { ecc_curve: self.ecc_curve, private_key: self.private_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs index ecf7af990..bb046e6c6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/_get_public_key_from_private_key_output.rs @@ -6,29 +6,37 @@ #[allow(missing_docs)] pub struct GetPublicKeyFromPrivateKeyOutput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetPublicKeyFromPrivateKeyOutput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl GetPublicKeyFromPrivateKeyOutput { /// Creates a new builder-style object to manufacture [`GetPublicKeyFromPrivateKeyOutput`](crate::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyOutputBuilder::default() } } @@ -39,60 +47,90 @@ impl GetPublicKeyFromPrivateKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetPublicKeyFromPrivateKeyOutputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetPublicKeyFromPrivateKeyOutputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`GetPublicKeyFromPrivateKeyOutput`](crate::operation::operation::GetPublicKeyFromPrivateKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput { ecc_curve: self.ecc_curve, private_key: self.private_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/builders.rs index 9cc3bd372..d458b5cc6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_public_key_from_private_key/builders.rs @@ -13,7 +13,7 @@ impl GetPublicKeyFromPrivateKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.get_public_key_from_private_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl GetPublicKeyFromPrivateKeyFluentBuilder { } } /// Access the GetPublicKeyFromPrivateKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::builders::GetPublicKeyFromPrivateKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl GetPublicKeyFromPrivateKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,40 +53,63 @@ impl GetPublicKeyFromPrivateKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.private_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_private_key(input); - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - self.inner.get_private_key() -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.private_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.inner = self.inner.set_private_key(input); + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + self.inner.get_private_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length.rs index ff9863d8c..97b4170af 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length.rs @@ -17,10 +17,10 @@ impl GetRsaKeyModulusLength { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_for_AwsCryptographicPrimitives_GetRSAKeyModulusLength(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::get_rsa_key_modulus_length::_get_rsa_key_modulus_length_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::get_rsa_key_modulus_length::_get_rsa_key_modulus_length_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).GetRSAKeyModulusLength(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl GetRsaKeyModulusLength { crate::deps::aws_cryptography_primitives::conversions::get_rsa_key_modulus_length::_get_rsa_key_modulus_length_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs index 7004d6afd..0631fd1d9 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GetRsaKeyModulusLengthInput { #[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetRsaKeyModulusLengthInput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl GetRsaKeyModulusLengthInput { /// Creates a new builder-style object to manufacture [`GetRsaKeyModulusLengthInput`](crate::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInputBuilder{ crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInputBuilder::default() } } @@ -31,26 +31,32 @@ pub struct GetRsaKeyModulusLengthInputBuilder { } impl GetRsaKeyModulusLengthInputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`GetRsaKeyModulusLengthInput`](crate::operation::operation::GetRsaKeyModulusLengthInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput { public_key: self.public_key, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs index fa5f4e699..67c5b9c06 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/_get_rsa_key_modulus_length_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GetRsaKeyModulusLengthOutput { #[allow(missing_docs)] -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GetRsaKeyModulusLengthOutput { #[allow(missing_docs)] -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GetRsaKeyModulusLengthOutput { /// Creates a new builder-style object to manufacture [`GetRsaKeyModulusLengthOutput`](crate::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthOutputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct GetRsaKeyModulusLengthOutputBuilder { } impl GetRsaKeyModulusLengthOutputBuilder { #[allow(missing_docs)] -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -#[allow(missing_docs)] -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + #[allow(missing_docs)] + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GetRsaKeyModulusLengthOutput`](crate::operation::operation::GetRsaKeyModulusLengthOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput { length: self.length, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/builders.rs index dbbdda5a3..55904a140 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/get_rsa_key_modulus_length/builders.rs @@ -13,7 +13,7 @@ impl GetRsaKeyModulusLengthInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.get_rsa_key_modulus_length(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl GetRsaKeyModulusLengthFluentBuilder { } } /// Access the GetRsaKeyModulusLength as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::builders::GetRsaKeyModulusLengthInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl GetRsaKeyModulusLengthFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,26 +53,33 @@ impl GetRsaKeyModulusLengthFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLength::send(&self.client, input).await } #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac.rs index 4fba8fdae..e00a62319 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac.rs @@ -20,20 +20,24 @@ impl HMac { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HHMacInput_for_AwsCryptographicPrimitives_HMac(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::h_mac::_h_mac_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).HMac(&inner_input); + let inner_input = + crate::deps::aws_cryptography_primitives::conversions::h_mac::_h_mac_input::to_dafny( + input, + ); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).HMac(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_input.rs index 7a987da10..fe110369e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_input.rs @@ -6,29 +6,35 @@ #[allow(missing_docs)] pub struct HMacInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub message: ::std::option::Option<::aws_smithy_types::Blob>, } impl HMacInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } } impl HMacInput { /// Creates a new builder-style object to manufacture [`HMacInput`](crate::operation::h_mac::builders::HMacInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder + { crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder::default() } } @@ -39,53 +45,67 @@ impl HMacInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HMacInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, } impl HMacInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } /// Consumes the builder and constructs a [`HMacInput`](crate::operation::operation::HMacInput). pub fn build( self, @@ -93,10 +113,12 @@ pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput { - digest_algorithm: self.digest_algorithm, -key: self.key, -message: self.message, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput { + digest_algorithm: self.digest_algorithm, + key: self.key, + message: self.message, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_output.rs index f62c80c83..00581970b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/_h_mac_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct HMacOutput { #[allow(missing_docs)] -pub digest: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest: ::std::option::Option<::aws_smithy_types::Blob>, } impl HMacOutput { #[allow(missing_docs)] -pub fn digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.digest -} + pub fn digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.digest + } } impl HMacOutput { /// Creates a new builder-style object to manufacture [`HMacOutput`](crate::operation::h_mac::builders::HMacOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacOutputBuilder + { crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacOutputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct HMacOutputBuilder { } impl HMacOutputBuilder { #[allow(missing_docs)] -pub fn digest(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.digest = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.digest = input; - self -} -#[allow(missing_docs)] -pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.digest -} + pub fn digest(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.digest = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.digest = input; + self + } + #[allow(missing_docs)] + pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.digest + } /// Consumes the builder and constructs a [`HMacOutput`](crate::operation::operation::HMacOutput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_digest(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::h_mac::HMacOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::h_mac::HMacOutput { - digest: self.digest, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::h_mac::HMacOutput { + digest: self.digest, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/builders.rs index baf4bfb1f..2f1585277 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/h_mac/builders.rs @@ -24,7 +24,8 @@ impl HMacInputBuilder { #[derive(::std::clone::Clone, ::std::fmt::Debug)] pub struct HMacFluentBuilder { client: crate::deps::aws_cryptography_primitives::client::Client, - pub(crate) inner: crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder, + pub(crate) inner: + crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder, } impl HMacFluentBuilder { /// Creates a new `HMac`. @@ -35,7 +36,10 @@ impl HMacFluentBuilder { } } /// Access the HMac as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder { + pub fn as_input( + &self, + ) -> &crate::deps::aws_cryptography_primitives::operation::h_mac::builders::HMacInputBuilder + { &self.inner } /// Sends the request and returns the response. @@ -53,54 +57,69 @@ impl HMacFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::h_mac::HMac::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::h_mac::HMac::send(&self.client, input) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_key(input); - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_key() -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.message(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_message(input); - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_message() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_key(input); + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_key() + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.message(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_message(input); + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_message() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf.rs index 1a96a6419..256eb7b6b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf.rs @@ -20,20 +20,24 @@ impl Hkdf { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HHkdfInput_for_AwsCryptographicPrimitives_Hkdf(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::hkdf::_hkdf_input::to_dafny(input); - let inner_result = - ::dafny_runtime::md!(client.dafny_client.clone()).Hkdf(&inner_input); + let inner_input = + crate::deps::aws_cryptography_primitives::conversions::hkdf::_hkdf_input::to_dafny( + input, + ); + let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).Hkdf(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_input.rs index 751fc6a97..8c4801623 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_input.rs @@ -6,41 +6,46 @@ #[allow(missing_docs)] pub struct HkdfInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub info: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub info: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } } impl HkdfInput { /// Creates a new builder-style object to manufacture [`HkdfInput`](crate::operation::hkdf::builders::HkdfInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder { crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder::default() } } @@ -51,83 +56,103 @@ impl HkdfInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.info = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.info = input; - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.salt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.salt = input; - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.info = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.info = input; + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.salt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.salt = input; + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } /// Consumes the builder and constructs a [`HkdfInput`](crate::operation::operation::HkdfInput). pub fn build( self, @@ -135,12 +160,14 @@ pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput { - digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -ikm: self.ikm, -info: self.info, -salt: self.salt, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput { + digest_algorithm: self.digest_algorithm, + expected_length: self.expected_length, + ikm: self.ikm, + info: self.info, + salt: self.salt, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_output.rs index 86b65415c..4024b197e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/_hkdf_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct HkdfOutput { #[allow(missing_docs)] -pub okm: ::std::option::Option<::aws_smithy_types::Blob>, + pub okm: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfOutput { #[allow(missing_docs)] -pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } } impl HkdfOutput { /// Creates a new builder-style object to manufacture [`HkdfOutput`](crate::operation::hkdf::builders::HkdfOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfOutputBuilder + { crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfOutputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct HkdfOutputBuilder { } impl HkdfOutputBuilder { #[allow(missing_docs)] -pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.okm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.okm = input; - self -} -#[allow(missing_docs)] -pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.okm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.okm = input; + self + } + #[allow(missing_docs)] + pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } /// Consumes the builder and constructs a [`HkdfOutput`](crate::operation::operation::HkdfOutput). pub fn build( self, @@ -51,8 +53,8 @@ pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfOutput { - okm: self.okm, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfOutput { okm: self.okm }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/builders.rs index bfb1e7c2e..8d32dc6e3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf/builders.rs @@ -24,7 +24,8 @@ impl HkdfInputBuilder { #[derive(::std::clone::Clone, ::std::fmt::Debug)] pub struct HkdfFluentBuilder { client: crate::deps::aws_cryptography_primitives::client::Client, - pub(crate) inner: crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder, + pub(crate) inner: + crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder, } impl HkdfFluentBuilder { /// Creates a new `Hkdf`. @@ -35,7 +36,10 @@ impl HkdfFluentBuilder { } } /// Access the Hkdf as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder { + pub fn as_input( + &self, + ) -> &crate::deps::aws_cryptography_primitives::operation::hkdf::builders::HkdfInputBuilder + { &self.inner } /// Sends the request and returns the response. @@ -53,82 +57,103 @@ impl HkdfFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::hkdf::Hkdf::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::hkdf::Hkdf::send(&self.client, input) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.expected_length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_expected_length(input); - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_expected_length() -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.ikm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_ikm(input); - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_ikm() -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.info(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_info(input); - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_info() -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.salt(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_salt(input); - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_salt() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.expected_length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_expected_length(input); + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_expected_length() + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.ikm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_ikm(input); + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_ikm() + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.info(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_info(input); + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_info() + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.salt(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_salt(input); + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_salt() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand.rs index 89b84ab26..6afa88fd8 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand.rs @@ -20,20 +20,22 @@ impl HkdfExpand { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_for_AwsCryptographicPrimitives_HkdfExpand(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::hkdf_expand::_hkdf_expand_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::hkdf_expand::_hkdf_expand_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).HkdfExpand(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_input.rs index 8d0d7a4a6..15c715f18 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_input.rs @@ -6,35 +6,39 @@ #[allow(missing_docs)] pub struct HkdfExpandInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub info: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub prk: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub info: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub prk: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExpandInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } } impl HkdfExpandInput { /// Creates a new builder-style object to manufacture [`HkdfExpandInput`](crate::operation::hkdf_expand::builders::HkdfExpandInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandInputBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandInputBuilder::default() } } @@ -45,68 +49,88 @@ impl HkdfExpandInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfExpandInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) prk: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) prk: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExpandInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.info = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.info = input; - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.prk = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.prk = input; - self -} -#[allow(missing_docs)] -pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.info = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.info = input; + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.prk = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.prk = input; + self + } + #[allow(missing_docs)] + pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } /// Consumes the builder and constructs a [`HkdfExpandInput`](crate::operation::operation::HkdfExpandInput). pub fn build( self, @@ -114,11 +138,13 @@ pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput { - digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -info: self.info, -prk: self.prk, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput { + digest_algorithm: self.digest_algorithm, + expected_length: self.expected_length, + info: self.info, + prk: self.prk, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_output.rs index 28e6a7949..73c85d731 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/_hkdf_expand_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct HkdfExpandOutput { #[allow(missing_docs)] -pub okm: ::std::option::Option<::aws_smithy_types::Blob>, + pub okm: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExpandOutput { #[allow(missing_docs)] -pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } } impl HkdfExpandOutput { /// Creates a new builder-style object to manufacture [`HkdfExpandOutput`](crate::operation::hkdf_expand::builders::HkdfExpandOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct HkdfExpandOutputBuilder { } impl HkdfExpandOutputBuilder { #[allow(missing_docs)] -pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.okm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.okm = input; - self -} -#[allow(missing_docs)] -pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.okm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.okm = input; + self + } + #[allow(missing_docs)] + pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } /// Consumes the builder and constructs a [`HkdfExpandOutput`](crate::operation::operation::HkdfExpandOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandOutput { - okm: self.okm, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandOutput { + okm: self.okm, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/builders.rs index 2f9f1ae4a..e8b944e7a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_expand/builders.rs @@ -35,7 +35,7 @@ impl HkdfExpandFluentBuilder { } } /// Access the HkdfExpand as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::hkdf_expand::builders::HkdfExpandInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,68 +53,92 @@ impl HkdfExpandFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpand::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpand::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.expected_length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_expected_length(input); - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_expected_length() -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.info(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_info(input); - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_info() -} -#[allow(missing_docs)] -pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.prk(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_prk(input); - self -} -#[allow(missing_docs)] -pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_prk() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.expected_length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_expected_length(input); + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_expected_length() + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.info(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_info(input); + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_info() + } + #[allow(missing_docs)] + pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.prk(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_prk(input); + self + } + #[allow(missing_docs)] + pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_prk() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract.rs index ec2a02d2e..a0c0b007b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract.rs @@ -20,20 +20,22 @@ impl HkdfExtract { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_for_AwsCryptographicPrimitives_HkdfExtract(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::hkdf_extract::_hkdf_extract_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::hkdf_extract::_hkdf_extract_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).HkdfExtract(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_input.rs index 00d4bbd52..09733b88d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_input.rs @@ -6,29 +6,33 @@ #[allow(missing_docs)] pub struct HkdfExtractInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExtractInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } } impl HkdfExtractInput { /// Creates a new builder-style object to manufacture [`HkdfExtractInput`](crate::operation::hkdf_extract::builders::HkdfExtractInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractInputBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractInputBuilder::default() } } @@ -39,53 +43,67 @@ impl HkdfExtractInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfExtractInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExtractInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.salt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.salt = input; - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.salt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.salt = input; + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } /// Consumes the builder and constructs a [`HkdfExtractInput`](crate::operation::operation::HkdfExtractInput). pub fn build( self, @@ -93,10 +111,12 @@ pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput { - digest_algorithm: self.digest_algorithm, -ikm: self.ikm, -salt: self.salt, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput { + digest_algorithm: self.digest_algorithm, + ikm: self.ikm, + salt: self.salt, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_output.rs index 67268719b..90cded12d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/_hkdf_extract_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct HkdfExtractOutput { #[allow(missing_docs)] -pub prk: ::std::option::Option<::aws_smithy_types::Blob>, + pub prk: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExtractOutput { #[allow(missing_docs)] -pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } } impl HkdfExtractOutput { /// Creates a new builder-style object to manufacture [`HkdfExtractOutput`](crate::operation::hkdf_extract::builders::HkdfExtractOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct HkdfExtractOutputBuilder { } impl HkdfExtractOutputBuilder { #[allow(missing_docs)] -pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.prk = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.prk = input; - self -} -#[allow(missing_docs)] -pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.prk = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.prk = input; + self + } + #[allow(missing_docs)] + pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } /// Consumes the builder and constructs a [`HkdfExtractOutput`](crate::operation::operation::HkdfExtractOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractOutput { - prk: self.prk, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractOutput { + prk: self.prk, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/builders.rs index 6c84c7b1c..b14dd991f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/hkdf_extract/builders.rs @@ -35,7 +35,7 @@ impl HkdfExtractFluentBuilder { } } /// Access the HkdfExtract as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::hkdf_extract::builders::HkdfExtractInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,54 +53,72 @@ impl HkdfExtractFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtract::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtract::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.ikm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_ikm(input); - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_ikm() -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.salt(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_salt(input); - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_salt() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.ikm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_ikm(input); + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_ikm() + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.salt(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_salt(input); + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_salt() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode.rs index d8da94989..a3842ae16 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode.rs @@ -20,20 +20,22 @@ impl KdfCounterMode { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_for_AwsCryptographicPrimitives_KdfCounterMode(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::kdf_counter_mode::_kdf_counter_mode_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::kdf_counter_mode::_kdf_counter_mode_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).KdfCounterMode(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_input.rs index b4bcdf894..be316092d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_input.rs @@ -6,41 +6,45 @@ #[allow(missing_docs)] pub struct KdfCtrInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub purpose: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub purpose: ::std::option::Option<::aws_smithy_types::Blob>, } impl KdfCtrInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} -#[allow(missing_docs)] -pub fn purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.purpose -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } + #[allow(missing_docs)] + pub fn purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.purpose + } } impl KdfCtrInput { /// Creates a new builder-style object to manufacture [`KdfCtrInput`](crate::operation::kdf_counter_mode::builders::KdfCtrInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrInputBuilder{ crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrInputBuilder::default() } } @@ -51,83 +55,103 @@ impl KdfCtrInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct KdfCtrInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) purpose: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) purpose: ::std::option::Option<::aws_smithy_types::Blob>, } impl KdfCtrInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.nonce = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.nonce = input; - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} -#[allow(missing_docs)] -pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.purpose = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.purpose = input; - self -} -#[allow(missing_docs)] -pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.purpose -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.nonce = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.nonce = input; + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } + #[allow(missing_docs)] + pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.purpose = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.purpose = input; + self + } + #[allow(missing_docs)] + pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.purpose + } /// Consumes the builder and constructs a [`KdfCtrInput`](crate::operation::operation::KdfCtrInput). pub fn build( self, @@ -135,12 +159,14 @@ pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput { - digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -ikm: self.ikm, -nonce: self.nonce, -purpose: self.purpose, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput { + digest_algorithm: self.digest_algorithm, + expected_length: self.expected_length, + ikm: self.ikm, + nonce: self.nonce, + purpose: self.purpose, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_output.rs index dcfb7fc58..092936927 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/_kdf_ctr_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct KdfCtrOutput { #[allow(missing_docs)] -pub okm: ::std::option::Option<::aws_smithy_types::Blob>, + pub okm: ::std::option::Option<::aws_smithy_types::Blob>, } impl KdfCtrOutput { #[allow(missing_docs)] -pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } } impl KdfCtrOutput { /// Creates a new builder-style object to manufacture [`KdfCtrOutput`](crate::operation::kdf_counter_mode::builders::KdfCtrOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct KdfCtrOutputBuilder { } impl KdfCtrOutputBuilder { #[allow(missing_docs)] -pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.okm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.okm = input; - self -} -#[allow(missing_docs)] -pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.okm -} + pub fn okm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.okm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_okm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.okm = input; + self + } + #[allow(missing_docs)] + pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.okm + } /// Consumes the builder and constructs a [`KdfCtrOutput`](crate::operation::operation::KdfCtrOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_okm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrOutput { - okm: self.okm, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrOutput { + okm: self.okm, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/builders.rs index 1d0b21aeb..3d966d426 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/kdf_counter_mode/builders.rs @@ -35,7 +35,7 @@ impl KdfCounterModeFluentBuilder { } } /// Access the KdfCounterMode as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::builders::KdfCtrInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,82 +53,106 @@ impl KdfCounterModeFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCounterMode::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCounterMode::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.digest_algorithm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_digest_algorithm(input); - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - self.inner.get_digest_algorithm() -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.inner = self.inner.expected_length(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.inner = self.inner.set_expected_length(input); - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - self.inner.get_expected_length() -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.ikm(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_ikm(input); - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_ikm() -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.nonce(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_nonce(input); - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_nonce() -} -#[allow(missing_docs)] -pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.purpose(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_purpose(input); - self -} -#[allow(missing_docs)] -pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_purpose() -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.digest_algorithm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.inner = self.inner.set_digest_algorithm(input); + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + self.inner.get_digest_algorithm() + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.expected_length(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.inner = self.inner.set_expected_length(input); + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + self.inner.get_expected_length() + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.ikm(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_ikm(input); + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_ikm() + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.nonce(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_nonce(input); + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_nonce() + } + #[allow(missing_docs)] + pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.purpose(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_purpose(input); + self + } + #[allow(missing_docs)] + pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_purpose() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key.rs index d47addd48..2706ec13f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key.rs @@ -20,7 +20,7 @@ impl ParsePublicKey { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_for_AwsCryptographicPrimitives_ParsePublicKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::parse_public_key::_parse_public_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::parse_public_key::_parse_public_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ParsePublicKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl ParsePublicKey { crate::deps::aws_cryptography_primitives::conversions::parse_public_key::_parse_public_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_input.rs index 9d9365695..3a338f8d0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_input.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct ParsePublicKeyInput { #[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ParsePublicKeyInput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl ParsePublicKeyInput { /// Creates a new builder-style object to manufacture [`ParsePublicKeyInput`](crate::operation::parse_public_key::builders::ParsePublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyInputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct ParsePublicKeyInputBuilder { } impl ParsePublicKeyInputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`ParsePublicKeyInput`](crate::operation::operation::ParsePublicKeyInput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_output.rs index 999e9cd22..0a1eedb6f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/_parse_public_key_output.rs @@ -6,17 +6,20 @@ #[allow(missing_docs)] pub struct ParsePublicKeyOutput { #[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub public_key: + ::std::option::Option, } impl ParsePublicKeyOutput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl ParsePublicKeyOutput { /// Creates a new builder-style object to manufacture [`ParsePublicKeyOutput`](crate::operation::parse_public_key::builders::ParsePublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyOutputBuilder::default() } } @@ -27,23 +30,32 @@ impl ParsePublicKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ParsePublicKeyOutputBuilder { - pub(crate) public_key: ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl ParsePublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`ParsePublicKeyOutput`](crate::operation::operation::ParsePublicKeyOutput). pub fn build( self, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/builders.rs index 47e3a0d82..d57c41275 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/parse_public_key/builders.rs @@ -35,7 +35,7 @@ impl ParsePublicKeyFluentBuilder { } } /// Access the ParsePublicKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::parse_public_key::builders::ParsePublicKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,26 +53,37 @@ impl ParsePublicKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKey::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKey::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt.rs index 36b745e79..2eaacbdd6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt.rs @@ -20,20 +20,22 @@ impl RsaDecrypt { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_for_AwsCryptographicPrimitives_RSADecrypt(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::rsa_decrypt::_rsa_decrypt_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::rsa_decrypt::_rsa_decrypt_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).RSADecrypt(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_input.rs index faa4a0914..4c0377245 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_input.rs @@ -6,29 +6,33 @@ #[allow(missing_docs)] pub struct RsaDecryptInput { #[allow(missing_docs)] -pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub padding: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub padding: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaDecryptInput { #[allow(missing_docs)] -pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} -#[allow(missing_docs)] -pub fn padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} + pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } + #[allow(missing_docs)] + pub fn padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } } impl RsaDecryptInput { /// Creates a new builder-style object to manufacture [`RsaDecryptInput`](crate::operation::rsa_decrypt::builders::RsaDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptInputBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptInputBuilder::default() } } @@ -40,52 +44,78 @@ impl RsaDecryptInput { )] pub struct RsaDecryptInputBuilder { pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) padding: ::std::option::Option, -pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) padding: + ::std::option::Option, + pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaDecryptInputBuilder { #[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} -#[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.padding = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.padding = input; - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } + #[allow(missing_docs)] + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = input; + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } /// Consumes the builder and constructs a [`RsaDecryptInput`](crate::operation::operation::RsaDecryptInput). pub fn build( self, @@ -93,10 +123,12 @@ pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput { - cipher_text: self.cipher_text, -padding: self.padding, -private_key: self.private_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput { + cipher_text: self.cipher_text, + padding: self.padding, + private_key: self.private_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_output.rs index 633f05bc7..772c68347 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/_rsa_decrypt_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct RsaDecryptOutput { #[allow(missing_docs)] -pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaDecryptOutput { #[allow(missing_docs)] -pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} + pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } } impl RsaDecryptOutput { /// Creates a new builder-style object to manufacture [`RsaDecryptOutput`](crate::operation::rsa_decrypt::builders::RsaDecryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct RsaDecryptOutputBuilder { } impl RsaDecryptOutputBuilder { #[allow(missing_docs)] -pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} + pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.plaintext = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.plaintext = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } /// Consumes the builder and constructs a [`RsaDecryptOutput`](crate::operation::operation::RsaDecryptOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptOutput { - plaintext: self.plaintext, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptOutput { + plaintext: self.plaintext, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/builders.rs index cb8aa39aa..0ae12def7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_decrypt/builders.rs @@ -35,7 +35,7 @@ impl RsaDecryptFluentBuilder { } } /// Access the RsaDecrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::builders::RsaDecryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,54 +53,84 @@ impl RsaDecryptFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecrypt::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecrypt::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.cipher_text(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_cipher_text(input); - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_cipher_text() -} -#[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.padding(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_padding(input); - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - self.inner.get_padding() -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.private_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_private_key(input); - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_private_key() -} + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.cipher_text(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_cipher_text(input); + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_cipher_text() + } + #[allow(missing_docs)] + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.inner = self.inner.padding(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.inner = self.inner.set_padding(input); + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + self.inner.get_padding() + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.private_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_private_key(input); + self + } + #[allow(missing_docs)] + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_private_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt.rs index fc489c74d..b05a704e3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt.rs @@ -20,20 +20,22 @@ impl RsaEncrypt { > { crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_for_AwsCryptographicPrimitives_RSAEncrypt(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::rsa_encrypt::_rsa_encrypt_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::rsa_encrypt::_rsa_encrypt_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).RSAEncrypt(&inner_input); if matches!( inner_result.as_ref(), crate::r#_Wrappers_Compile::Result::Success { .. } ) { - Ok( - crate::standard_library_conversions::blob_from_dafny(inner_result.value().clone()), - ) - } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), + Ok(crate::standard_library_conversions::blob_from_dafny( + inner_result.value().clone(), )) + } else { + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_input.rs index 9aae7d4f5..1490dfcbd 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_input.rs @@ -6,29 +6,33 @@ #[allow(missing_docs)] pub struct RsaEncryptInput { #[allow(missing_docs)] -pub padding: ::std::option::Option, -#[allow(missing_docs)] -pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub padding: + ::std::option::Option, + #[allow(missing_docs)] + pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaEncryptInput { #[allow(missing_docs)] -pub fn padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl RsaEncryptInput { /// Creates a new builder-style object to manufacture [`RsaEncryptInput`](crate::operation::rsa_encrypt::builders::RsaEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptInputBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptInputBuilder::default() } } @@ -39,53 +43,73 @@ impl RsaEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct RsaEncryptInputBuilder { - pub(crate) padding: ::std::option::Option, -pub(crate) plaintext: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) padding: + ::std::option::Option, + pub(crate) plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaEncryptInputBuilder { #[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.padding = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.padding = input; - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = input; + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.plaintext = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.plaintext = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`RsaEncryptInput`](crate::operation::operation::RsaEncryptInput). pub fn build( self, @@ -93,10 +117,12 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput { - padding: self.padding, -plaintext: self.plaintext, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput { + padding: self.padding, + plaintext: self.plaintext, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_output.rs index 60a6eaac5..31f02908d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/_rsa_encrypt_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct RsaEncryptOutput { #[allow(missing_docs)] -pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaEncryptOutput { #[allow(missing_docs)] -pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } } impl RsaEncryptOutput { /// Creates a new builder-style object to manufacture [`RsaEncryptOutput`](crate::operation::rsa_encrypt::builders::RsaEncryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptOutputBuilder::default() } } @@ -31,19 +31,25 @@ pub struct RsaEncryptOutputBuilder { } impl RsaEncryptOutputBuilder { #[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } /// Consumes the builder and constructs a [`RsaEncryptOutput`](crate::operation::operation::RsaEncryptOutput). pub fn build( self, @@ -51,8 +57,10 @@ pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptOutput { - cipher_text: self.cipher_text, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptOutput { + cipher_text: self.cipher_text, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/builders.rs index 0ac7437c5..a09fa88f4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/rsa_encrypt/builders.rs @@ -35,7 +35,7 @@ impl RsaEncryptFluentBuilder { } } /// Access the RsaEncrypt as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::builders::RsaEncryptInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -53,54 +53,78 @@ impl RsaEncryptFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; - crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncrypt::send(&self.client, input).await + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; + crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncrypt::send( + &self.client, + input, + ) + .await } #[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.padding(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_padding(input); - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - self.inner.get_padding() -} -#[allow(missing_docs)] -pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.plaintext(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_plaintext(input); - self -} -#[allow(missing_docs)] -pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_plaintext() -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.inner = self.inner.padding(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.inner = self.inner.set_padding(input); + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + self.inner.get_padding() + } + #[allow(missing_docs)] + pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.plaintext(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.inner = self.inner.set_plaintext(input); + self + } + #[allow(missing_docs)] + pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_plaintext() + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key.rs index 215f41201..6a6896b8f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key.rs @@ -17,10 +17,10 @@ impl ValidatePublicKey { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ crate::deps::aws_cryptography_primitives::validation::validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_for_AwsCryptographicPrimitives_ValidatePublicKey(&input) .map_err(crate::deps::aws_cryptography_primitives::types::error::Error::wrap_validation_err)?; - let inner_input = crate::deps::aws_cryptography_primitives::conversions::validate_public_key::_validate_public_key_input::to_dafny(input); + let inner_input = crate::deps::aws_cryptography_primitives::conversions::validate_public_key::_validate_public_key_input::to_dafny(input); let inner_result = ::dafny_runtime::md!(client.dafny_client.clone()).ValidatePublicKey(&inner_input); if matches!( @@ -31,9 +31,11 @@ impl ValidatePublicKey { crate::deps::aws_cryptography_primitives::conversions::validate_public_key::_validate_public_key_output::from_dafny(inner_result.value().clone()), ) } else { - Err(crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( - inner_result.error().clone(), - )) + Err( + crate::deps::aws_cryptography_primitives::conversions::error::from_dafny( + inner_result.error().clone(), + ), + ) } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_input.rs index 289a7b3c9..87f32d1f2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_input.rs @@ -6,23 +6,27 @@ #[allow(missing_docs)] pub struct ValidatePublicKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ValidatePublicKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl ValidatePublicKeyInput { /// Creates a new builder-style object to manufacture [`ValidatePublicKeyInput`](crate::operation::validate_public_key::builders::ValidatePublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyInputBuilder{ crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyInputBuilder::default() } } @@ -33,45 +37,63 @@ impl ValidatePublicKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidatePublicKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ValidatePublicKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`ValidatePublicKeyInput`](crate::operation::operation::ValidatePublicKeyInput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput { ecc_curve: self.ecc_curve, public_key: self.public_key, diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_output.rs index 7b7863d8f..55678a79d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/_validate_public_key_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct ValidatePublicKeyOutput { #[allow(missing_docs)] -pub success: ::std::option::Option<::std::primitive::bool>, + pub success: ::std::option::Option<::std::primitive::bool>, } impl ValidatePublicKeyOutput { #[allow(missing_docs)] -pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } } impl ValidatePublicKeyOutput { /// Creates a new builder-style object to manufacture [`ValidatePublicKeyOutput`](crate::operation::validate_public_key::builders::ValidatePublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyOutputBuilder::default() } } @@ -31,26 +31,26 @@ pub struct ValidatePublicKeyOutputBuilder { } impl ValidatePublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { - self.success = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { - self.success = input; - self -} -#[allow(missing_docs)] -pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { + self.success = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { + self.success = input; + self + } + #[allow(missing_docs)] + pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } /// Consumes the builder and constructs a [`ValidatePublicKeyOutput`](crate::operation::operation::ValidatePublicKeyOutput). pub fn build( self, ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, ::aws_smithy_types::error::operation::BuildError, - > { + >{ ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput { success: self.success, }) diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/builders.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/builders.rs index 193ab6469..c35709e5b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/builders.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/operation/validate_public_key/builders.rs @@ -13,7 +13,7 @@ impl ValidatePublicKeyInputBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let mut fluent_builder = client.validate_public_key(); fluent_builder.inner = self; fluent_builder.send().await @@ -35,7 +35,7 @@ impl ValidatePublicKeyFluentBuilder { } } /// Access the ValidatePublicKey as a reference. - pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyInputBuilder { + pub fn as_input(&self) -> &crate::deps::aws_cryptography_primitives::operation::validate_public_key::builders::ValidatePublicKeyInputBuilder{ &self.inner } /// Sends the request and returns the response. @@ -44,7 +44,7 @@ impl ValidatePublicKeyFluentBuilder { ) -> ::std::result::Result< crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, crate::deps::aws_cryptography_primitives::types::error::Error, - > { + >{ let input = self .inner .build() @@ -53,40 +53,58 @@ impl ValidatePublicKeyFluentBuilder { // and smithy-rs seems to not generate a ValidationError case unless there is. // Vanilla smithy-rs uses SdkError::construction_failure, but we aren't using SdkError. .map_err(|mut e| { - let msg = format!("{:?}", e); - crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { - obj: ::dafny_runtime::Object::from_ref(&mut e as &mut dyn ::std::any::Any), - objMessage: msg - }})?; + let msg = format!("{:?}", e); + crate::deps::aws_cryptography_primitives::types::error::Error::OpaqueWithText { + obj: ::dafny_runtime::Object::from_ref(&mut e as &mut ::dafny_runtime::DynAny), + objMessage: msg, + } + })?; crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKey::send(&self.client, input).await } #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.inner = self.inner.ecc_curve(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.inner = self.inner.set_ecc_curve(input); - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - self.inner.get_ecc_curve() -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.public_key(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.inner = self.inner.set_public_key(input); - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - self.inner.get_public_key() -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.inner = self.inner.ecc_curve(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.inner = self.inner.set_ecc_curve(input); + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + self.inner.get_ecc_curve() + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.public_key(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.inner = self.inner.set_public_key(input); + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + self.inner.get_public_key() + } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types.rs index 0291fd6af..20ab58e22 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types.rs @@ -7,8 +7,6 @@ pub use crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoCo pub mod builders; - - mod _aes_ctr; pub use crate::deps::aws_cryptography_primitives::types::_aes_ctr::AesCtr; mod _aes_gcm; @@ -102,4 +100,3 @@ mod _ecdsa_signature_algorithm; pub use crate::deps::aws_cryptography_primitives::types::_ecdsa_signature_algorithm::EcdsaSignatureAlgorithm; mod _rsa_padding_mode; pub use crate::deps::aws_cryptography_primitives::types::_rsa_padding_mode::RsaPaddingMode; - diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_ctr.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_ctr.rs index edf3c0329..73e7da332 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_ctr.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_ctr.rs @@ -6,19 +6,19 @@ #[allow(missing_docs)] pub struct AesCtr { #[allow(missing_docs)] -pub key_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub nonce_length: ::std::option::Option<::std::primitive::i32>, + pub key_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub nonce_length: ::std::option::Option<::std::primitive::i32>, } impl AesCtr { #[allow(missing_docs)] -pub fn key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.key_length -} -#[allow(missing_docs)] -pub fn nonce_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.nonce_length -} + pub fn key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.key_length + } + #[allow(missing_docs)] + pub fn nonce_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.nonce_length + } } impl AesCtr { /// Creates a new builder-style object to manufacture [`AesCtr`](crate::deps::aws_cryptography_primitives::types::AesCtr). @@ -34,37 +34,37 @@ impl AesCtr { )] pub struct AesCtrBuilder { pub(crate) key_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) nonce_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) nonce_length: ::std::option::Option<::std::primitive::i32>, } impl AesCtrBuilder { #[allow(missing_docs)] -pub fn key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.key_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.key_length = input; - self -} -#[allow(missing_docs)] -pub fn get_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.key_length -} -#[allow(missing_docs)] -pub fn nonce_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.nonce_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.nonce_length = input; - self -} -#[allow(missing_docs)] -pub fn get_nonce_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.nonce_length -} + pub fn key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.key_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.key_length = input; + self + } + #[allow(missing_docs)] + pub fn get_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.key_length + } + #[allow(missing_docs)] + pub fn nonce_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.nonce_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.nonce_length = input; + self + } + #[allow(missing_docs)] + pub fn get_nonce_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.nonce_length + } /// Consumes the builder and constructs a [`AesCtr`](crate::deps::aws_cryptography_primitives::types::AesCtr). pub fn build( self, @@ -74,7 +74,7 @@ pub fn get_nonce_length(&self) -> &::std::option::Option<::std::primitive::i32> > { ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesCtr { key_length: self.key_length, -nonce_length: self.nonce_length, + nonce_length: self.nonce_length, }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_decrypt_input.rs index aba7fb20b..bc5d718e3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_decrypt_input.rs @@ -6,47 +6,50 @@ #[allow(missing_docs)] pub struct AesDecryptInput { #[allow(missing_docs)] -pub aad: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub enc_alg: ::std::option::Option, -#[allow(missing_docs)] -pub iv: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, + pub aad: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub enc_alg: ::std::option::Option, + #[allow(missing_docs)] + pub iv: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesDecryptInput { #[allow(missing_docs)] -pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_txt -} -#[allow(missing_docs)] -pub fn enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} + pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_txt + } + #[allow(missing_docs)] + pub fn enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } } impl AesDecryptInput { /// Creates a new builder-style object to manufacture [`AesDecryptInput`](crate::deps::aws_cryptography_primitives::types::AesDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::AesDecryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::AesDecryptInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::AesDecryptInputBuilder::default() } } @@ -58,97 +61,112 @@ impl AesDecryptInput { )] pub struct AesDecryptInputBuilder { pub(crate) aad: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) enc_alg: ::std::option::Option, -pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) cipher_txt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) enc_alg: + ::std::option::Option, + pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesDecryptInputBuilder { #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.aad = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.aad = input; - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_txt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_txt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_txt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_txt = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_txt -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.enc_alg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.enc_alg = input; - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.iv = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.iv = input; - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.aad = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.aad = input; + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_txt( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_txt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_txt( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_txt = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_txt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_txt + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.enc_alg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.enc_alg = input; + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.iv = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.iv = input; + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } /// Consumes the builder and constructs a [`AesDecryptInput`](crate::deps::aws_cryptography_primitives::types::AesDecryptInput). pub fn build( self, @@ -156,13 +174,15 @@ pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::AesDecryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesDecryptInput { - aad: self.aad, -auth_tag: self.auth_tag, -cipher_txt: self.cipher_txt, -enc_alg: self.enc_alg, -iv: self.iv, -key: self.key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::AesDecryptInput { + aad: self.aad, + auth_tag: self.auth_tag, + cipher_txt: self.cipher_txt, + enc_alg: self.enc_alg, + iv: self.iv, + key: self.key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_input.rs index 8bf0315ec..b96933f78 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_input.rs @@ -6,41 +6,44 @@ #[allow(missing_docs)] pub struct AesEncryptInput { #[allow(missing_docs)] -pub aad: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub enc_alg: ::std::option::Option, -#[allow(missing_docs)] -pub iv: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub msg: ::std::option::Option<::aws_smithy_types::Blob>, + pub aad: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub enc_alg: ::std::option::Option, + #[allow(missing_docs)] + pub iv: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub msg: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptInput { #[allow(missing_docs)] -pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.msg -} + pub fn aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.msg + } } impl AesEncryptInput { /// Creates a new builder-style object to manufacture [`AesEncryptInput`](crate::deps::aws_cryptography_primitives::types::AesEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::AesEncryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::AesEncryptInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::AesEncryptInputBuilder::default() } } @@ -52,82 +55,91 @@ impl AesEncryptInput { )] pub struct AesEncryptInputBuilder { pub(crate) aad: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) enc_alg: ::std::option::Option, -pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) msg: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) enc_alg: + ::std::option::Option, + pub(crate) iv: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) msg: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptInputBuilder { #[allow(missing_docs)] -pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.aad = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.aad = input; - self -} -#[allow(missing_docs)] -pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.aad -} -#[allow(missing_docs)] -pub fn enc_alg(mut self, input: impl ::std::convert::Into) -> Self { - self.enc_alg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_enc_alg(mut self, input: ::std::option::Option) -> Self { - self.enc_alg = input; - self -} -#[allow(missing_docs)] -pub fn get_enc_alg(&self) -> &::std::option::Option { - &self.enc_alg -} -#[allow(missing_docs)] -pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.iv = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.iv = input; - self -} -#[allow(missing_docs)] -pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.iv -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.msg = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.msg = input; - self -} -#[allow(missing_docs)] -pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.msg -} + pub fn aad(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.aad = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_aad(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.aad = input; + self + } + #[allow(missing_docs)] + pub fn get_aad(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.aad + } + #[allow(missing_docs)] + pub fn enc_alg( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.enc_alg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_enc_alg( + mut self, + input: ::std::option::Option, + ) -> Self { + self.enc_alg = input; + self + } + #[allow(missing_docs)] + pub fn get_enc_alg( + &self, + ) -> &::std::option::Option { + &self.enc_alg + } + #[allow(missing_docs)] + pub fn iv(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.iv = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.iv = input; + self + } + #[allow(missing_docs)] + pub fn get_iv(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.iv + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn msg(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.msg = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_msg(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.msg = input; + self + } + #[allow(missing_docs)] + pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.msg + } /// Consumes the builder and constructs a [`AesEncryptInput`](crate::deps::aws_cryptography_primitives::types::AesEncryptInput). pub fn build( self, @@ -135,12 +147,14 @@ pub fn get_msg(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::AesEncryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesEncryptInput { - aad: self.aad, -enc_alg: self.enc_alg, -iv: self.iv, -key: self.key, -msg: self.msg, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::AesEncryptInput { + aad: self.aad, + enc_alg: self.enc_alg, + iv: self.iv, + key: self.key, + msg: self.msg, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_output.rs index 87c7fef40..0d1b74bf0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_encrypt_output.rs @@ -6,24 +6,26 @@ #[allow(missing_docs)] pub struct AesEncryptOutput { #[allow(missing_docs)] -pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + pub auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptOutput { #[allow(missing_docs)] -pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } } impl AesEncryptOutput { /// Creates a new builder-style object to manufacture [`AesEncryptOutput`](crate::deps::aws_cryptography_primitives::types::AesEncryptOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::AesEncryptOutputBuilder { - crate::deps::aws_cryptography_primitives::types::builders::AesEncryptOutputBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::AesEncryptOutputBuilder { + crate::deps::aws_cryptography_primitives::types::builders::AesEncryptOutputBuilder::default( + ) } } @@ -34,37 +36,43 @@ impl AesEncryptOutput { )] pub struct AesEncryptOutputBuilder { pub(crate) auth_tag: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesEncryptOutputBuilder { #[allow(missing_docs)] -pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.auth_tag = input; - self -} -#[allow(missing_docs)] -pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.auth_tag -} -#[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} + pub fn auth_tag(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_auth_tag(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.auth_tag = input; + self + } + #[allow(missing_docs)] + pub fn get_auth_tag(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.auth_tag + } + #[allow(missing_docs)] + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } /// Consumes the builder and constructs a [`AesEncryptOutput`](crate::deps::aws_cryptography_primitives::types::AesEncryptOutput). pub fn build( self, @@ -72,9 +80,11 @@ pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::types::AesEncryptOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesEncryptOutput { - auth_tag: self.auth_tag, -cipher_text: self.cipher_text, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::AesEncryptOutput { + auth_tag: self.auth_tag, + cipher_text: self.cipher_text, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_gcm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_gcm.rs index ddfbb9abe..dd29f2c02 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_gcm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_gcm.rs @@ -6,25 +6,25 @@ #[allow(missing_docs)] pub struct AesGcm { #[allow(missing_docs)] -pub iv_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub key_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub tag_length: ::std::option::Option<::std::primitive::i32>, + pub iv_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub key_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub tag_length: ::std::option::Option<::std::primitive::i32>, } impl AesGcm { #[allow(missing_docs)] -pub fn iv_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.iv_length -} -#[allow(missing_docs)] -pub fn key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.key_length -} -#[allow(missing_docs)] -pub fn tag_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.tag_length -} + pub fn iv_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.iv_length + } + #[allow(missing_docs)] + pub fn key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.key_length + } + #[allow(missing_docs)] + pub fn tag_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.tag_length + } } impl AesGcm { /// Creates a new builder-style object to manufacture [`AesGcm`](crate::deps::aws_cryptography_primitives::types::AesGcm). @@ -40,52 +40,52 @@ impl AesGcm { )] pub struct AesGcmBuilder { pub(crate) iv_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) key_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) tag_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) key_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) tag_length: ::std::option::Option<::std::primitive::i32>, } impl AesGcmBuilder { #[allow(missing_docs)] -pub fn iv_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.iv_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_iv_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.iv_length = input; - self -} -#[allow(missing_docs)] -pub fn get_iv_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.iv_length -} -#[allow(missing_docs)] -pub fn key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.key_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.key_length = input; - self -} -#[allow(missing_docs)] -pub fn get_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.key_length -} -#[allow(missing_docs)] -pub fn tag_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.tag_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_tag_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.tag_length = input; - self -} -#[allow(missing_docs)] -pub fn get_tag_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.tag_length -} + pub fn iv_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.iv_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_iv_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.iv_length = input; + self + } + #[allow(missing_docs)] + pub fn get_iv_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.iv_length + } + #[allow(missing_docs)] + pub fn key_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.key_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.key_length = input; + self + } + #[allow(missing_docs)] + pub fn get_key_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.key_length + } + #[allow(missing_docs)] + pub fn tag_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.tag_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_tag_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.tag_length = input; + self + } + #[allow(missing_docs)] + pub fn get_tag_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.tag_length + } /// Consumes the builder and constructs a [`AesGcm`](crate::deps::aws_cryptography_primitives::types::AesGcm). pub fn build( self, @@ -95,8 +95,8 @@ pub fn get_tag_length(&self) -> &::std::option::Option<::std::primitive::i32> { > { ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesGcm { iv_length: self.iv_length, -key_length: self.key_length, -tag_length: self.tag_length, + key_length: self.key_length, + tag_length: self.tag_length, }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_kdf_ctr_input.rs index 51d1d6ca8..97b1c607a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_aes_kdf_ctr_input.rs @@ -6,29 +6,30 @@ #[allow(missing_docs)] pub struct AesKdfCtrInput { #[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesKdfCtrInput { #[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } } impl AesKdfCtrInput { /// Creates a new builder-style object to manufacture [`AesKdfCtrInput`](crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::AesKdfCtrInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::AesKdfCtrInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::AesKdfCtrInputBuilder::default() } } @@ -40,52 +41,58 @@ impl AesKdfCtrInput { )] pub struct AesKdfCtrInputBuilder { pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, } impl AesKdfCtrInputBuilder { #[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.nonce = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.nonce = input; - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.nonce = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.nonce = input; + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } /// Consumes the builder and constructs a [`AesKdfCtrInput`](crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput). pub fn build( self, @@ -93,10 +100,12 @@ pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput { - expected_length: self.expected_length, -ikm: self.ikm, -nonce: self.nonce, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput { + expected_length: self.expected_length, + ikm: self.ikm, + nonce: self.nonce, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_input.rs index b8279999d..b3a0aea0e 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_input.rs @@ -6,23 +6,32 @@ #[allow(missing_docs)] pub struct CompressPublicKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl CompressPublicKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl CompressPublicKeyInput { /// Creates a new builder-style object to manufacture [`CompressPublicKeyInput`](crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyInputBuilder::default() } } @@ -33,38 +42,59 @@ impl CompressPublicKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct CompressPublicKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl CompressPublicKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`CompressPublicKeyInput`](crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput). pub fn build( self, @@ -72,9 +102,11 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput { - ecc_curve: self.ecc_curve, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput { + ecc_curve: self.ecc_curve, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_output.rs index 56300269f..314e0a19b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_compress_public_key_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct CompressPublicKeyOutput { #[allow(missing_docs)] -pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl CompressPublicKeyOutput { #[allow(missing_docs)] -pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} + pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } } impl CompressPublicKeyOutput { /// Creates a new builder-style object to manufacture [`CompressPublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::CompressPublicKeyOutputBuilder::default() } } @@ -31,19 +33,25 @@ pub struct CompressPublicKeyOutputBuilder { } impl CompressPublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn compressed_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_compressed_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} + pub fn compressed_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_compressed_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } /// Consumes the builder and constructs a [`CompressPublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_t crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput { - compressed_public_key: self.compressed_public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput { + compressed_public_key: self.compressed_public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_input.rs index f29cfd2d6..27fd9b66f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_input.rs @@ -6,23 +6,29 @@ #[allow(missing_docs)] pub struct DecompressPublicKeyInput { #[allow(missing_docs)] -pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, + pub compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub ecc_curve: + ::std::option::Option, } impl DecompressPublicKeyInput { #[allow(missing_docs)] -pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} -#[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } + #[allow(missing_docs)] + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } } impl DecompressPublicKeyInput { /// Creates a new builder-style object to manufacture [`DecompressPublicKeyInput`](crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyInputBuilder::default() } } @@ -34,37 +40,55 @@ impl DecompressPublicKeyInput { )] pub struct DecompressPublicKeyInputBuilder { pub(crate) compressed_public_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) ecc_curve: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, } impl DecompressPublicKeyInputBuilder { #[allow(missing_docs)] -pub fn compressed_public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_compressed_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.compressed_public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.compressed_public_key -} -#[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn compressed_public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_compressed_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.compressed_public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_compressed_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.compressed_public_key + } + #[allow(missing_docs)] + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } /// Consumes the builder and constructs a [`DecompressPublicKeyInput`](crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput). pub fn build( self, @@ -72,9 +96,11 @@ pub fn get_ecc_curve(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput { - compressed_public_key: self.compressed_public_key, -ecc_curve: self.ecc_curve, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput { + compressed_public_key: self.compressed_public_key, + ecc_curve: self.ecc_curve, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_output.rs index 90ae6a363..acc28d430 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_decompress_public_key_output.rs @@ -6,17 +6,22 @@ #[allow(missing_docs)] pub struct DecompressPublicKeyOutput { #[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub public_key: + ::std::option::Option, } impl DecompressPublicKeyOutput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl DecompressPublicKeyOutput { /// Creates a new builder-style object to manufacture [`DecompressPublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::DecompressPublicKeyOutputBuilder::default() } } @@ -27,23 +32,32 @@ impl DecompressPublicKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DecompressPublicKeyOutputBuilder { - pub(crate) public_key: ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl DecompressPublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`DecompressPublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput). pub fn build( self, @@ -51,8 +65,10 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput { - public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput { + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_input.rs index 6e21023f2..64230e61f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_input.rs @@ -6,29 +6,42 @@ #[allow(missing_docs)] pub struct DeriveSharedSecretInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl DeriveSharedSecretInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl DeriveSharedSecretInput { /// Creates a new builder-style object to manufacture [`DeriveSharedSecretInput`](crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretInputBuilder::default() } } @@ -39,53 +52,86 @@ impl DeriveSharedSecretInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DeriveSharedSecretInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl DeriveSharedSecretInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`DeriveSharedSecretInput`](crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput). pub fn build( self, @@ -93,10 +139,12 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput { - ecc_curve: self.ecc_curve, -private_key: self.private_key, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput { + ecc_curve: self.ecc_curve, + private_key: self.private_key, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_output.rs index c9b6af8e2..408d2fd65 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_derive_shared_secret_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct DeriveSharedSecretOutput { #[allow(missing_docs)] -pub shared_secret: ::std::option::Option<::aws_smithy_types::Blob>, + pub shared_secret: ::std::option::Option<::aws_smithy_types::Blob>, } impl DeriveSharedSecretOutput { #[allow(missing_docs)] -pub fn shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.shared_secret -} + pub fn shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.shared_secret + } } impl DeriveSharedSecretOutput { /// Creates a new builder-style object to manufacture [`DeriveSharedSecretOutput`](crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::DeriveSharedSecretOutputBuilder::default() } } @@ -31,19 +33,25 @@ pub struct DeriveSharedSecretOutputBuilder { } impl DeriveSharedSecretOutputBuilder { #[allow(missing_docs)] -pub fn shared_secret(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.shared_secret = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_shared_secret(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.shared_secret = input; - self -} -#[allow(missing_docs)] -pub fn get_shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.shared_secret -} + pub fn shared_secret( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.shared_secret = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_shared_secret( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.shared_secret = input; + self + } + #[allow(missing_docs)] + pub fn get_shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.shared_secret + } /// Consumes the builder and constructs a [`DeriveSharedSecretOutput`](crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_shared_secret(&self) -> &::std::option::Option<::aws_smithy_types::Bl crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput { - shared_secret: self.shared_secret, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput { + shared_secret: self.shared_secret, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_algorithm.rs index 1b3b425ba..1d3dbc6db 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_algorithm.rs @@ -5,16 +5,16 @@ #[allow(missing_docs)] pub enum DigestAlgorithm { Sha512, -Sha384, -Sha256, + Sha384, + Sha256, } impl ::std::fmt::Display for DigestAlgorithm { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { DigestAlgorithm::Sha512 => write!(f, "SHA_512"), -DigestAlgorithm::Sha384 => write!(f, "SHA_384"), -DigestAlgorithm::Sha256 => write!(f, "SHA_256"), + DigestAlgorithm::Sha384 => write!(f, "SHA_384"), + DigestAlgorithm::Sha256 => write!(f, "SHA_256"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_input.rs index 6da415ea4..e2c8acfab 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_digest_input.rs @@ -6,23 +6,28 @@ #[allow(missing_docs)] pub struct DigestInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub message: ::std::option::Option<::aws_smithy_types::Blob>, } impl DigestInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } } impl DigestInput { /// Creates a new builder-style object to manufacture [`DigestInput`](crate::deps::aws_cryptography_primitives::types::DigestInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DigestInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::DigestInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::DigestInputBuilder::default() } } @@ -33,38 +38,52 @@ impl DigestInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct DigestInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, } impl DigestInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } /// Consumes the builder and constructs a [`DigestInput`](crate::deps::aws_cryptography_primitives::types::DigestInput). pub fn build( self, @@ -72,9 +91,11 @@ pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::DigestInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::DigestInput { - digest_algorithm: self.digest_algorithm, -message: self.message, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::DigestInput { + digest_algorithm: self.digest_algorithm, + message: self.message, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_private_key.rs index d80cb9561..a2cdf57a1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_private_key.rs @@ -6,17 +6,18 @@ #[allow(missing_docs)] pub struct EccPrivateKey { #[allow(missing_docs)] -pub pem: ::std::option::Option<::aws_smithy_types::Blob>, + pub pem: ::std::option::Option<::aws_smithy_types::Blob>, } impl EccPrivateKey { #[allow(missing_docs)] -pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } } impl EccPrivateKey { /// Creates a new builder-style object to manufacture [`EccPrivateKey`](crate::deps::aws_cryptography_primitives::types::EccPrivateKey). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::EccPrivateKeyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::EccPrivateKeyBuilder { crate::deps::aws_cryptography_primitives::types::builders::EccPrivateKeyBuilder::default() } } @@ -31,19 +32,19 @@ pub struct EccPrivateKeyBuilder { } impl EccPrivateKeyBuilder { #[allow(missing_docs)] -pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.pem = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.pem = input; - self -} -#[allow(missing_docs)] -pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.pem = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.pem = input; + self + } + #[allow(missing_docs)] + pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } /// Consumes the builder and constructs a [`EccPrivateKey`](crate::deps::aws_cryptography_primitives::types::EccPrivateKey). pub fn build( self, @@ -51,8 +52,8 @@ pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::EccPrivateKey, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::EccPrivateKey { - pem: self.pem, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::EccPrivateKey { pem: self.pem }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_public_key.rs index 7dd639803..ee64b792d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecc_public_key.rs @@ -6,17 +6,18 @@ #[allow(missing_docs)] pub struct EccPublicKey { #[allow(missing_docs)] -pub der: ::std::option::Option<::aws_smithy_types::Blob>, + pub der: ::std::option::Option<::aws_smithy_types::Blob>, } impl EccPublicKey { #[allow(missing_docs)] -pub fn der(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.der -} + pub fn der(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.der + } } impl EccPublicKey { /// Creates a new builder-style object to manufacture [`EccPublicKey`](crate::deps::aws_cryptography_primitives::types::EccPublicKey). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::EccPublicKeyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::EccPublicKeyBuilder { crate::deps::aws_cryptography_primitives::types::builders::EccPublicKeyBuilder::default() } } @@ -31,19 +32,19 @@ pub struct EccPublicKeyBuilder { } impl EccPublicKeyBuilder { #[allow(missing_docs)] -pub fn der(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.der = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_der(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.der = input; - self -} -#[allow(missing_docs)] -pub fn get_der(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.der -} + pub fn der(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.der = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_der(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.der = input; + self + } + #[allow(missing_docs)] + pub fn get_der(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.der + } /// Consumes the builder and constructs a [`EccPublicKey`](crate::deps::aws_cryptography_primitives::types::EccPublicKey). pub fn build( self, @@ -51,8 +52,8 @@ pub fn get_der(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::EccPublicKey, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::EccPublicKey { - der: self.der, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::EccPublicKey { der: self.der }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdh_curve_spec.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdh_curve_spec.rs index c9050dcb9..86d8c60fb 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdh_curve_spec.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdh_curve_spec.rs @@ -5,18 +5,18 @@ #[allow(missing_docs)] pub enum EcdhCurveSpec { EccNistP256, -EccNistP384, -EccNistP521, -Sm2, + EccNistP384, + EccNistP521, + Sm2, } impl ::std::fmt::Display for EcdhCurveSpec { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { EcdhCurveSpec::EccNistP256 => write!(f, "ECC_NIST_P256"), -EcdhCurveSpec::EccNistP384 => write!(f, "ECC_NIST_P384"), -EcdhCurveSpec::EccNistP521 => write!(f, "ECC_NIST_P521"), -EcdhCurveSpec::Sm2 => write!(f, "SM2"), + EcdhCurveSpec::EccNistP384 => write!(f, "ECC_NIST_P384"), + EcdhCurveSpec::EccNistP521 => write!(f, "ECC_NIST_P521"), + EcdhCurveSpec::Sm2 => write!(f, "SM2"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_sign_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_sign_input.rs index 5269eb9f3..8c7dd4992 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_sign_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_sign_input.rs @@ -6,29 +6,36 @@ #[allow(missing_docs)] pub struct EcdsaSignInput { #[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub message: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaSignInput { #[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } } impl EcdsaSignInput { /// Creates a new builder-style object to manufacture [`EcdsaSignInput`](crate::deps::aws_cryptography_primitives::types::EcdsaSignInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::EcdsaSignInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::EcdsaSignInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::EcdsaSignInputBuilder::default() } } @@ -40,52 +47,74 @@ impl EcdsaSignInput { )] pub struct EcdsaSignInputBuilder { pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaSignInputBuilder { #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } /// Consumes the builder and constructs a [`EcdsaSignInput`](crate::deps::aws_cryptography_primitives::types::EcdsaSignInput). pub fn build( self, @@ -93,10 +122,12 @@ pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::types::EcdsaSignInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::EcdsaSignInput { - message: self.message, -signature_algorithm: self.signature_algorithm, -signing_key: self.signing_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::EcdsaSignInput { + message: self.message, + signature_algorithm: self.signature_algorithm, + signing_key: self.signing_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_signature_algorithm.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_signature_algorithm.rs index f67728ed4..375a3dfe7 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_signature_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_signature_algorithm.rs @@ -5,14 +5,14 @@ #[allow(missing_docs)] pub enum EcdsaSignatureAlgorithm { EcdsaP384, -EcdsaP256, + EcdsaP256, } impl ::std::fmt::Display for EcdsaSignatureAlgorithm { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { EcdsaSignatureAlgorithm::EcdsaP384 => write!(f, "ECDSA_P384"), -EcdsaSignatureAlgorithm::EcdsaP256 => write!(f, "ECDSA_P256"), + EcdsaSignatureAlgorithm::EcdsaP256 => write!(f, "ECDSA_P256"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_verify_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_verify_input.rs index c626daf55..06bb733a3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_verify_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_ecdsa_verify_input.rs @@ -6,36 +6,44 @@ #[allow(missing_docs)] pub struct EcdsaVerifyInput { #[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub message: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaVerifyInput { #[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} -#[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } + #[allow(missing_docs)] + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl EcdsaVerifyInput { /// Creates a new builder-style object to manufacture [`EcdsaVerifyInput`](crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::EcdsaVerifyInputBuilder { - crate::deps::aws_cryptography_primitives::types::builders::EcdsaVerifyInputBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::EcdsaVerifyInputBuilder { + crate::deps::aws_cryptography_primitives::types::builders::EcdsaVerifyInputBuilder::default( + ) } } @@ -46,67 +54,89 @@ impl EcdsaVerifyInput { )] pub struct EcdsaVerifyInputBuilder { pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl EcdsaVerifyInputBuilder { #[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} -#[allow(missing_docs)] -pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signature = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signature = input; - self -} -#[allow(missing_docs)] -pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signature -} -#[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } + #[allow(missing_docs)] + pub fn signature(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.signature = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.signature = input; + self + } + #[allow(missing_docs)] + pub fn get_signature(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signature + } + #[allow(missing_docs)] + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`EcdsaVerifyInput`](crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput). pub fn build( self, @@ -114,11 +144,13 @@ pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types: crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput { - message: self.message, -signature: self.signature, -signature_algorithm: self.signature_algorithm, -verification_key: self.verification_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput { + message: self.message, + signature: self.signature, + signature_algorithm: self.signature_algorithm, + verification_key: self.verification_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_input.rs index ae5fbfe1e..62e9c3a1a 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_input.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct GenerateEccKeyPairInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, } impl GenerateEccKeyPairInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } } impl GenerateEccKeyPairInput { /// Creates a new builder-style object to manufacture [`GenerateEccKeyPairInput`](crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairInputBuilder::default() } } @@ -27,23 +33,35 @@ impl GenerateEccKeyPairInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEccKeyPairInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, } impl GenerateEccKeyPairInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } /// Consumes the builder and constructs a [`GenerateEccKeyPairInput`](crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput). pub fn build( self, @@ -51,8 +69,10 @@ pub fn get_ecc_curve(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput { - ecc_curve: self.ecc_curve, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput { + ecc_curve: self.ecc_curve, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_output.rs index cda8d96cf..efb3b22c0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecc_key_pair_output.rs @@ -6,29 +6,42 @@ #[allow(missing_docs)] pub struct GenerateEccKeyPairOutput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl GenerateEccKeyPairOutput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl GenerateEccKeyPairOutput { /// Creates a new builder-style object to manufacture [`GenerateEccKeyPairOutput`](crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GenerateEccKeyPairOutputBuilder::default() } } @@ -39,53 +52,86 @@ impl GenerateEccKeyPairOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEccKeyPairOutputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl GenerateEccKeyPairOutputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`GenerateEccKeyPairOutput`](crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput). pub fn build( self, @@ -93,10 +139,12 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput { - ecc_curve: self.ecc_curve, -private_key: self.private_key, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput { + ecc_curve: self.ecc_curve, + private_key: self.private_key, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_input.rs index 6367bb28f..9a297a449 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_input.rs @@ -6,17 +6,23 @@ #[allow(missing_docs)] pub struct GenerateEcdsaSignatureKeyInput { #[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl GenerateEcdsaSignatureKeyInput { #[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } } impl GenerateEcdsaSignatureKeyInput { /// Creates a new builder-style object to manufacture [`GenerateEcdsaSignatureKeyInput`](crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyInputBuilder{ crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyInputBuilder::default() } } @@ -27,23 +33,39 @@ impl GenerateEcdsaSignatureKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEcdsaSignatureKeyInputBuilder { - pub(crate) signature_algorithm: ::std::option::Option, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, } impl GenerateEcdsaSignatureKeyInputBuilder { #[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } /// Consumes the builder and constructs a [`GenerateEcdsaSignatureKeyInput`](crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput). pub fn build( self, @@ -51,8 +73,10 @@ pub fn get_signature_algorithm(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput { - signature_algorithm: self.signature_algorithm, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput { + signature_algorithm: self.signature_algorithm, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_output.rs index 3f6bdab9a..d09d42911 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_ecdsa_signature_key_output.rs @@ -6,29 +6,35 @@ #[allow(missing_docs)] pub struct GenerateEcdsaSignatureKeyOutput { #[allow(missing_docs)] -pub signature_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + #[allow(missing_docs)] + pub signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GenerateEcdsaSignatureKeyOutput { #[allow(missing_docs)] -pub fn signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } } impl GenerateEcdsaSignatureKeyOutput { /// Creates a new builder-style object to manufacture [`GenerateEcdsaSignatureKeyOutput`](crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::types::builders::GenerateEcdsaSignatureKeyOutputBuilder::default() } } @@ -39,53 +45,81 @@ impl GenerateEcdsaSignatureKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateEcdsaSignatureKeyOutputBuilder { - pub(crate) signature_algorithm: ::std::option::Option, -pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) signature_algorithm: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + pub(crate) signing_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) verification_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GenerateEcdsaSignatureKeyOutputBuilder { #[allow(missing_docs)] -pub fn signature_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.signature_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signature_algorithm(mut self, input: ::std::option::Option) -> Self { - self.signature_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_signature_algorithm(&self) -> &::std::option::Option { - &self.signature_algorithm -} -#[allow(missing_docs)] -pub fn signing_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.signing_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_signing_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.signing_key = input; - self -} -#[allow(missing_docs)] -pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.signing_key -} -#[allow(missing_docs)] -pub fn verification_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.verification_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_verification_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.verification_key = input; - self -} -#[allow(missing_docs)] -pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.verification_key -} + pub fn signature_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signature_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, + ) -> Self { + self.signature_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_signature_algorithm( + &self, + ) -> &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + > { + &self.signature_algorithm + } + #[allow(missing_docs)] + pub fn signing_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_signing_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.signing_key = input; + self + } + #[allow(missing_docs)] + pub fn get_signing_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.signing_key + } + #[allow(missing_docs)] + pub fn verification_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_verification_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.verification_key = input; + self + } + #[allow(missing_docs)] + pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.verification_key + } /// Consumes the builder and constructs a [`GenerateEcdsaSignatureKeyOutput`](crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput). pub fn build( self, @@ -93,10 +127,12 @@ pub fn get_verification_key(&self) -> &::std::option::Option<::aws_smithy_types: crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput { - signature_algorithm: self.signature_algorithm, -signing_key: self.signing_key, -verification_key: self.verification_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput { + signature_algorithm: self.signature_algorithm, + signing_key: self.signing_key, + verification_key: self.verification_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_random_bytes_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_random_bytes_input.rs index 39c733162..b96f2569c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_random_bytes_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_random_bytes_input.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct GenerateRandomBytesInput { #[allow(missing_docs)] -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GenerateRandomBytesInput { #[allow(missing_docs)] -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GenerateRandomBytesInput { /// Creates a new builder-style object to manufacture [`GenerateRandomBytesInput`](crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRandomBytesInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRandomBytesInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GenerateRandomBytesInputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct GenerateRandomBytesInputBuilder { } impl GenerateRandomBytesInputBuilder { #[allow(missing_docs)] -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -#[allow(missing_docs)] -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + #[allow(missing_docs)] + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GenerateRandomBytesInput`](crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput { - length: self.length, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput { + length: self.length, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_input.rs index 15601eda0..e31df0243 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_input.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct GenerateRsaKeyPairInput { #[allow(missing_docs)] -pub length_bits: ::std::option::Option<::std::primitive::i32>, + pub length_bits: ::std::option::Option<::std::primitive::i32>, } impl GenerateRsaKeyPairInput { #[allow(missing_docs)] -pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} + pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } } impl GenerateRsaKeyPairInput { /// Creates a new builder-style object to manufacture [`GenerateRsaKeyPairInput`](crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairInputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct GenerateRsaKeyPairInputBuilder { } impl GenerateRsaKeyPairInputBuilder { #[allow(missing_docs)] -pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length_bits = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length_bits = input; - self -} -#[allow(missing_docs)] -pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} + pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length_bits = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length_bits = input; + self + } + #[allow(missing_docs)] + pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } /// Consumes the builder and constructs a [`GenerateRsaKeyPairInput`](crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput { - length_bits: self.length_bits, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput { + length_bits: self.length_bits, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_output.rs index bdbe08ea3..7786ceb1b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_generate_rsa_key_pair_output.rs @@ -6,23 +6,32 @@ #[allow(missing_docs)] pub struct GenerateRsaKeyPairOutput { #[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: + ::std::option::Option, } impl GenerateRsaKeyPairOutput { #[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl GenerateRsaKeyPairOutput { /// Creates a new builder-style object to manufacture [`GenerateRsaKeyPairOutput`](crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GenerateRsaKeyPairOutputBuilder::default() } } @@ -33,38 +42,59 @@ impl GenerateRsaKeyPairOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GenerateRsaKeyPairOutputBuilder { - pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl GenerateRsaKeyPairOutputBuilder { #[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`GenerateRsaKeyPairOutput`](crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput). pub fn build( self, @@ -72,9 +102,11 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput { - private_key: self.private_key, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput { + private_key: self.private_key, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_input.rs index 1d2d6fccf..f6c6705ac 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_input.rs @@ -6,23 +6,31 @@ #[allow(missing_docs)] pub struct GetPublicKeyFromPrivateKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, } impl GetPublicKeyFromPrivateKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } } impl GetPublicKeyFromPrivateKeyInput { /// Creates a new builder-style object to manufacture [`GetPublicKeyFromPrivateKeyInput`](crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyInputBuilder{ crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyInputBuilder::default() } } @@ -33,38 +41,62 @@ impl GetPublicKeyFromPrivateKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetPublicKeyFromPrivateKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, } impl GetPublicKeyFromPrivateKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } /// Consumes the builder and constructs a [`GetPublicKeyFromPrivateKeyInput`](crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput). pub fn build( self, @@ -72,9 +104,11 @@ pub fn get_private_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput { - ecc_curve: self.ecc_curve, -private_key: self.private_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput { + ecc_curve: self.ecc_curve, + private_key: self.private_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_output.rs index 850286683..3d6e4b3a6 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_public_key_from_private_key_output.rs @@ -6,29 +6,37 @@ #[allow(missing_docs)] pub struct GetPublicKeyFromPrivateKeyOutput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetPublicKeyFromPrivateKeyOutput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl GetPublicKeyFromPrivateKeyOutput { /// Creates a new builder-style object to manufacture [`GetPublicKeyFromPrivateKeyOutput`](crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyOutputBuilder{ crate::deps::aws_cryptography_primitives::types::builders::GetPublicKeyFromPrivateKeyOutputBuilder::default() } } @@ -39,53 +47,83 @@ impl GetPublicKeyFromPrivateKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct GetPublicKeyFromPrivateKeyOutputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) private_key: ::std::option::Option, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) private_key: + ::std::option::Option, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetPublicKeyFromPrivateKeyOutputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option { - &self.private_key -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EccPrivateKey, + >, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key( + &self, + ) -> &::std::option::Option + { + &self.private_key + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`GetPublicKeyFromPrivateKeyOutput`](crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput). pub fn build( self, @@ -93,10 +131,12 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput { - ecc_curve: self.ecc_curve, -private_key: self.private_key, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput { + ecc_curve: self.ecc_curve, + private_key: self.private_key, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_input.rs index c8b67acc4..ca5447ff1 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_input.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct GetRsaKeyModulusLengthInput { #[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl GetRsaKeyModulusLengthInput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl GetRsaKeyModulusLengthInput { /// Creates a new builder-style object to manufacture [`GetRsaKeyModulusLengthInput`](crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthInputBuilder::default() } } @@ -31,19 +33,25 @@ pub struct GetRsaKeyModulusLengthInputBuilder { } impl GetRsaKeyModulusLengthInputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`GetRsaKeyModulusLengthInput`](crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput). pub fn build( self, @@ -51,8 +59,10 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput { - public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput { + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_output.rs index 0169ede02..6f4be094f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_get_rsa_key_modulus_length_output.rs @@ -6,17 +6,17 @@ #[allow(missing_docs)] pub struct GetRsaKeyModulusLengthOutput { #[allow(missing_docs)] -pub length: ::std::option::Option<::std::primitive::i32>, + pub length: ::std::option::Option<::std::primitive::i32>, } impl GetRsaKeyModulusLengthOutput { #[allow(missing_docs)] -pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } } impl GetRsaKeyModulusLengthOutput { /// Creates a new builder-style object to manufacture [`GetRsaKeyModulusLengthOutput`](crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthOutputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthOutputBuilder{ crate::deps::aws_cryptography_primitives::types::builders::GetRsaKeyModulusLengthOutputBuilder::default() } } @@ -31,19 +31,19 @@ pub struct GetRsaKeyModulusLengthOutputBuilder { } impl GetRsaKeyModulusLengthOutputBuilder { #[allow(missing_docs)] -pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length = input; - self -} -#[allow(missing_docs)] -pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length -} + pub fn length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length = input; + self + } + #[allow(missing_docs)] + pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length + } /// Consumes the builder and constructs a [`GetRsaKeyModulusLengthOutput`](crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput). pub fn build( self, @@ -51,8 +51,10 @@ pub fn get_length(&self) -> &::std::option::Option<::std::primitive::i32> { crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput { - length: self.length, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput { + length: self.length, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_h_mac_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_h_mac_input.rs index 68f03faf7..f93f162ff 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_h_mac_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_h_mac_input.rs @@ -6,29 +6,34 @@ #[allow(missing_docs)] pub struct HMacInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub key: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub message: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub key: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub message: ::std::option::Option<::aws_smithy_types::Blob>, } impl HMacInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } } impl HMacInput { /// Creates a new builder-style object to manufacture [`HMacInput`](crate::deps::aws_cryptography_primitives::types::HMacInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HMacInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HMacInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::HMacInputBuilder::default() } } @@ -39,53 +44,67 @@ impl HMacInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HMacInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) message: ::std::option::Option<::aws_smithy_types::Blob>, } impl HMacInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.key = input; - self -} -#[allow(missing_docs)] -pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.key -} -#[allow(missing_docs)] -pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.message = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.message = input; - self -} -#[allow(missing_docs)] -pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.message -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.key = input; + self + } + #[allow(missing_docs)] + pub fn get_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.key + } + #[allow(missing_docs)] + pub fn message(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.message = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_message(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.message = input; + self + } + #[allow(missing_docs)] + pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.message + } /// Consumes the builder and constructs a [`HMacInput`](crate::deps::aws_cryptography_primitives::types::HMacInput). pub fn build( self, @@ -95,8 +114,8 @@ pub fn get_message(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { > { ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::HMacInput { digest_algorithm: self.digest_algorithm, -key: self.key, -message: self.message, + key: self.key, + message: self.message, }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_expand_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_expand_input.rs index 2a3ecde57..21254e69c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_expand_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_expand_input.rs @@ -6,35 +6,40 @@ #[allow(missing_docs)] pub struct HkdfExpandInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub info: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub prk: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub info: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub prk: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExpandInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } } impl HkdfExpandInput { /// Creates a new builder-style object to manufacture [`HkdfExpandInput`](crate::deps::aws_cryptography_primitives::types::HkdfExpandInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HkdfExpandInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::HkdfExpandInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::HkdfExpandInputBuilder::default() } } @@ -45,68 +50,88 @@ impl HkdfExpandInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfExpandInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) prk: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) prk: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExpandInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.info = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.info = input; - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.prk = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.prk = input; - self -} -#[allow(missing_docs)] -pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.prk -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.info = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.info = input; + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn prk(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.prk = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_prk(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.prk = input; + self + } + #[allow(missing_docs)] + pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.prk + } /// Consumes the builder and constructs a [`HkdfExpandInput`](crate::deps::aws_cryptography_primitives::types::HkdfExpandInput). pub fn build( self, @@ -114,11 +139,13 @@ pub fn get_prk(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::HkdfExpandInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::HkdfExpandInput { - digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -info: self.info, -prk: self.prk, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::HkdfExpandInput { + digest_algorithm: self.digest_algorithm, + expected_length: self.expected_length, + info: self.info, + prk: self.prk, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_extract_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_extract_input.rs index 39dcf2c65..ecb1c527c 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_extract_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_extract_input.rs @@ -6,30 +6,36 @@ #[allow(missing_docs)] pub struct HkdfExtractInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExtractInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } } impl HkdfExtractInput { /// Creates a new builder-style object to manufacture [`HkdfExtractInput`](crate::deps::aws_cryptography_primitives::types::HkdfExtractInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HkdfExtractInputBuilder { - crate::deps::aws_cryptography_primitives::types::builders::HkdfExtractInputBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::HkdfExtractInputBuilder { + crate::deps::aws_cryptography_primitives::types::builders::HkdfExtractInputBuilder::default( + ) } } @@ -39,53 +45,67 @@ impl HkdfExtractInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfExtractInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfExtractInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.salt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.salt = input; - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.salt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.salt = input; + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } /// Consumes the builder and constructs a [`HkdfExtractInput`](crate::deps::aws_cryptography_primitives::types::HkdfExtractInput). pub fn build( self, @@ -93,10 +113,12 @@ pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::HkdfExtractInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::HkdfExtractInput { - digest_algorithm: self.digest_algorithm, -ikm: self.ikm, -salt: self.salt, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::HkdfExtractInput { + digest_algorithm: self.digest_algorithm, + ikm: self.ikm, + salt: self.salt, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_input.rs index 22995437a..7ad0c17a2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_hkdf_input.rs @@ -6,41 +6,46 @@ #[allow(missing_docs)] pub struct HkdfInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub info: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub info: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } } impl HkdfInput { /// Creates a new builder-style object to manufacture [`HkdfInput`](crate::deps::aws_cryptography_primitives::types::HkdfInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HkdfInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::HkdfInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::HkdfInputBuilder::default() } } @@ -51,83 +56,103 @@ impl HkdfInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct HkdfInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) info: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) salt: ::std::option::Option<::aws_smithy_types::Blob>, } impl HkdfInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.info = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.info = input; - self -} -#[allow(missing_docs)] -pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.info -} -#[allow(missing_docs)] -pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.salt = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.salt = input; - self -} -#[allow(missing_docs)] -pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.salt -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn info(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.info = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_info(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.info = input; + self + } + #[allow(missing_docs)] + pub fn get_info(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.info + } + #[allow(missing_docs)] + pub fn salt(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.salt = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_salt(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.salt = input; + self + } + #[allow(missing_docs)] + pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.salt + } /// Consumes the builder and constructs a [`HkdfInput`](crate::deps::aws_cryptography_primitives::types::HkdfInput). pub fn build( self, @@ -137,10 +162,10 @@ pub fn get_salt(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { > { ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::HkdfInput { digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -ikm: self.ikm, -info: self.info, -salt: self.salt, + expected_length: self.expected_length, + ikm: self.ikm, + info: self.info, + salt: self.salt, }) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_kdf_ctr_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_kdf_ctr_input.rs index 02ab761cb..83ccb31b4 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_kdf_ctr_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_kdf_ctr_input.rs @@ -6,41 +6,46 @@ #[allow(missing_docs)] pub struct KdfCtrInput { #[allow(missing_docs)] -pub digest_algorithm: ::std::option::Option, -#[allow(missing_docs)] -pub expected_length: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub purpose: ::std::option::Option<::aws_smithy_types::Blob>, + pub digest_algorithm: + ::std::option::Option, + #[allow(missing_docs)] + pub expected_length: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub ikm: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub nonce: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub purpose: ::std::option::Option<::aws_smithy_types::Blob>, } impl KdfCtrInput { #[allow(missing_docs)] -pub fn digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} -#[allow(missing_docs)] -pub fn purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.purpose -} + pub fn digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } + #[allow(missing_docs)] + pub fn purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.purpose + } } impl KdfCtrInput { /// Creates a new builder-style object to manufacture [`KdfCtrInput`](crate::deps::aws_cryptography_primitives::types::KdfCtrInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::KdfCtrInputBuilder { + pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::KdfCtrInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::KdfCtrInputBuilder::default() } } @@ -51,83 +56,103 @@ impl KdfCtrInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct KdfCtrInputBuilder { - pub(crate) digest_algorithm: ::std::option::Option, -pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, -pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) purpose: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) digest_algorithm: + ::std::option::Option, + pub(crate) expected_length: ::std::option::Option<::std::primitive::i32>, + pub(crate) ikm: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) nonce: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) purpose: ::std::option::Option<::aws_smithy_types::Blob>, } impl KdfCtrInputBuilder { #[allow(missing_docs)] -pub fn digest_algorithm(mut self, input: impl ::std::convert::Into) -> Self { - self.digest_algorithm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_digest_algorithm(mut self, input: ::std::option::Option) -> Self { - self.digest_algorithm = input; - self -} -#[allow(missing_docs)] -pub fn get_digest_algorithm(&self) -> &::std::option::Option { - &self.digest_algorithm -} -#[allow(missing_docs)] -pub fn expected_length(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.expected_length = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_expected_length(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.expected_length = input; - self -} -#[allow(missing_docs)] -pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.expected_length -} -#[allow(missing_docs)] -pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.ikm = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.ikm = input; - self -} -#[allow(missing_docs)] -pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.ikm -} -#[allow(missing_docs)] -pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.nonce = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.nonce = input; - self -} -#[allow(missing_docs)] -pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.nonce -} -#[allow(missing_docs)] -pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.purpose = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.purpose = input; - self -} -#[allow(missing_docs)] -pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.purpose -} + pub fn digest_algorithm( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_digest_algorithm( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::DigestAlgorithm, + >, + ) -> Self { + self.digest_algorithm = input; + self + } + #[allow(missing_docs)] + pub fn get_digest_algorithm( + &self, + ) -> &::std::option::Option + { + &self.digest_algorithm + } + #[allow(missing_docs)] + pub fn expected_length( + mut self, + input: impl ::std::convert::Into<::std::primitive::i32>, + ) -> Self { + self.expected_length = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_expected_length( + mut self, + input: ::std::option::Option<::std::primitive::i32>, + ) -> Self { + self.expected_length = input; + self + } + #[allow(missing_docs)] + pub fn get_expected_length(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.expected_length + } + #[allow(missing_docs)] + pub fn ikm(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.ikm = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ikm(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.ikm = input; + self + } + #[allow(missing_docs)] + pub fn get_ikm(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.ikm + } + #[allow(missing_docs)] + pub fn nonce(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.nonce = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_nonce(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.nonce = input; + self + } + #[allow(missing_docs)] + pub fn get_nonce(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.nonce + } + #[allow(missing_docs)] + pub fn purpose(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.purpose = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_purpose(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.purpose = input; + self + } + #[allow(missing_docs)] + pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.purpose + } /// Consumes the builder and constructs a [`KdfCtrInput`](crate::deps::aws_cryptography_primitives::types::KdfCtrInput). pub fn build( self, @@ -135,12 +160,14 @@ pub fn get_purpose(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::KdfCtrInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::KdfCtrInput { - digest_algorithm: self.digest_algorithm, -expected_length: self.expected_length, -ikm: self.ikm, -nonce: self.nonce, -purpose: self.purpose, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::KdfCtrInput { + digest_algorithm: self.digest_algorithm, + expected_length: self.expected_length, + ikm: self.ikm, + nonce: self.nonce, + purpose: self.purpose, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_input.rs index ffb3e261e..87835b370 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_input.rs @@ -6,17 +6,18 @@ #[allow(missing_docs)] pub struct ParsePublicKeyInput { #[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ParsePublicKeyInput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl ParsePublicKeyInput { /// Creates a new builder-style object to manufacture [`ParsePublicKeyInput`](crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyInputBuilder::default() } } @@ -31,19 +32,25 @@ pub struct ParsePublicKeyInputBuilder { } impl ParsePublicKeyInputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`ParsePublicKeyInput`](crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput). pub fn build( self, @@ -51,8 +58,10 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput { - public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput { + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_output.rs index 671dfd760..7411e1841 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_parse_public_key_output.rs @@ -6,17 +6,22 @@ #[allow(missing_docs)] pub struct ParsePublicKeyOutput { #[allow(missing_docs)] -pub public_key: ::std::option::Option, + pub public_key: + ::std::option::Option, } impl ParsePublicKeyOutput { #[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } } impl ParsePublicKeyOutput { /// Creates a new builder-style object to manufacture [`ParsePublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::ParsePublicKeyOutputBuilder::default() } } @@ -27,23 +32,32 @@ impl ParsePublicKeyOutput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ParsePublicKeyOutputBuilder { - pub(crate) public_key: ::std::option::Option, + pub(crate) public_key: + ::std::option::Option, } impl ParsePublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option { - &self.public_key -} + pub fn public_key( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key( + &self, + ) -> &::std::option::Option { + &self.public_key + } /// Consumes the builder and constructs a [`ParsePublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput). pub fn build( self, @@ -51,8 +65,10 @@ pub fn get_public_key(&self) -> &::std::option::Option { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput { - public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput { + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_decrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_decrypt_input.rs index bf7e33f54..1ca8d88e2 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_decrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_decrypt_input.rs @@ -6,29 +6,34 @@ #[allow(missing_docs)] pub struct RsaDecryptInput { #[allow(missing_docs)] -pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub padding: ::std::option::Option, -#[allow(missing_docs)] -pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub padding: + ::std::option::Option, + #[allow(missing_docs)] + pub private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaDecryptInput { #[allow(missing_docs)] -pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} -#[allow(missing_docs)] -pub fn padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} + pub fn cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } + #[allow(missing_docs)] + pub fn padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } } impl RsaDecryptInput { /// Creates a new builder-style object to manufacture [`RsaDecryptInput`](crate::deps::aws_cryptography_primitives::types::RsaDecryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::RsaDecryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::RsaDecryptInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::RsaDecryptInputBuilder::default() } } @@ -40,52 +45,78 @@ impl RsaDecryptInput { )] pub struct RsaDecryptInputBuilder { pub(crate) cipher_text: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) padding: ::std::option::Option, -pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) padding: + ::std::option::Option, + pub(crate) private_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaDecryptInputBuilder { #[allow(missing_docs)] -pub fn cipher_text(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_cipher_text(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.cipher_text = input; - self -} -#[allow(missing_docs)] -pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.cipher_text -} -#[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.padding = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.padding = input; - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn private_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.private_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_private_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.private_key = input; - self -} -#[allow(missing_docs)] -pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.private_key -} + pub fn cipher_text( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_cipher_text( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.cipher_text = input; + self + } + #[allow(missing_docs)] + pub fn get_cipher_text(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.cipher_text + } + #[allow(missing_docs)] + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = input; + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn private_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_private_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.private_key = input; + self + } + #[allow(missing_docs)] + pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.private_key + } /// Consumes the builder and constructs a [`RsaDecryptInput`](crate::deps::aws_cryptography_primitives::types::RsaDecryptInput). pub fn build( self, @@ -93,10 +124,12 @@ pub fn get_private_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob crate::deps::aws_cryptography_primitives::types::RsaDecryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::RsaDecryptInput { - cipher_text: self.cipher_text, -padding: self.padding, -private_key: self.private_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::RsaDecryptInput { + cipher_text: self.cipher_text, + padding: self.padding, + private_key: self.private_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_encrypt_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_encrypt_input.rs index 846979f82..f643d92a0 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_encrypt_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_encrypt_input.rs @@ -6,29 +6,34 @@ #[allow(missing_docs)] pub struct RsaEncryptInput { #[allow(missing_docs)] -pub padding: ::std::option::Option, -#[allow(missing_docs)] -pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub padding: + ::std::option::Option, + #[allow(missing_docs)] + pub plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaEncryptInput { #[allow(missing_docs)] -pub fn padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl RsaEncryptInput { /// Creates a new builder-style object to manufacture [`RsaEncryptInput`](crate::deps::aws_cryptography_primitives::types::RsaEncryptInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::RsaEncryptInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::RsaEncryptInputBuilder { crate::deps::aws_cryptography_primitives::types::builders::RsaEncryptInputBuilder::default() } } @@ -39,53 +44,73 @@ impl RsaEncryptInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct RsaEncryptInputBuilder { - pub(crate) padding: ::std::option::Option, -pub(crate) plaintext: ::std::option::Option<::aws_smithy_types::Blob>, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) padding: + ::std::option::Option, + pub(crate) plaintext: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaEncryptInputBuilder { #[allow(missing_docs)] -pub fn padding(mut self, input: impl ::std::convert::Into) -> Self { - self.padding = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_padding(mut self, input: ::std::option::Option) -> Self { - self.padding = input; - self -} -#[allow(missing_docs)] -pub fn get_padding(&self) -> &::std::option::Option { - &self.padding -} -#[allow(missing_docs)] -pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.plaintext = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.plaintext = input; - self -} -#[allow(missing_docs)] -pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.plaintext -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn padding( + mut self, + input: impl ::std::convert::Into< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_padding( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::RsaPaddingMode, + >, + ) -> Self { + self.padding = input; + self + } + #[allow(missing_docs)] + pub fn get_padding( + &self, + ) -> &::std::option::Option + { + &self.padding + } + #[allow(missing_docs)] + pub fn plaintext(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.plaintext = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_plaintext(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.plaintext = input; + self + } + #[allow(missing_docs)] + pub fn get_plaintext(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.plaintext + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`RsaEncryptInput`](crate::deps::aws_cryptography_primitives::types::RsaEncryptInput). pub fn build( self, @@ -93,10 +118,12 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::types::RsaEncryptInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::RsaEncryptInput { - padding: self.padding, -plaintext: self.plaintext, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::RsaEncryptInput { + padding: self.padding, + plaintext: self.plaintext, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_padding_mode.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_padding_mode.rs index 3d6ad312b..e5c062c0f 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_padding_mode.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_padding_mode.rs @@ -5,20 +5,20 @@ #[allow(missing_docs)] pub enum RsaPaddingMode { Pkcs1, -OaepSha1, -OaepSha256, -OaepSha384, -OaepSha512, + OaepSha1, + OaepSha256, + OaepSha384, + OaepSha512, } impl ::std::fmt::Display for RsaPaddingMode { fn fmt(&self, f: &mut ::std::fmt::Formatter) -> ::std::fmt::Result { match self { RsaPaddingMode::Pkcs1 => write!(f, "PKCS1"), -RsaPaddingMode::OaepSha1 => write!(f, "OAEP_SHA1"), -RsaPaddingMode::OaepSha256 => write!(f, "OAEP_SHA256"), -RsaPaddingMode::OaepSha384 => write!(f, "OAEP_SHA384"), -RsaPaddingMode::OaepSha512 => write!(f, "OAEP_SHA512"), + RsaPaddingMode::OaepSha1 => write!(f, "OAEP_SHA1"), + RsaPaddingMode::OaepSha256 => write!(f, "OAEP_SHA256"), + RsaPaddingMode::OaepSha384 => write!(f, "OAEP_SHA384"), + RsaPaddingMode::OaepSha512 => write!(f, "OAEP_SHA512"), } } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_private_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_private_key.rs index 1ca854cd0..47c18304d 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_private_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_private_key.rs @@ -6,23 +6,24 @@ #[allow(missing_docs)] pub struct RsaPrivateKey { #[allow(missing_docs)] -pub length_bits: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub pem: ::std::option::Option<::aws_smithy_types::Blob>, + pub length_bits: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub pem: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaPrivateKey { #[allow(missing_docs)] -pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} -#[allow(missing_docs)] -pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } + #[allow(missing_docs)] + pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } } impl RsaPrivateKey { /// Creates a new builder-style object to manufacture [`RsaPrivateKey`](crate::deps::aws_cryptography_primitives::types::RsaPrivateKey). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::RsaPrivateKeyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::RsaPrivateKeyBuilder { crate::deps::aws_cryptography_primitives::types::builders::RsaPrivateKeyBuilder::default() } } @@ -34,37 +35,37 @@ impl RsaPrivateKey { )] pub struct RsaPrivateKeyBuilder { pub(crate) length_bits: ::std::option::Option<::std::primitive::i32>, -pub(crate) pem: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) pem: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaPrivateKeyBuilder { #[allow(missing_docs)] -pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length_bits = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length_bits = input; - self -} -#[allow(missing_docs)] -pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} -#[allow(missing_docs)] -pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.pem = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.pem = input; - self -} -#[allow(missing_docs)] -pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length_bits = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length_bits = input; + self + } + #[allow(missing_docs)] + pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } + #[allow(missing_docs)] + pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.pem = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.pem = input; + self + } + #[allow(missing_docs)] + pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } /// Consumes the builder and constructs a [`RsaPrivateKey`](crate::deps::aws_cryptography_primitives::types::RsaPrivateKey). pub fn build( self, @@ -72,9 +73,11 @@ pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::RsaPrivateKey, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::RsaPrivateKey { - length_bits: self.length_bits, -pem: self.pem, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::RsaPrivateKey { + length_bits: self.length_bits, + pem: self.pem, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_public_key.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_public_key.rs index 13d0a048d..8953bfce3 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_public_key.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_rsa_public_key.rs @@ -6,23 +6,24 @@ #[allow(missing_docs)] pub struct RsaPublicKey { #[allow(missing_docs)] -pub length_bits: ::std::option::Option<::std::primitive::i32>, -#[allow(missing_docs)] -pub pem: ::std::option::Option<::aws_smithy_types::Blob>, + pub length_bits: ::std::option::Option<::std::primitive::i32>, + #[allow(missing_docs)] + pub pem: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaPublicKey { #[allow(missing_docs)] -pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} -#[allow(missing_docs)] -pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } + #[allow(missing_docs)] + pub fn pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } } impl RsaPublicKey { /// Creates a new builder-style object to manufacture [`RsaPublicKey`](crate::deps::aws_cryptography_primitives::types::RsaPublicKey). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::RsaPublicKeyBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::RsaPublicKeyBuilder { crate::deps::aws_cryptography_primitives::types::builders::RsaPublicKeyBuilder::default() } } @@ -34,37 +35,37 @@ impl RsaPublicKey { )] pub struct RsaPublicKeyBuilder { pub(crate) length_bits: ::std::option::Option<::std::primitive::i32>, -pub(crate) pem: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) pem: ::std::option::Option<::aws_smithy_types::Blob>, } impl RsaPublicKeyBuilder { #[allow(missing_docs)] -pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { - self.length_bits = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { - self.length_bits = input; - self -} -#[allow(missing_docs)] -pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { - &self.length_bits -} -#[allow(missing_docs)] -pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.pem = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.pem = input; - self -} -#[allow(missing_docs)] -pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.pem -} + pub fn length_bits(mut self, input: impl ::std::convert::Into<::std::primitive::i32>) -> Self { + self.length_bits = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_length_bits(mut self, input: ::std::option::Option<::std::primitive::i32>) -> Self { + self.length_bits = input; + self + } + #[allow(missing_docs)] + pub fn get_length_bits(&self) -> &::std::option::Option<::std::primitive::i32> { + &self.length_bits + } + #[allow(missing_docs)] + pub fn pem(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { + self.pem = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_pem(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { + self.pem = input; + self + } + #[allow(missing_docs)] + pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.pem + } /// Consumes the builder and constructs a [`RsaPublicKey`](crate::deps::aws_cryptography_primitives::types::RsaPublicKey). pub fn build( self, @@ -72,9 +73,11 @@ pub fn get_pem(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { crate::deps::aws_cryptography_primitives::types::RsaPublicKey, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::RsaPublicKey { - length_bits: self.length_bits, -pem: self.pem, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::RsaPublicKey { + length_bits: self.length_bits, + pem: self.pem, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_input.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_input.rs index cb29fe90c..f5a6ada60 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_input.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_input.rs @@ -6,23 +6,29 @@ #[allow(missing_docs)] pub struct ValidatePublicKeyInput { #[allow(missing_docs)] -pub ecc_curve: ::std::option::Option, -#[allow(missing_docs)] -pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub ecc_curve: + ::std::option::Option, + #[allow(missing_docs)] + pub public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ValidatePublicKeyInput { #[allow(missing_docs)] -pub fn ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } } impl ValidatePublicKeyInput { /// Creates a new builder-style object to manufacture [`ValidatePublicKeyInput`](crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyInputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyInputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyInputBuilder::default() } } @@ -33,38 +39,56 @@ impl ValidatePublicKeyInput { ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] pub struct ValidatePublicKeyInputBuilder { - pub(crate) ecc_curve: ::std::option::Option, -pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, + pub(crate) ecc_curve: + ::std::option::Option, + pub(crate) public_key: ::std::option::Option<::aws_smithy_types::Blob>, } impl ValidatePublicKeyInputBuilder { #[allow(missing_docs)] -pub fn ecc_curve(mut self, input: impl ::std::convert::Into) -> Self { - self.ecc_curve = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_ecc_curve(mut self, input: ::std::option::Option) -> Self { - self.ecc_curve = input; - self -} -#[allow(missing_docs)] -pub fn get_ecc_curve(&self) -> &::std::option::Option { - &self.ecc_curve -} -#[allow(missing_docs)] -pub fn public_key(mut self, input: impl ::std::convert::Into<::aws_smithy_types::Blob>) -> Self { - self.public_key = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_public_key(mut self, input: ::std::option::Option<::aws_smithy_types::Blob>) -> Self { - self.public_key = input; - self -} -#[allow(missing_docs)] -pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { - &self.public_key -} + pub fn ecc_curve( + mut self, + input: impl ::std::convert::Into, + ) -> Self { + self.ecc_curve = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_ecc_curve( + mut self, + input: ::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdhCurveSpec, + >, + ) -> Self { + self.ecc_curve = input; + self + } + #[allow(missing_docs)] + pub fn get_ecc_curve( + &self, + ) -> &::std::option::Option + { + &self.ecc_curve + } + #[allow(missing_docs)] + pub fn public_key( + mut self, + input: impl ::std::convert::Into<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_public_key( + mut self, + input: ::std::option::Option<::aws_smithy_types::Blob>, + ) -> Self { + self.public_key = input; + self + } + #[allow(missing_docs)] + pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> { + &self.public_key + } /// Consumes the builder and constructs a [`ValidatePublicKeyInput`](crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput). pub fn build( self, @@ -72,9 +96,11 @@ pub fn get_public_key(&self) -> &::std::option::Option<::aws_smithy_types::Blob> crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput { - ecc_curve: self.ecc_curve, -public_key: self.public_key, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput { + ecc_curve: self.ecc_curve, + public_key: self.public_key, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_output.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_output.rs index 70a0aa1d4..eb7c2f164 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_output.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/_validate_public_key_output.rs @@ -6,17 +6,19 @@ #[allow(missing_docs)] pub struct ValidatePublicKeyOutput { #[allow(missing_docs)] -pub success: ::std::option::Option<::std::primitive::bool>, + pub success: ::std::option::Option<::std::primitive::bool>, } impl ValidatePublicKeyOutput { #[allow(missing_docs)] -pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } } impl ValidatePublicKeyOutput { /// Creates a new builder-style object to manufacture [`ValidatePublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyOutputBuilder { + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyOutputBuilder + { crate::deps::aws_cryptography_primitives::types::builders::ValidatePublicKeyOutputBuilder::default() } } @@ -31,19 +33,19 @@ pub struct ValidatePublicKeyOutputBuilder { } impl ValidatePublicKeyOutputBuilder { #[allow(missing_docs)] -pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { - self.success = ::std::option::Option::Some(input.into()); - self -} -#[allow(missing_docs)] -pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { - self.success = input; - self -} -#[allow(missing_docs)] -pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { - &self.success -} + pub fn success(mut self, input: impl ::std::convert::Into<::std::primitive::bool>) -> Self { + self.success = ::std::option::Option::Some(input.into()); + self + } + #[allow(missing_docs)] + pub fn set_success(mut self, input: ::std::option::Option<::std::primitive::bool>) -> Self { + self.success = input; + self + } + #[allow(missing_docs)] + pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { + &self.success + } /// Consumes the builder and constructs a [`ValidatePublicKeyOutput`](crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput). pub fn build( self, @@ -51,8 +53,10 @@ pub fn get_success(&self) -> &::std::option::Option<::std::primitive::bool> { crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput { - success: self.success, - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput { + success: self.success, + }, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/crypto_config.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/crypto_config.rs index fada02067..047674b7b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/crypto_config.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/crypto_config.rs @@ -4,16 +4,14 @@ #[non_exhaustive] #[derive(::std::clone::Clone, ::std::cmp::PartialEq, ::std::fmt::Debug)] #[allow(missing_docs)] -pub struct CryptoConfig { - -} -impl CryptoConfig { - -} +pub struct CryptoConfig {} +impl CryptoConfig {} impl CryptoConfig { /// Creates a new builder-style object to manufacture [`CryptoConfig`](crate::deps::aws_cryptography_primitives::types::CryptoConfig). - pub fn builder() -> crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfigBuilder { - crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfigBuilder::default() + pub fn builder( + ) -> crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfigBuilder { + crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfigBuilder::default( + ) } } @@ -22,11 +20,8 @@ impl CryptoConfig { #[derive( ::std::clone::Clone, ::std::cmp::PartialEq, ::std::default::Default, ::std::fmt::Debug, )] -pub struct CryptoConfigBuilder { - -} +pub struct CryptoConfigBuilder {} impl CryptoConfigBuilder { - /// Consumes the builder and constructs a [`CryptoConfig`](crate::deps::aws_cryptography_primitives::types::CryptoConfig). pub fn build( self, @@ -34,8 +29,8 @@ impl CryptoConfigBuilder { crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig, ::aws_smithy_types::error::operation::BuildError, > { - ::std::result::Result::Ok(crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig { - - }) + ::std::result::Result::Ok( + crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig {}, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/error.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/error.rs index 5fb0d34d3..3c60b015b 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/error.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/types/error.rs @@ -4,19 +4,19 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { #[allow(missing_docs)] -AwsCryptographicPrimitivesError { - message: ::std::string::String, -}, + AwsCryptographicPrimitivesError { + message: ::std::string::String, + }, CollectionOfErrors { list: ::std::vec::Vec, message: ::std::string::String, }, ValidationError(ValidationError), Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } @@ -44,18 +44,20 @@ impl ::std::error::Error for Error { impl Error { pub fn wrap_validation_err(err: E) -> Self where - E: ::std::error::Error + 'static, + E: ::std::error::Error + Send + Sync + 'static, { - Self::ValidationError(ValidationError(::std::rc::Rc::new(err))) + Self::ValidationError(ValidationError(::dafny_runtime::Rc::new(err))) } } #[derive(::std::clone::Clone, ::std::fmt::Debug)] -pub struct ValidationError(::std::rc::Rc); +pub struct ValidationError(::dafny_runtime::Rc); impl ::std::cmp::PartialEq for ValidationError { fn eq(&self, other: &Self) -> bool { - ::std::rc::Rc::<(dyn std::error::Error + 'static)>::ptr_eq(&self.0, &other.0) + ::dafny_runtime::Rc::<(dyn std::error::Error + Send + Sync + 'static)>::ptr_eq( + &self.0, &other.0, + ) } } diff --git a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/validation.rs b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/validation.rs index 5acefaa3b..0875d3926 100644 --- a/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/validation.rs +++ b/releases/rust/db_esdk/src/deps/aws_cryptography_primitives/validation.rs @@ -1,2486 +1,2821 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM(input: &crate::deps::aws_cryptography_primitives::types::AesGcm) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(&input.key_length)?; -validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(&input.tag_length)?; -validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(&input.iv_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM( + input: &crate::deps::aws_cryptography_primitives::types::AesGcm, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(&input.r#key_length)?; + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(&input.r#tag_length)?; + validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength(&input.r#iv_length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DivLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "iv_length", + "iv_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..=255).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "iv_length", - "iv_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..=255).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "iv_length", - "iv_length failed to satisfy constraint: Member must be between 0 and 255, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key_length", - "key_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(1..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "key_length", - "key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "tag_length", - "tag_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..=32).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "tag_length", - "tag_length failed to satisfy constraint: Member must be between 0 and 32, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput(input: &crate::deps::aws_cryptography_primitives::types::AesDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg(&input.enc_alg)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt(&input.cipher_txt)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag(&input.auth_tag)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div(&input.iv)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad(&input.aad)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_for_AwsCryptographicPrimitives_AESDecrypt(input: &crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg(&input.enc_alg)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt(&input.cipher_txt)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag(&input.auth_tag)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div(&input.iv)?; -validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad(&input.aad)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "aad", - "aad is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "auth_tag", - "auth_tag is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cipher_txt", - "cipher_txt is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "enc_alg", - "enc_alg is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "iv", - "iv is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_for_AwsCryptographicPrimitives_AESDecrypt(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext", - "plaintext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput(input: &crate::deps::aws_cryptography_primitives::types::AesEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg(&input.enc_alg)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div(&input.iv)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg(&input.msg)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad(&input.aad)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_for_AwsCryptographicPrimitives_AESEncrypt(input: &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg(&input.enc_alg)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div(&input.iv)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg(&input.msg)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad(&input.aad)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "aad", - "aad is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "enc_alg", - "enc_alg is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "iv", - "iv is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "msg", - "msg is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput(input: &crate::deps::aws_cryptography_primitives::types::AesEncryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText(&input.cipher_text)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag(&input.auth_tag)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_for_AwsCryptographicPrimitives_AESEncrypt(input: &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText(&input.cipher_text)?; -validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag(&input.auth_tag)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "auth_tag", - "auth_tag is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cipher_text", - "cipher_text is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput(input: &crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength(&input.expected_length)?; -validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce(&input.nonce)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_for_AwsCryptographicPrimitives_AesKdfCounterMode(input: &crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::AesKdfCtrInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength(&input.expected_length)?; -validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce(&input.nonce)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "expected_length", - "expected_length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "expected_length", - "expected_length failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ikm", - "ikm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_for_AwsCryptographicPrimitives_AesKdfCounterMode(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "okm", - "okm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput(input: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_for_AwsCryptographicPrimitives_CompressPublicKey(input: &crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey(&input.compressed_public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_for_AwsCryptographicPrimitives_CompressPublicKey(input: &crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey(&input.compressed_public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "compressed_public_key", - "compressed_public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCryptoConfig(input: &crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput(input: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey(&input.compressed_public_key)?; -validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_for_AwsCryptographicPrimitives_DecompressPublicKey(input: &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey(&input.compressed_public_key)?; -validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "compressed_public_key", - "compressed_public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_for_AwsCryptographicPrimitives_DecompressPublicKey(input: &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput(input: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_for_AwsCryptographicPrimitives_DeriveSharedSecret(input: &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput(input: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret(&input.shared_secret)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_for_AwsCryptographicPrimitives_DeriveSharedSecret(input: &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret(&input.shared_secret)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "shared_secret", - "shared_secret is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput(input: &crate::deps::aws_cryptography_primitives::types::DigestInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_for_AwsCryptographicPrimitives_Digest(input: &crate::deps::aws_cryptography_primitives::operation::digest::DigestInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "message", - "message is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput_for_AwsCryptographicPrimitives_Digest(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest", - "digest is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input: &crate::deps::aws_cryptography_primitives::types::EccPrivateKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECCPrivateKey_Dpem(&input.pem)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPrivateKey_Dpem(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "pem", - "pem is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input: &crate::deps::aws_cryptography_primitives::types::EccPublicKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECCPublicKey_Dder(&input.der)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPublicKey_Dder(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "der", - "der is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput(input: &crate::deps::aws_cryptography_primitives::types::EcdsaSignInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_for_AwsCryptographicPrimitives_ECDSASign(input: &crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey(&input.signing_key)?; -validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "message", - "message is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature_algorithm", - "signature_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signing_key", - "signing_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_for_AwsCryptographicPrimitives_ECDSASign(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature", - "signature is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput(input: &crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage(&input.message)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature(&input.signature)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_for_AwsCryptographicPrimitives_ECDSAVerify(input: &crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage(&input.message)?; -validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature(&input.signature)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "message", - "message is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature", - "signature is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature_algorithm", - "signature_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "verification_key", - "verification_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_for_AwsCryptographicPrimitives_ECDSAVerify(input: &::std::primitive::bool) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess(input: &::std::option::Option<::std::primitive::bool>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "success", - "success is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput(input: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_for_AwsCryptographicPrimitives_GenerateECCKeyPair(input: &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve(&input.ecc_curve)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput(input: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_for_AwsCryptographicPrimitives_GenerateECCKeyPair(input: &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput(input: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm(&input.signature_algorithm)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_for_AwsCryptographicPrimitives_GenerateECDSASignatureKey(input: &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm(&input.signature_algorithm)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature_algorithm", - "signature_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey(&input.signing_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_for_AwsCryptographicPrimitives_GenerateECDSASignatureKey(input: &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm(&input.signature_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey(&input.verification_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey(&input.signing_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signature_algorithm", - "signature_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "signing_key", - "signing_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "verification_key", - "verification_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput(input: &crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength(&input.length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_for_AwsCryptographicPrimitives_GenerateRandomBytes(input: &crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength(&input.length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "length", - "length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "length", - "length failed to satisfy constraint: Member must be greater than or equal to 0", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_for_AwsCryptographicPrimitives_GenerateRandomBytes(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "data", - "data is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput(input: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits(&input.length_bits)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_for_AwsCryptographicPrimitives_GenerateRSAKeyPair(input: &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits(&input.length_bits)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "length_bits", - "length_bits is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(81..=4096).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "length_bits", - "length_bits failed to satisfy constraint: Member must be between 81 and 4096, inclusive", - )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput(input: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_for_AwsCryptographicPrimitives_GenerateRSAKeyPair(input: &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HRSAPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput(input: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_for_AwsCryptographicPrimitives_GetPublicKeyFromPrivateKey(input: &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey(&input.private_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_for_AwsCryptographicPrimitives_GetPublicKeyFromPrivateKey(input: &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput(input: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_for_AwsCryptographicPrimitives_GetRSAKeyModulusLength(input: &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput(input: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength(&input.length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_for_AwsCryptographicPrimitives_GetRSAKeyModulusLength(input: &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength(&input.length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "length", - "length is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(81..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( - "length", - "length failed to satisfy constraint: Member must be greater than or equal to 81", + "iv_length failed to satisfy constraint: Member must be between 0 and 255, inclusive", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput(input: &crate::deps::aws_cryptography_primitives::types::HkdfExpandInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk(&input.prk)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo(&input.info)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength(&input.expected_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_for_AwsCryptographicPrimitives_HkdfExpand(input: &crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk(&input.prk)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo(&input.info)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength(&input.expected_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DkeyLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key_length", + "key_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(1..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "key_length", + "key_length failed to satisfy constraint: Member must be between 1 and 32, inclusive", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "expected_length", - "expected_length is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAES__GCM_DtagLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "tag_length", + "tag_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..=32).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "tag_length", + "tag_length failed to satisfy constraint: Member must be between 0 and 32, inclusive", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput( + input: &crate::deps::aws_cryptography_primitives::types::AesDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg(&input.r#enc_alg)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt(&input.r#cipher_txt)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag(&input.r#auth_tag)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div(&input.r#iv)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad(&input.r#aad)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_for_AwsCryptographicPrimitives_AESDecrypt( + input: &crate::deps::aws_cryptography_primitives::operation::aes_decrypt::AesDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg(&input.r#enc_alg)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt(&input.r#cipher_txt)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag(&input.r#auth_tag)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div(&input.r#iv)?; + validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad(&input.r#aad)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Daad( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "aad", + "aad is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DauthTag( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "auth_tag", + "auth_tag is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DcipherTxt( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cipher_txt", + "cipher_txt is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_DencAlg( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "enc_alg", + "enc_alg is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Div( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "iv", + "iv is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptInput_Dkey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_for_AwsCryptographicPrimitives_AESDecrypt( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESDecryptOutput_Dplaintext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext", + "plaintext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput( + input: &crate::deps::aws_cryptography_primitives::types::AesEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg(&input.r#enc_alg)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div(&input.r#iv)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg(&input.r#msg)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad(&input.r#aad)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_for_AwsCryptographicPrimitives_AESEncrypt( + input: &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg(&input.r#enc_alg)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div(&input.r#iv)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg(&input.r#msg)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad(&input.r#aad)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Daad( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "aad", + "aad is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_DencAlg( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "enc_alg", + "enc_alg is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HAES__GCM(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Div( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "iv", + "iv is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dkey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptInput_Dmsg( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "msg", + "msg is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput( + input: &crate::deps::aws_cryptography_primitives::types::AesEncryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText(&input.r#cipher_text)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag(&input.r#auth_tag)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_for_AwsCryptographicPrimitives_AESEncrypt( + input: &crate::deps::aws_cryptography_primitives::operation::aes_encrypt::AesEncryptOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText(&input.r#cipher_text)?; + validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag(&input.r#auth_tag)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DauthTag( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "auth_tag", + "auth_tag is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAESEncryptOutput_DcipherText( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cipher_text", + "cipher_text is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput( + input: &crate::deps::aws_cryptography_primitives::types::AesKdfCtrInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength( + &input.r#expected_length, + )?; + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce(&input.r#nonce)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_for_AwsCryptographicPrimitives_AesKdfCounterMode( + input: &crate::deps::aws_cryptography_primitives::operation::aes_kdf_counter_mode::AesKdfCtrInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength( + &input.r#expected_length, + )?; + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce(&input.r#nonce)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_DexpectedLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expected_length", + "expected_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "expected_length", "expected_length failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "info", - "info is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "prk", - "prk is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_for_AwsCryptographicPrimitives_HkdfExpand(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "okm", - "okm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput(input: &crate::deps::aws_cryptography_primitives::types::HkdfExtractInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt(&input.salt)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm(&input.ikm)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_for_AwsCryptographicPrimitives_HkdfExtract(input: &crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt(&input.salt)?; -validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm(&input.ikm)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ikm", - "ikm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_for_AwsCryptographicPrimitives_HkdfExtract(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "prk", - "prk is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput(input: &crate::deps::aws_cryptography_primitives::types::HkdfInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt(&input.salt)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo(&input.info)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength(&input.expected_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_for_AwsCryptographicPrimitives_Hkdf(input: &crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt(&input.salt)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo(&input.info)?; -validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength(&input.expected_length)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "expected_length", - "expected_length is required but was not specified", + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dikm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ikm", + "ikm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrInput_Dnonce( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_for_AwsCryptographicPrimitives_AesKdfCounterMode( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HAesKdfCtrOutput_Dokm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "okm", + "okm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey(&input.r#public_key)?; + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_for_AwsCryptographicPrimitives_CompressPublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey(&input.r#public_key)?; + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyInput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::CompressPublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey( + &input.r#compressed_public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_for_AwsCryptographicPrimitives_CompressPublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::compress_public_key::CompressPublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey( + &input.r#compressed_public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCompressPublicKeyOutput_DcompressedPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "compressed_public_key", + "compressed_public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HCryptoConfig( + input: &crate::deps::aws_cryptography_primitives::types::crypto_config::CryptoConfig, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey( + &input.r#compressed_public_key, + )?; + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_for_AwsCryptographicPrimitives_DecompressPublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey( + &input.r#compressed_public_key, + )?; + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DcompressedPublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "compressed_public_key", + "compressed_public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::DecompressPublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_for_AwsCryptographicPrimitives_DecompressPublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::decompress_public_key::DecompressPublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDecompressPublicKeyOutput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput( + input: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_for_AwsCryptographicPrimitives_DeriveSharedSecret( + input: &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DprivateKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretInput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput( + input: &crate::deps::aws_cryptography_primitives::types::DeriveSharedSecretOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret( + &input.r#shared_secret, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_for_AwsCryptographicPrimitives_DeriveSharedSecret( + input: &crate::deps::aws_cryptography_primitives::operation::derive_shared_secret::DeriveSharedSecretOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret( + &input.r#shared_secret, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDeriveSharedSecretOutput_DsharedSecret( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "shared_secret", + "shared_secret is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput( + input: &crate::deps::aws_cryptography_primitives::types::DigestInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_for_AwsCryptographicPrimitives_Digest( + input: &crate::deps::aws_cryptography_primitives::operation::digest::DigestInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestInput_Dmessage( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "message", + "message is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput_for_AwsCryptographicPrimitives_Digest( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HDigestOutput_Ddigest( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest", + "digest is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPrivateKey( + input: &crate::deps::aws_cryptography_primitives::types::EccPrivateKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECCPrivateKey_Dpem(&input.r#pem)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPrivateKey_Dpem( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "pem", + "pem is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPublicKey( + input: &crate::deps::aws_cryptography_primitives::types::EccPublicKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECCPublicKey_Dder(&input.r#der)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECCPublicKey_Dder( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "der", + "der is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput( + input: &crate::deps::aws_cryptography_primitives::types::EcdsaSignInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey(&input.r#signing_key)?; + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_for_AwsCryptographicPrimitives_ECDSASign( + input: &crate::deps::aws_cryptography_primitives::operation::ecdsa_sign::EcdsaSignInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey(&input.r#signing_key)?; + validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_Dmessage( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "message", + "message is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsignatureAlgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature_algorithm", + "signature_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignInput_DsigningKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signing_key", + "signing_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_for_AwsCryptographicPrimitives_ECDSASign( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSASignOutput_Dsignature( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature", + "signature is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput( + input: &crate::deps::aws_cryptography_primitives::types::EcdsaVerifyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage(&input.r#message)?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature(&input.r#signature)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_for_AwsCryptographicPrimitives_ECDSAVerify( + input: &crate::deps::aws_cryptography_primitives::operation::ecdsa_verify::EcdsaVerifyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage(&input.r#message)?; + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature(&input.r#signature)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dmessage( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "message", + "message is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_Dsignature( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature", + "signature is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DsignatureAlgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature_algorithm", + "signature_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyInput_DverificationKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "verification_key", + "verification_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_for_AwsCryptographicPrimitives_ECDSAVerify( + input: &::std::primitive::bool, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HECDSAVerifyOutput_Dsuccess( + input: &::std::option::Option<::std::primitive::bool>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "success", + "success is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_for_AwsCryptographicPrimitives_GenerateECCKeyPair( + input: &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve(&input.r#ecc_curve)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateEccKeyPairOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_for_AwsCryptographicPrimitives_GenerateECCKeyPair( + input: &crate::deps::aws_cryptography_primitives::operation::generate_ecc_key_pair::GenerateEccKeyPairOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DprivateKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECCKeyPairOutput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_for_AwsCryptographicPrimitives_GenerateECDSASignatureKey( + input: &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyInput_DsignatureAlgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature_algorithm", + "signature_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateEcdsaSignatureKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey( + &input.r#signing_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_for_AwsCryptographicPrimitives_GenerateECDSASignatureKey( + input: &crate::deps::aws_cryptography_primitives::operation::generate_ecdsa_signature_key::GenerateEcdsaSignatureKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm( + &input.r#signature_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey( + &input.r#verification_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey( + &input.r#signing_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsignatureAlgorithm( + input: &::std::option::Option< + crate::deps::aws_cryptography_primitives::types::EcdsaSignatureAlgorithm, + >, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signature_algorithm", + "signature_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DsigningKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "signing_key", + "signing_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateECDSASignatureKeyOutput_DverificationKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "verification_key", + "verification_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateRandomBytesInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength(&input.r#length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_for_AwsCryptographicPrimitives_GenerateRandomBytes( + input: &crate::deps::aws_cryptography_primitives::operation::generate_random_bytes::GenerateRandomBytesInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength(&input.r#length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesInput_Dlength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "length", + "length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::invalid_field( + "length", + "length failed to satisfy constraint: Member must be greater than or equal to 0", + ), + ); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_for_AwsCryptographicPrimitives_GenerateRandomBytes( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRandomBytesOutput_Ddata( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "data", + "data is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits( + &input.r#length_bits, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_for_AwsCryptographicPrimitives_GenerateRSAKeyPair( + input: &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits( + &input.r#length_bits, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairInput_DlengthBits( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "length_bits", + "length_bits is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(81..=4096).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + "length_bits", + "length_bits failed to satisfy constraint: Member must be between 81 and 4096, inclusive", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput( + input: &crate::deps::aws_cryptography_primitives::types::GenerateRsaKeyPairOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_for_AwsCryptographicPrimitives_GenerateRSAKeyPair( + input: &crate::deps::aws_cryptography_primitives::operation::generate_rsa_key_pair::GenerateRsaKeyPairOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey( + &input.r#public_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DprivateKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGenerateRSAKeyPairOutput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HRSAPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve( + &input.r#ecc_curve, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_for_AwsCryptographicPrimitives_GetPublicKeyFromPrivateKey( + input: &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve( + &input.r#ecc_curve, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey( + &input.r#private_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyInput_DprivateKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::GetPublicKeyFromPrivateKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve( + &input.r#ecc_curve, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_for_AwsCryptographicPrimitives_GetPublicKeyFromPrivateKey( + input: &crate::deps::aws_cryptography_primitives::operation::get_public_key_from_private_key::GetPublicKeyFromPrivateKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve( + &input.r#ecc_curve, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey( + &input.r#private_key, + )?; + validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DprivateKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPrivateKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetPublicKeyFromPrivateKeyOutput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput( + input: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_for_AwsCryptographicPrimitives_GetRSAKeyModulusLength( + input: &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey( + &input.r#public_key, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput( + input: &crate::deps::aws_cryptography_primitives::types::GetRsaKeyModulusLengthOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength(&input.r#length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_for_AwsCryptographicPrimitives_GetRSAKeyModulusLength( + input: &crate::deps::aws_cryptography_primitives::operation::get_rsa_key_modulus_length::GetRsaKeyModulusLengthOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength(&input.r#length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HGetRSAKeyModulusLengthOutput_Dlength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "length", + "length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(81..).contains(input) { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::invalid_field( + "length", + "length failed to satisfy constraint: Member must be greater than or equal to 81", + ), + ); + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput( + input: &crate::deps::aws_cryptography_primitives::types::HkdfExpandInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk(&input.r#prk)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo(&input.r#info)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength( + &input.r#expected_length, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_for_AwsCryptographicPrimitives_HkdfExpand( + input: &crate::deps::aws_cryptography_primitives::operation::hkdf_expand::HkdfExpandInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk(&input.r#prk)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo(&input.r#info)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength( + &input.r#expected_length, + )?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_DexpectedLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expected_length", + "expected_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "expected_length", "expected_length failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ikm", - "ikm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "info", - "info is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput_for_AwsCryptographicPrimitives_Hkdf(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "okm", - "okm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput(input: &crate::deps::aws_cryptography_primitives::types::HMacInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_for_AwsCryptographicPrimitives_HMac(input: &crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey(&input.key)?; -validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage(&input.message)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "key", - "key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "message", - "message is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput_for_AwsCryptographicPrimitives_HMac(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest", - "digest is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput(input: &crate::deps::aws_cryptography_primitives::types::KdfCtrInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength(&input.expected_length)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose(&input.purpose)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce(&input.nonce)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_for_AwsCryptographicPrimitives_KdfCounterMode(input: &crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm(&input.digest_algorithm)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm(&input.ikm)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength(&input.expected_length)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose(&input.purpose)?; -validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce(&input.nonce)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "digest_algorithm", - "digest_algorithm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dinfo( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "info", + "info is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandInput_Dprk( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "prk", + "prk is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_for_AwsCryptographicPrimitives_HkdfExpand( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExpandOutput_Dokm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "okm", + "okm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput( + input: &crate::deps::aws_cryptography_primitives::types::HkdfExtractInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt(&input.r#salt)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm(&input.r#ikm)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_for_AwsCryptographicPrimitives_HkdfExtract( + input: &crate::deps::aws_cryptography_primitives::operation::hkdf_extract::HkdfExtractInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt(&input.r#salt)?; + validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm(&input.r#ikm)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dikm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ikm", + "ikm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractInput_Dsalt( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_for_AwsCryptographicPrimitives_HkdfExtract( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfExtractOutput_Dprk( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "prk", + "prk is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput( + input: &crate::deps::aws_cryptography_primitives::types::HkdfInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm(&input.r#digest_algorithm)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt(&input.r#salt)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo(&input.r#info)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength(&input.r#expected_length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_for_AwsCryptographicPrimitives_Hkdf( + input: &crate::deps::aws_cryptography_primitives::operation::hkdf::HkdfInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm(&input.r#digest_algorithm)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt(&input.r#salt)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo(&input.r#info)?; + validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength(&input.r#expected_length)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_DexpectedLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expected_length", + "expected_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "expected_length", - "expected_length is required but was not specified", + "expected_length failed to satisfy constraint: Member must be greater than or equal to 0", )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(0..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dikm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ikm", + "ikm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dinfo( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "info", + "info is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfInput_Dsalt( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput_for_AwsCryptographicPrimitives_Hkdf( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHkdfOutput_Dokm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "okm", + "okm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput( + input: &crate::deps::aws_cryptography_primitives::types::HMacInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm(&input.r#digest_algorithm)?; + validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_for_AwsCryptographicPrimitives_HMac( + input: &crate::deps::aws_cryptography_primitives::operation::h_mac::HMacInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm(&input.r#digest_algorithm)?; + validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey(&input.r#key)?; + validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage(&input.r#message)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_Dkey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "key", + "key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacInput_Dmessage( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "message", + "message is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput_for_AwsCryptographicPrimitives_HMac( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HHMacOutput_Ddigest( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest", + "digest is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput( + input: &crate::deps::aws_cryptography_primitives::types::KdfCtrInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength(&input.r#expected_length)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose(&input.r#purpose)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce(&input.r#nonce)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_for_AwsCryptographicPrimitives_KdfCounterMode( + input: &crate::deps::aws_cryptography_primitives::operation::kdf_counter_mode::KdfCtrInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm( + &input.r#digest_algorithm, + )?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm(&input.r#ikm)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength(&input.r#expected_length)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose(&input.r#purpose)?; + validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce(&input.r#nonce)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DdigestAlgorithm( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "digest_algorithm", + "digest_algorithm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_DexpectedLength( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "expected_length", + "expected_length is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(0..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "expected_length", "expected_length failed to satisfy constraint: Member must be greater than or equal to 0", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ikm", - "ikm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_for_AwsCryptographicPrimitives_KdfCounterMode(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "okm", - "okm is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput(input: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_for_AwsCryptographicPrimitives_ParsePublicKey(input: &crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_for_AwsCryptographicPrimitives_ParsePublicKey(input: &crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput(input: &crate::deps::aws_cryptography_primitives::types::RsaDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding(&input.padding)?; -validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText(&input.cipher_text)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_for_AwsCryptographicPrimitives_RSADecrypt(input: &crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding(&input.padding)?; -validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey(&input.private_key)?; -validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText(&input.cipher_text)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cipher_text", - "cipher_text is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "padding", - "padding is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "private_key", - "private_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_for_AwsCryptographicPrimitives_RSADecrypt(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext", - "plaintext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput(input: &crate::deps::aws_cryptography_primitives::types::RsaEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding(&input.padding)?; -validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext(&input.plaintext)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_for_AwsCryptographicPrimitives_RSAEncrypt(input: &crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding(&input.padding)?; -validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey(&input.public_key)?; -validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext(&input.plaintext)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "padding", - "padding is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "plaintext", - "plaintext is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_for_AwsCryptographicPrimitives_RSAEncrypt(input: &::aws_smithy_types::Blob) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText(&Some(input.clone()))?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "cipher_text", - "cipher_text is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey(input: &crate::deps::aws_cryptography_primitives::types::RsaPrivateKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_DlengthBits(&input.length_bits)?; -validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_Dpem(&input.pem)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_DlengthBits(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "length_bits", - "length_bits is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(81..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dikm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ikm", + "ikm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dnonce( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrInput_Dpurpose( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_for_AwsCryptographicPrimitives_KdfCounterMode( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HKdfCtrOutput_Dokm( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "okm", + "okm is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_for_AwsCryptographicPrimitives_ParsePublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::ParsePublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_for_AwsCryptographicPrimitives_ParsePublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::parse_public_key::ParsePublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HParsePublicKeyOutput_DpublicKey( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + validate_aws_Pcryptography_Pprimitives_HECCPublicKey(input)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput( + input: &crate::deps::aws_cryptography_primitives::types::RsaDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding(&input.r#padding)?; + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey(&input.r#private_key)?; + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText(&input.r#cipher_text)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_for_AwsCryptographicPrimitives_RSADecrypt( + input: &crate::deps::aws_cryptography_primitives::operation::rsa_decrypt::RsaDecryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding(&input.r#padding)?; + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey(&input.r#private_key)?; + validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText(&input.r#cipher_text)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DcipherText( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cipher_text", + "cipher_text is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_Dpadding( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "padding", + "padding is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptInput_DprivateKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "private_key", + "private_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_for_AwsCryptographicPrimitives_RSADecrypt( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSADecryptOutput_Dplaintext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext", + "plaintext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput( + input: &crate::deps::aws_cryptography_primitives::types::RsaEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding(&input.r#padding)?; + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey(&input.r#public_key)?; + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext(&input.r#plaintext)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_for_AwsCryptographicPrimitives_RSAEncrypt( + input: &crate::deps::aws_cryptography_primitives::operation::rsa_encrypt::RsaEncryptInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding(&input.r#padding)?; + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey(&input.r#public_key)?; + validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext(&input.r#plaintext)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dpadding( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "padding", + "padding is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_Dplaintext( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "plaintext", + "plaintext is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_for_AwsCryptographicPrimitives_RSAEncrypt( + input: &::aws_smithy_types::Blob, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText(&Some(input.clone()))?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAEncryptOutput_DcipherText( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "cipher_text", + "cipher_text is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey( + input: &crate::deps::aws_cryptography_primitives::types::RsaPrivateKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_DlengthBits(&input.r#length_bits)?; + validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_Dpem(&input.r#pem)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_DlengthBits( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "length_bits", + "length_bits is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(81..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "length_bits", "length_bits failed to satisfy constraint: Member must be greater than or equal to 81", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_Dpem(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "pem", - "pem is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey(input: &crate::deps::aws_cryptography_primitives::types::RsaPublicKey) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_DlengthBits(&input.length_bits)?; -validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_Dpem(&input.pem)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_DlengthBits(input: &::std::option::Option<::std::primitive::i32>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "length_bits", - "length_bits is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - -if !(81..).contains(input) { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPrivateKey_Dpem( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "pem", + "pem is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey( + input: &crate::deps::aws_cryptography_primitives::types::RsaPublicKey, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_DlengthBits(&input.r#length_bits)?; + validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_Dpem(&input.r#pem)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_DlengthBits( + input: &::std::option::Option<::std::primitive::i32>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "length_bits", + "length_bits is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + if !(81..).contains(input) { + return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::invalid_field( "length_bits", "length_bits failed to satisfy constraint: Member must be greater than or equal to 81", )); -} - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_Dpem(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "pem", - "pem is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput(input: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_for_AwsCryptographicPrimitives_ValidatePublicKey(input: &crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve(&input.ecc_curve)?; -validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey(&input.public_key)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve(input: &::std::option::Option) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "ecc_curve", - "ecc_curve is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey(input: &::std::option::Option<::aws_smithy_types::Blob>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "public_key", - "public_key is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput(input: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess(&input.success)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_for_AwsCryptographicPrimitives_ValidatePublicKey(input: &crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess(&input.success)?; - Ok(()) -} -pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess(input: &::std::option::Option<::std::primitive::bool>) - -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> -{ - if input.is_none() { - return ::std::result::Result::Err(::aws_smithy_types::error::operation::BuildError::missing_field( - "success", - "success is required but was not specified", - )); -} -if input.is_none() { - return ::std::result::Result::Ok(()); -} -let input = input.as_ref().unwrap(); - - Ok(()) + } + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HRSAPublicKey_Dpem( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "pem", + "pem is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput( + input: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_for_AwsCryptographicPrimitives_ValidatePublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyInput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve(&input.r#ecc_curve)?; + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey(&input.r#public_key)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DeccCurve( + input: &::std::option::Option, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "ecc_curve", + "ecc_curve is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyInput_DpublicKey( + input: &::std::option::Option<::aws_smithy_types::Blob>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "public_key", + "public_key is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput( + input: &crate::deps::aws_cryptography_primitives::types::ValidatePublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess(&input.r#success)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_for_AwsCryptographicPrimitives_ValidatePublicKey( + input: &crate::deps::aws_cryptography_primitives::operation::validate_public_key::ValidatePublicKeyOutput, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess(&input.r#success)?; + Ok(()) +} +pub(crate) fn validate_aws_Pcryptography_Pprimitives_HValidatePublicKeyOutput_Dsuccess( + input: &::std::option::Option<::std::primitive::bool>, +) -> ::std::result::Result<(), ::aws_smithy_types::error::operation::BuildError> { + if input.is_none() { + return ::std::result::Result::Err( + ::aws_smithy_types::error::operation::BuildError::missing_field( + "success", + "success is required but was not specified", + ), + ); + } + if input.is_none() { + return ::std::result::Result::Ok(()); + } + let input = input.as_ref().unwrap(); + + Ok(()) } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/client.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/client.rs index 3e21cfe89..4c7527731 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/client.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/client.rs @@ -1,18 +1,18 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -use std::sync::LazyLock; use crate::deps::com_amazonaws_dynamodb::conversions; +use std::sync::LazyLock; #[derive(::std::clone::Clone, ::std::fmt::Debug)] pub struct Client { - pub inner: aws_sdk_dynamodb::Client + pub inner: aws_sdk_dynamodb::Client, } impl ::std::cmp::PartialEq for Client { - fn eq(&self, other: &Self) -> bool { - false - } + fn eq(&self, other: &Self) -> bool { + false + } } impl ::std::convert::Into for aws_sdk_dynamodb::Client { @@ -25,13 +25,13 @@ impl ::std::convert::Into for aws_sdk_dynamodb::Client { /// Necessary because Dafny only generates synchronous code. static dafny_tokio_runtime: LazyLock = LazyLock::new(|| { tokio::runtime::Builder::new_multi_thread() - .enable_all() - .build() - .unwrap() + .enable_all() + .build() + .unwrap() }); -impl dafny_runtime::UpcastObject for Client { - ::dafny_runtime::UpcastObjectFn!(dyn::std::any::Any); +impl dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for Client { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } impl dafny_runtime::UpcastObject for Client { @@ -40,18 +40,18 @@ impl dafny_runtime::UpcastObject) - -> std::rc::Rc, - std::rc::Rc + fn BatchExecuteStatement(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.batch_execute_statement() - .set_statements(inner_input.statements) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) + .set_statements(inner_input.r#statements) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) .send() .await }) @@ -60,18 +60,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::_batch_execute_statement_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::batch_execute_statement::to_dafny_error) } - fn BatchGetItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn BatchGetItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.batch_get_item() - .set_request_items(inner_input.request_items) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) + .set_request_items(inner_input.r#request_items) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) .send() .await }) @@ -80,19 +80,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::_batch_get_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::batch_get_item::to_dafny_error) } - fn BatchWriteItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn BatchWriteItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.batch_write_item() - .set_request_items(inner_input.request_items) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_return_item_collection_metrics(inner_input.return_item_collection_metrics) + .set_request_items(inner_input.r#request_items) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_return_item_collection_metrics(inner_input.r#return_item_collection_metrics) .send() .await }) @@ -101,18 +101,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::_batch_write_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::batch_write_item::to_dafny_error) } - fn CreateBackup(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn CreateBackup(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::create_backup::_create_backup_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.create_backup() - .set_table_name(inner_input.table_name) -.set_backup_name(inner_input.backup_name) + .set_table_name(inner_input.r#table_name) +.set_backup_name(inner_input.r#backup_name) .send() .await }) @@ -121,18 +121,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::create_backup::_create_backup_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::create_backup::to_dafny_error) } - fn CreateGlobalTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn CreateGlobalTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::create_global_table::_create_global_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.create_global_table() - .set_global_table_name(inner_input.global_table_name) -.set_replication_group(inner_input.replication_group) + .set_global_table_name(inner_input.r#global_table_name) +.set_replication_group(inner_input.r#replication_group) .send() .await }) @@ -141,30 +141,30 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::create_global_table::_create_global_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::create_global_table::to_dafny_error) } - fn CreateTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn CreateTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::create_table::_create_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.create_table() - .set_attribute_definitions(inner_input.attribute_definitions) -.set_table_name(inner_input.table_name) -.set_key_schema(inner_input.key_schema) -.set_local_secondary_indexes(inner_input.local_secondary_indexes) -.set_global_secondary_indexes(inner_input.global_secondary_indexes) -.set_billing_mode(inner_input.billing_mode) -.set_provisioned_throughput(inner_input.provisioned_throughput) -.set_stream_specification(inner_input.stream_specification) -.set_sse_specification(inner_input.sse_specification) -.set_tags(inner_input.tags) -.set_table_class(inner_input.table_class) -.set_deletion_protection_enabled(inner_input.deletion_protection_enabled) -.set_resource_policy(inner_input.resource_policy) -.set_on_demand_throughput(inner_input.on_demand_throughput) + .set_attribute_definitions(inner_input.r#attribute_definitions) +.set_table_name(inner_input.r#table_name) +.set_key_schema(inner_input.r#key_schema) +.set_local_secondary_indexes(inner_input.r#local_secondary_indexes) +.set_global_secondary_indexes(inner_input.r#global_secondary_indexes) +.set_billing_mode(inner_input.r#billing_mode) +.set_provisioned_throughput(inner_input.r#provisioned_throughput) +.set_stream_specification(inner_input.r#stream_specification) +.set_sse_specification(inner_input.r#sse_specification) +.set_tags(inner_input.r#tags) +.set_table_class(inner_input.r#table_class) +.set_deletion_protection_enabled(inner_input.r#deletion_protection_enabled) +.set_resource_policy(inner_input.r#resource_policy) +.set_on_demand_throughput(inner_input.r#on_demand_throughput) .send() .await }) @@ -173,17 +173,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::create_table::_create_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::create_table::to_dafny_error) } - fn DeleteBackup(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DeleteBackup(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::delete_backup::_delete_backup_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.delete_backup() - .set_backup_arn(inner_input.backup_arn) + .set_backup_arn(inner_input.r#backup_arn) .send() .await }) @@ -192,26 +192,26 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::delete_backup::_delete_backup_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::delete_backup::to_dafny_error) } - fn DeleteItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DeleteItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.delete_item() - .set_table_name(inner_input.table_name) -.set_key(inner_input.key) -.set_expected(inner_input.expected) -.set_conditional_operator(inner_input.conditional_operator) -.set_return_values(inner_input.return_values) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_return_item_collection_metrics(inner_input.return_item_collection_metrics) -.set_condition_expression(inner_input.condition_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) -.set_expression_attribute_values(inner_input.expression_attribute_values) + .set_table_name(inner_input.r#table_name) +.set_key(inner_input.r#key) +.set_expected(inner_input.r#expected) +.set_conditional_operator(inner_input.r#conditional_operator) +.set_return_values(inner_input.r#return_values) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_return_item_collection_metrics(inner_input.r#return_item_collection_metrics) +.set_condition_expression(inner_input.r#condition_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) +.set_expression_attribute_values(inner_input.r#expression_attribute_values) .send() .await }) @@ -220,18 +220,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::delete_item::_delete_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::delete_item::to_dafny_error) } - fn DeleteResourcePolicy(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DeleteResourcePolicy(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::delete_resource_policy::_delete_resource_policy_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.delete_resource_policy() - .set_resource_arn(inner_input.resource_arn) -.set_expected_revision_id(inner_input.expected_revision_id) + .set_resource_arn(inner_input.r#resource_arn) +.set_expected_revision_id(inner_input.r#expected_revision_id) .send() .await }) @@ -240,17 +240,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::delete_resource_policy::_delete_resource_policy_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::delete_resource_policy::to_dafny_error) } - fn DeleteTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DeleteTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::delete_table::_delete_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.delete_table() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -259,17 +259,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::delete_table::_delete_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::delete_table::to_dafny_error) } - fn DescribeBackup(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeBackup(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_backup::_describe_backup_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_backup() - .set_backup_arn(inner_input.backup_arn) + .set_backup_arn(inner_input.r#backup_arn) .send() .await }) @@ -278,17 +278,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_backup::_describe_backup_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_backup::to_dafny_error) } - fn DescribeContinuousBackups(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeContinuousBackups(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_continuous_backups::_describe_continuous_backups_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_continuous_backups() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -297,18 +297,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_continuous_backups::_describe_continuous_backups_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_continuous_backups::to_dafny_error) } - fn DescribeContributorInsights(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeContributorInsights(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_contributor_insights::_describe_contributor_insights_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_contributor_insights() - .set_table_name(inner_input.table_name) -.set_index_name(inner_input.index_name) + .set_table_name(inner_input.r#table_name) +.set_index_name(inner_input.r#index_name) .send() .await }) @@ -317,10 +317,10 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_contributor_insights::_describe_contributor_insights_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_contributor_insights::to_dafny_error) } - fn DescribeEndpoints(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeEndpoints(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_endpoints::_describe_endpoints_request::from_dafny(input.clone()); @@ -336,17 +336,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_endpoints::_describe_endpoints_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_endpoints::to_dafny_error) } - fn DescribeExport(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeExport(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_export::_describe_export_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_export() - .set_export_arn(inner_input.export_arn) + .set_export_arn(inner_input.r#export_arn) .send() .await }) @@ -355,17 +355,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_export::_describe_export_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_export::to_dafny_error) } - fn DescribeGlobalTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeGlobalTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table::_describe_global_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_global_table() - .set_global_table_name(inner_input.global_table_name) + .set_global_table_name(inner_input.r#global_table_name) .send() .await }) @@ -374,17 +374,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table::_describe_global_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table::to_dafny_error) } - fn DescribeGlobalTableSettings(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeGlobalTableSettings(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table_settings::_describe_global_table_settings_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_global_table_settings() - .set_global_table_name(inner_input.global_table_name) + .set_global_table_name(inner_input.r#global_table_name) .send() .await }) @@ -393,17 +393,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table_settings::_describe_global_table_settings_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_global_table_settings::to_dafny_error) } - fn DescribeImport(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeImport(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_import::_describe_import_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_import() - .set_import_arn(inner_input.import_arn) + .set_import_arn(inner_input.r#import_arn) .send() .await }) @@ -412,17 +412,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_import::_describe_import_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_import::to_dafny_error) } - fn DescribeKinesisStreamingDestination(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeKinesisStreamingDestination(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_kinesis_streaming_destination::_describe_kinesis_streaming_destination_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_kinesis_streaming_destination() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -431,10 +431,10 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_kinesis_streaming_destination::_describe_kinesis_streaming_destination_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_kinesis_streaming_destination::to_dafny_error) } - fn DescribeLimits(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeLimits(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_limits::_describe_limits_request::from_dafny(input.clone()); @@ -450,17 +450,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_limits::_describe_limits_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_limits::to_dafny_error) } - fn DescribeTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_table::_describe_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_table() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -469,17 +469,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_table::_describe_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_table::to_dafny_error) } - fn DescribeTableReplicaAutoScaling(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeTableReplicaAutoScaling(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_table_replica_auto_scaling::_describe_table_replica_auto_scaling_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_table_replica_auto_scaling() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -488,17 +488,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_table_replica_auto_scaling::_describe_table_replica_auto_scaling_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_table_replica_auto_scaling::to_dafny_error) } - fn DescribeTimeToLive(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DescribeTimeToLive(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::describe_time_to_live::_describe_time_to_live_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.describe_time_to_live() - .set_table_name(inner_input.table_name) + .set_table_name(inner_input.r#table_name) .send() .await }) @@ -507,19 +507,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::describe_time_to_live::_describe_time_to_live_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::describe_time_to_live::to_dafny_error) } - fn DisableKinesisStreamingDestination(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn DisableKinesisStreamingDestination(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::disable_kinesis_streaming_destination::_disable_kinesis_streaming_destination_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.disable_kinesis_streaming_destination() - .set_table_name(inner_input.table_name) -.set_stream_arn(inner_input.stream_arn) -.set_enable_kinesis_streaming_configuration(inner_input.enable_kinesis_streaming_configuration) + .set_table_name(inner_input.r#table_name) +.set_stream_arn(inner_input.r#stream_arn) +.set_enable_kinesis_streaming_configuration(inner_input.r#enable_kinesis_streaming_configuration) .send() .await }) @@ -528,19 +528,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::disable_kinesis_streaming_destination::_disable_kinesis_streaming_destination_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::disable_kinesis_streaming_destination::to_dafny_error) } - fn EnableKinesisStreamingDestination(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn EnableKinesisStreamingDestination(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_destination::_enable_kinesis_streaming_destination_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.enable_kinesis_streaming_destination() - .set_table_name(inner_input.table_name) -.set_stream_arn(inner_input.stream_arn) -.set_enable_kinesis_streaming_configuration(inner_input.enable_kinesis_streaming_configuration) + .set_table_name(inner_input.r#table_name) +.set_stream_arn(inner_input.r#stream_arn) +.set_enable_kinesis_streaming_configuration(inner_input.r#enable_kinesis_streaming_configuration) .send() .await }) @@ -549,22 +549,22 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_destination::_enable_kinesis_streaming_destination_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_destination::to_dafny_error) } - fn ExecuteStatement(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ExecuteStatement(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.execute_statement() - .set_statement(inner_input.statement) -.set_parameters(inner_input.parameters) -.set_consistent_read(inner_input.consistent_read) -.set_next_token(inner_input.next_token) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_limit(inner_input.limit) + .set_statement(inner_input.r#statement) +.set_parameters(inner_input.r#parameters) +.set_consistent_read(inner_input.r#consistent_read) +.set_next_token(inner_input.r#next_token) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_limit(inner_input.r#limit) .send() .await }) @@ -573,19 +573,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::_execute_statement_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::execute_statement::to_dafny_error) } - fn ExecuteTransaction(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ExecuteTransaction(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.execute_transaction() - .set_transact_statements(inner_input.transact_statements) -.set_client_request_token(inner_input.client_request_token) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) + .set_transact_statements(inner_input.r#transact_statements) +.set_client_request_token(inner_input.r#client_request_token) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) .send() .await }) @@ -594,27 +594,27 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::_execute_transaction_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::execute_transaction::to_dafny_error) } - fn ExportTableToPointInTime(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ExportTableToPointInTime(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::export_table_to_point_in_time::_export_table_to_point_in_time_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.export_table_to_point_in_time() - .set_table_arn(inner_input.table_arn) -.set_export_time(inner_input.export_time) -.set_client_token(inner_input.client_token) -.set_s3_bucket(inner_input.s3_bucket) -.set_s3_bucket_owner(inner_input.s3_bucket_owner) -.set_s3_prefix(inner_input.s3_prefix) -.set_s3_sse_algorithm(inner_input.s3_sse_algorithm) -.set_s3_sse_kms_key_id(inner_input.s3_sse_kms_key_id) -.set_export_format(inner_input.export_format) -.set_export_type(inner_input.export_type) -.set_incremental_export_specification(inner_input.incremental_export_specification) + .set_table_arn(inner_input.r#table_arn) +.set_export_time(inner_input.r#export_time) +.set_client_token(inner_input.r#client_token) +.set_s3_bucket(inner_input.r#s3_bucket) +.set_s3_bucket_owner(inner_input.r#s3_bucket_owner) +.set_s3_prefix(inner_input.r#s3_prefix) +.set_s3_sse_algorithm(inner_input.r#s3_sse_algorithm) +.set_s3_sse_kms_key_id(inner_input.r#s3_sse_kms_key_id) +.set_export_format(inner_input.r#export_format) +.set_export_type(inner_input.r#export_type) +.set_incremental_export_specification(inner_input.r#incremental_export_specification) .send() .await }) @@ -623,23 +623,23 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::export_table_to_point_in_time::_export_table_to_point_in_time_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::export_table_to_point_in_time::to_dafny_error) } - fn GetItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn GetItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.get_item() - .set_table_name(inner_input.table_name) -.set_key(inner_input.key) -.set_attributes_to_get(inner_input.attributes_to_get) -.set_consistent_read(inner_input.consistent_read) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_projection_expression(inner_input.projection_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) + .set_table_name(inner_input.r#table_name) +.set_key(inner_input.r#key) +.set_attributes_to_get(inner_input.r#attributes_to_get) +.set_consistent_read(inner_input.r#consistent_read) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_projection_expression(inner_input.r#projection_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) .send() .await }) @@ -648,17 +648,17 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::get_item::_get_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::get_item::to_dafny_error) } - fn GetResourcePolicy(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn GetResourcePolicy(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::get_resource_policy::_get_resource_policy_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.get_resource_policy() - .set_resource_arn(inner_input.resource_arn) + .set_resource_arn(inner_input.r#resource_arn) .send() .await }) @@ -667,22 +667,22 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::get_resource_policy::_get_resource_policy_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::get_resource_policy::to_dafny_error) } - fn ImportTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ImportTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::import_table::_import_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.import_table() - .set_client_token(inner_input.client_token) -.set_s3_bucket_source(inner_input.s3_bucket_source) -.set_input_format(inner_input.input_format) -.set_input_format_options(inner_input.input_format_options) -.set_input_compression_type(inner_input.input_compression_type) -.set_table_creation_parameters(inner_input.table_creation_parameters) + .set_client_token(inner_input.r#client_token) +.set_s3_bucket_source(inner_input.r#s3_bucket_source) +.set_input_format(inner_input.r#input_format) +.set_input_format_options(inner_input.r#input_format_options) +.set_input_compression_type(inner_input.r#input_compression_type) +.set_table_creation_parameters(inner_input.r#table_creation_parameters) .send() .await }) @@ -691,22 +691,22 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::import_table::_import_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::import_table::to_dafny_error) } - fn ListBackups(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListBackups(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_backups::_list_backups_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_backups() - .set_table_name(inner_input.table_name) -.set_limit(inner_input.limit) -.set_time_range_lower_bound(inner_input.time_range_lower_bound) -.set_time_range_upper_bound(inner_input.time_range_upper_bound) -.set_exclusive_start_backup_arn(inner_input.exclusive_start_backup_arn) -.set_backup_type(inner_input.backup_type) + .set_table_name(inner_input.r#table_name) +.set_limit(inner_input.r#limit) +.set_time_range_lower_bound(inner_input.r#time_range_lower_bound) +.set_time_range_upper_bound(inner_input.r#time_range_upper_bound) +.set_exclusive_start_backup_arn(inner_input.r#exclusive_start_backup_arn) +.set_backup_type(inner_input.r#backup_type) .send() .await }) @@ -715,19 +715,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_backups::_list_backups_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_backups::to_dafny_error) } - fn ListContributorInsights(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListContributorInsights(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_contributor_insights::_list_contributor_insights_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_contributor_insights() - .set_table_name(inner_input.table_name) -.set_next_token(inner_input.next_token) -.set_max_results(inner_input.max_results) + .set_table_name(inner_input.r#table_name) +.set_next_token(inner_input.r#next_token) +.set_max_results(inner_input.r#max_results) .send() .await }) @@ -736,19 +736,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_contributor_insights::_list_contributor_insights_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_contributor_insights::to_dafny_error) } - fn ListExports(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListExports(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_exports::_list_exports_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_exports() - .set_table_arn(inner_input.table_arn) -.set_max_results(inner_input.max_results) -.set_next_token(inner_input.next_token) + .set_table_arn(inner_input.r#table_arn) +.set_max_results(inner_input.r#max_results) +.set_next_token(inner_input.r#next_token) .send() .await }) @@ -757,19 +757,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_exports::_list_exports_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_exports::to_dafny_error) } - fn ListGlobalTables(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListGlobalTables(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_global_tables::_list_global_tables_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_global_tables() - .set_exclusive_start_global_table_name(inner_input.exclusive_start_global_table_name) -.set_limit(inner_input.limit) -.set_region_name(inner_input.region_name) + .set_exclusive_start_global_table_name(inner_input.r#exclusive_start_global_table_name) +.set_limit(inner_input.r#limit) +.set_region_name(inner_input.r#region_name) .send() .await }) @@ -778,19 +778,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_global_tables::_list_global_tables_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_global_tables::to_dafny_error) } - fn ListImports(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListImports(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_imports::_list_imports_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_imports() - .set_table_arn(inner_input.table_arn) -.set_page_size(inner_input.page_size) -.set_next_token(inner_input.next_token) + .set_table_arn(inner_input.r#table_arn) +.set_page_size(inner_input.r#page_size) +.set_next_token(inner_input.r#next_token) .send() .await }) @@ -799,18 +799,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_imports::_list_imports_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_imports::to_dafny_error) } - fn ListTables(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListTables(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_tables::_list_tables_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_tables() - .set_exclusive_start_table_name(inner_input.exclusive_start_table_name) -.set_limit(inner_input.limit) + .set_exclusive_start_table_name(inner_input.r#exclusive_start_table_name) +.set_limit(inner_input.r#limit) .send() .await }) @@ -819,18 +819,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_tables::_list_tables_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_tables::to_dafny_error) } - fn ListTagsOfResource(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn ListTagsOfResource(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::list_tags_of_resource::_list_tags_of_resource_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.list_tags_of_resource() - .set_resource_arn(inner_input.resource_arn) -.set_next_token(inner_input.next_token) + .set_resource_arn(inner_input.r#resource_arn) +.set_next_token(inner_input.r#next_token) .send() .await }) @@ -839,26 +839,26 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::list_tags_of_resource::_list_tags_of_resource_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::list_tags_of_resource::to_dafny_error) } - fn PutItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn PutItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.put_item() - .set_table_name(inner_input.table_name) -.set_item(inner_input.item) -.set_expected(inner_input.expected) -.set_return_values(inner_input.return_values) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_return_item_collection_metrics(inner_input.return_item_collection_metrics) -.set_conditional_operator(inner_input.conditional_operator) -.set_condition_expression(inner_input.condition_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) -.set_expression_attribute_values(inner_input.expression_attribute_values) + .set_table_name(inner_input.r#table_name) +.set_item(inner_input.r#item) +.set_expected(inner_input.r#expected) +.set_return_values(inner_input.r#return_values) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_return_item_collection_metrics(inner_input.r#return_item_collection_metrics) +.set_conditional_operator(inner_input.r#conditional_operator) +.set_condition_expression(inner_input.r#condition_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) +.set_expression_attribute_values(inner_input.r#expression_attribute_values) .send() .await }) @@ -867,20 +867,20 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::put_item::_put_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::put_item::to_dafny_error) } - fn PutResourcePolicy(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn PutResourcePolicy(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::put_resource_policy::_put_resource_policy_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.put_resource_policy() - .set_resource_arn(inner_input.resource_arn) -.set_policy(inner_input.policy) -.set_expected_revision_id(inner_input.expected_revision_id) -.set_confirm_remove_self_resource_access(inner_input.confirm_remove_self_resource_access) + .set_resource_arn(inner_input.r#resource_arn) +.set_policy(inner_input.r#policy) +.set_expected_revision_id(inner_input.r#expected_revision_id) +.set_confirm_remove_self_resource_access(inner_input.r#confirm_remove_self_resource_access) .send() .await }) @@ -889,33 +889,33 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::put_resource_policy::_put_resource_policy_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::put_resource_policy::to_dafny_error) } - fn Query(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn Query(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::query::_query_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.query() - .set_table_name(inner_input.table_name) -.set_index_name(inner_input.index_name) -.set_select(inner_input.select) -.set_attributes_to_get(inner_input.attributes_to_get) -.set_limit(inner_input.limit) -.set_consistent_read(inner_input.consistent_read) -.set_key_conditions(inner_input.key_conditions) -.set_query_filter(inner_input.query_filter) -.set_conditional_operator(inner_input.conditional_operator) -.set_scan_index_forward(inner_input.scan_index_forward) -.set_exclusive_start_key(inner_input.exclusive_start_key) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_projection_expression(inner_input.projection_expression) -.set_filter_expression(inner_input.filter_expression) -.set_key_condition_expression(inner_input.key_condition_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) -.set_expression_attribute_values(inner_input.expression_attribute_values) + .set_table_name(inner_input.r#table_name) +.set_index_name(inner_input.r#index_name) +.set_select(inner_input.r#select) +.set_attributes_to_get(inner_input.r#attributes_to_get) +.set_limit(inner_input.r#limit) +.set_consistent_read(inner_input.r#consistent_read) +.set_key_conditions(inner_input.r#key_conditions) +.set_query_filter(inner_input.r#query_filter) +.set_conditional_operator(inner_input.r#conditional_operator) +.set_scan_index_forward(inner_input.r#scan_index_forward) +.set_exclusive_start_key(inner_input.r#exclusive_start_key) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_projection_expression(inner_input.r#projection_expression) +.set_filter_expression(inner_input.r#filter_expression) +.set_key_condition_expression(inner_input.r#key_condition_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) +.set_expression_attribute_values(inner_input.r#expression_attribute_values) .send() .await }) @@ -924,24 +924,24 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::query::_query_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::query::to_dafny_error) } - fn RestoreTableFromBackup(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn RestoreTableFromBackup(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::restore_table_from_backup::_restore_table_from_backup_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.restore_table_from_backup() - .set_target_table_name(inner_input.target_table_name) -.set_backup_arn(inner_input.backup_arn) -.set_billing_mode_override(inner_input.billing_mode_override) -.set_global_secondary_index_override(inner_input.global_secondary_index_override) -.set_local_secondary_index_override(inner_input.local_secondary_index_override) -.set_provisioned_throughput_override(inner_input.provisioned_throughput_override) -.set_on_demand_throughput_override(inner_input.on_demand_throughput_override) -.set_sse_specification_override(inner_input.sse_specification_override) + .set_target_table_name(inner_input.r#target_table_name) +.set_backup_arn(inner_input.r#backup_arn) +.set_billing_mode_override(inner_input.r#billing_mode_override) +.set_global_secondary_index_override(inner_input.r#global_secondary_index_override) +.set_local_secondary_index_override(inner_input.r#local_secondary_index_override) +.set_provisioned_throughput_override(inner_input.r#provisioned_throughput_override) +.set_on_demand_throughput_override(inner_input.r#on_demand_throughput_override) +.set_sse_specification_override(inner_input.r#sse_specification_override) .send() .await }) @@ -950,27 +950,27 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::restore_table_from_backup::_restore_table_from_backup_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::restore_table_from_backup::to_dafny_error) } - fn RestoreTableToPointInTime(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn RestoreTableToPointInTime(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::restore_table_to_point_in_time::_restore_table_to_point_in_time_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.restore_table_to_point_in_time() - .set_source_table_arn(inner_input.source_table_arn) -.set_source_table_name(inner_input.source_table_name) -.set_target_table_name(inner_input.target_table_name) -.set_use_latest_restorable_time(inner_input.use_latest_restorable_time) -.set_restore_date_time(inner_input.restore_date_time) -.set_billing_mode_override(inner_input.billing_mode_override) -.set_global_secondary_index_override(inner_input.global_secondary_index_override) -.set_local_secondary_index_override(inner_input.local_secondary_index_override) -.set_provisioned_throughput_override(inner_input.provisioned_throughput_override) -.set_on_demand_throughput_override(inner_input.on_demand_throughput_override) -.set_sse_specification_override(inner_input.sse_specification_override) + .set_source_table_arn(inner_input.r#source_table_arn) +.set_source_table_name(inner_input.r#source_table_name) +.set_target_table_name(inner_input.r#target_table_name) +.set_use_latest_restorable_time(inner_input.r#use_latest_restorable_time) +.set_restore_date_time(inner_input.r#restore_date_time) +.set_billing_mode_override(inner_input.r#billing_mode_override) +.set_global_secondary_index_override(inner_input.r#global_secondary_index_override) +.set_local_secondary_index_override(inner_input.r#local_secondary_index_override) +.set_provisioned_throughput_override(inner_input.r#provisioned_throughput_override) +.set_on_demand_throughput_override(inner_input.r#on_demand_throughput_override) +.set_sse_specification_override(inner_input.r#sse_specification_override) .send() .await }) @@ -979,32 +979,32 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::restore_table_to_point_in_time::_restore_table_to_point_in_time_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::restore_table_to_point_in_time::to_dafny_error) } - fn Scan(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn Scan(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.scan() - .set_table_name(inner_input.table_name) -.set_index_name(inner_input.index_name) -.set_attributes_to_get(inner_input.attributes_to_get) -.set_limit(inner_input.limit) -.set_select(inner_input.select) -.set_scan_filter(inner_input.scan_filter) -.set_conditional_operator(inner_input.conditional_operator) -.set_exclusive_start_key(inner_input.exclusive_start_key) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_total_segments(inner_input.total_segments) -.set_segment(inner_input.segment) -.set_projection_expression(inner_input.projection_expression) -.set_filter_expression(inner_input.filter_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) -.set_expression_attribute_values(inner_input.expression_attribute_values) -.set_consistent_read(inner_input.consistent_read) + .set_table_name(inner_input.r#table_name) +.set_index_name(inner_input.r#index_name) +.set_attributes_to_get(inner_input.r#attributes_to_get) +.set_limit(inner_input.r#limit) +.set_select(inner_input.r#select) +.set_scan_filter(inner_input.r#scan_filter) +.set_conditional_operator(inner_input.r#conditional_operator) +.set_exclusive_start_key(inner_input.r#exclusive_start_key) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_total_segments(inner_input.r#total_segments) +.set_segment(inner_input.r#segment) +.set_projection_expression(inner_input.r#projection_expression) +.set_filter_expression(inner_input.r#filter_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) +.set_expression_attribute_values(inner_input.r#expression_attribute_values) +.set_consistent_read(inner_input.r#consistent_read) .send() .await }) @@ -1013,18 +1013,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::scan::_scan_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::scan::to_dafny_error) } - fn TagResource(&self, input: &std::rc::Rc) - -> std::rc::Rc) + -> dafny_runtime::Rc + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::tag_resource::_tag_resource_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.tag_resource() - .set_resource_arn(inner_input.resource_arn) -.set_tags(inner_input.tags) + .set_resource_arn(inner_input.r#resource_arn) +.set_tags(inner_input.r#tags) .send() .await }) @@ -1033,18 +1033,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: |x| (), crate::deps::com_amazonaws_dynamodb::conversions::tag_resource::to_dafny_error) } - fn TransactGetItems(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn TransactGetItems(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.transact_get_items() - .set_transact_items(inner_input.transact_items) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) + .set_transact_items(inner_input.r#transact_items) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) .send() .await }) @@ -1053,20 +1053,20 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::_transact_get_items_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::transact_get_items::to_dafny_error) } - fn TransactWriteItems(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn TransactWriteItems(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.transact_write_items() - .set_transact_items(inner_input.transact_items) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_return_item_collection_metrics(inner_input.return_item_collection_metrics) -.set_client_request_token(inner_input.client_request_token) + .set_transact_items(inner_input.r#transact_items) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_return_item_collection_metrics(inner_input.r#return_item_collection_metrics) +.set_client_request_token(inner_input.r#client_request_token) .send() .await }) @@ -1075,18 +1075,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::_transact_write_items_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::transact_write_items::to_dafny_error) } - fn UntagResource(&self, input: &std::rc::Rc) - -> std::rc::Rc) + -> dafny_runtime::Rc + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::untag_resource::_untag_resource_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.untag_resource() - .set_resource_arn(inner_input.resource_arn) -.set_tag_keys(inner_input.tag_keys) + .set_resource_arn(inner_input.r#resource_arn) +.set_tag_keys(inner_input.r#tag_keys) .send() .await }) @@ -1095,18 +1095,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: |x| (), crate::deps::com_amazonaws_dynamodb::conversions::untag_resource::to_dafny_error) } - fn UpdateContinuousBackups(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateContinuousBackups(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_continuous_backups::_update_continuous_backups_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_continuous_backups() - .set_table_name(inner_input.table_name) -.set_point_in_time_recovery_specification(inner_input.point_in_time_recovery_specification) + .set_table_name(inner_input.r#table_name) +.set_point_in_time_recovery_specification(inner_input.r#point_in_time_recovery_specification) .send() .await }) @@ -1115,19 +1115,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_continuous_backups::_update_continuous_backups_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_continuous_backups::to_dafny_error) } - fn UpdateContributorInsights(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateContributorInsights(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_contributor_insights::_update_contributor_insights_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_contributor_insights() - .set_table_name(inner_input.table_name) -.set_index_name(inner_input.index_name) -.set_contributor_insights_action(inner_input.contributor_insights_action) + .set_table_name(inner_input.r#table_name) +.set_index_name(inner_input.r#index_name) +.set_contributor_insights_action(inner_input.r#contributor_insights_action) .send() .await }) @@ -1136,18 +1136,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_contributor_insights::_update_contributor_insights_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_contributor_insights::to_dafny_error) } - fn UpdateGlobalTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateGlobalTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_global_table::_update_global_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_global_table() - .set_global_table_name(inner_input.global_table_name) -.set_replica_updates(inner_input.replica_updates) + .set_global_table_name(inner_input.r#global_table_name) +.set_replica_updates(inner_input.r#replica_updates) .send() .await }) @@ -1156,22 +1156,22 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_global_table::_update_global_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_global_table::to_dafny_error) } - fn UpdateGlobalTableSettings(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateGlobalTableSettings(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_global_table_settings::_update_global_table_settings_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_global_table_settings() - .set_global_table_name(inner_input.global_table_name) -.set_global_table_billing_mode(inner_input.global_table_billing_mode) -.set_global_table_provisioned_write_capacity_units(inner_input.global_table_provisioned_write_capacity_units) -.set_global_table_provisioned_write_capacity_auto_scaling_settings_update(inner_input.global_table_provisioned_write_capacity_auto_scaling_settings_update) -.set_global_table_global_secondary_index_settings_update(inner_input.global_table_global_secondary_index_settings_update) -.set_replica_settings_update(inner_input.replica_settings_update) + .set_global_table_name(inner_input.r#global_table_name) +.set_global_table_billing_mode(inner_input.r#global_table_billing_mode) +.set_global_table_provisioned_write_capacity_units(inner_input.r#global_table_provisioned_write_capacity_units) +.set_global_table_provisioned_write_capacity_auto_scaling_settings_update(inner_input.r#global_table_provisioned_write_capacity_auto_scaling_settings_update) +.set_global_table_global_secondary_index_settings_update(inner_input.r#global_table_global_secondary_index_settings_update) +.set_replica_settings_update(inner_input.r#replica_settings_update) .send() .await }) @@ -1180,28 +1180,28 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_global_table_settings::_update_global_table_settings_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_global_table_settings::to_dafny_error) } - fn UpdateItem(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateItem(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_item() - .set_table_name(inner_input.table_name) -.set_key(inner_input.key) -.set_attribute_updates(inner_input.attribute_updates) -.set_expected(inner_input.expected) -.set_conditional_operator(inner_input.conditional_operator) -.set_return_values(inner_input.return_values) -.set_return_consumed_capacity(inner_input.return_consumed_capacity) -.set_return_item_collection_metrics(inner_input.return_item_collection_metrics) -.set_update_expression(inner_input.update_expression) -.set_condition_expression(inner_input.condition_expression) -.set_expression_attribute_names(inner_input.expression_attribute_names) -.set_expression_attribute_values(inner_input.expression_attribute_values) + .set_table_name(inner_input.r#table_name) +.set_key(inner_input.r#key) +.set_attribute_updates(inner_input.r#attribute_updates) +.set_expected(inner_input.r#expected) +.set_conditional_operator(inner_input.r#conditional_operator) +.set_return_values(inner_input.r#return_values) +.set_return_consumed_capacity(inner_input.r#return_consumed_capacity) +.set_return_item_collection_metrics(inner_input.r#return_item_collection_metrics) +.set_update_expression(inner_input.r#update_expression) +.set_condition_expression(inner_input.r#condition_expression) +.set_expression_attribute_names(inner_input.r#expression_attribute_names) +.set_expression_attribute_values(inner_input.r#expression_attribute_values) .send() .await }) @@ -1210,19 +1210,19 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_item::_update_item_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_item::to_dafny_error) } - fn UpdateKinesisStreamingDestination(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateKinesisStreamingDestination(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_kinesis_streaming_destination::_update_kinesis_streaming_destination_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_kinesis_streaming_destination() - .set_table_name(inner_input.table_name) -.set_stream_arn(inner_input.stream_arn) -.set_update_kinesis_streaming_configuration(inner_input.update_kinesis_streaming_configuration) + .set_table_name(inner_input.r#table_name) +.set_stream_arn(inner_input.r#stream_arn) +.set_update_kinesis_streaming_configuration(inner_input.r#update_kinesis_streaming_configuration) .send() .await }) @@ -1231,27 +1231,27 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_kinesis_streaming_destination::_update_kinesis_streaming_destination_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_kinesis_streaming_destination::to_dafny_error) } - fn UpdateTable(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateTable(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_table::_update_table_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_table() - .set_attribute_definitions(inner_input.attribute_definitions) -.set_table_name(inner_input.table_name) -.set_billing_mode(inner_input.billing_mode) -.set_provisioned_throughput(inner_input.provisioned_throughput) -.set_global_secondary_index_updates(inner_input.global_secondary_index_updates) -.set_stream_specification(inner_input.stream_specification) -.set_sse_specification(inner_input.sse_specification) -.set_replica_updates(inner_input.replica_updates) -.set_table_class(inner_input.table_class) -.set_deletion_protection_enabled(inner_input.deletion_protection_enabled) -.set_on_demand_throughput(inner_input.on_demand_throughput) + .set_attribute_definitions(inner_input.r#attribute_definitions) +.set_table_name(inner_input.r#table_name) +.set_billing_mode(inner_input.r#billing_mode) +.set_provisioned_throughput(inner_input.r#provisioned_throughput) +.set_global_secondary_index_updates(inner_input.r#global_secondary_index_updates) +.set_stream_specification(inner_input.r#stream_specification) +.set_sse_specification(inner_input.r#sse_specification) +.set_replica_updates(inner_input.r#replica_updates) +.set_table_class(inner_input.r#table_class) +.set_deletion_protection_enabled(inner_input.r#deletion_protection_enabled) +.set_on_demand_throughput(inner_input.r#on_demand_throughput) .send() .await }) @@ -1260,20 +1260,20 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_table::_update_table_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_table::to_dafny_error) } - fn UpdateTableReplicaAutoScaling(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateTableReplicaAutoScaling(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_table_replica_auto_scaling::_update_table_replica_auto_scaling_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_table_replica_auto_scaling() - .set_global_secondary_index_updates(inner_input.global_secondary_index_updates) -.set_table_name(inner_input.table_name) -.set_provisioned_write_capacity_auto_scaling_update(inner_input.provisioned_write_capacity_auto_scaling_update) -.set_replica_updates(inner_input.replica_updates) + .set_global_secondary_index_updates(inner_input.r#global_secondary_index_updates) +.set_table_name(inner_input.r#table_name) +.set_provisioned_write_capacity_auto_scaling_update(inner_input.r#provisioned_write_capacity_auto_scaling_update) +.set_replica_updates(inner_input.r#replica_updates) .send() .await }) @@ -1282,18 +1282,18 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_table_replica_auto_scaling::_update_table_replica_auto_scaling_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_table_replica_auto_scaling::to_dafny_error) } - fn UpdateTimeToLive(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + fn UpdateTimeToLive(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > > { let inner_input = crate::deps::com_amazonaws_dynamodb::conversions::update_time_to_live::_update_time_to_live_request::from_dafny(input.clone()); let native_result = tokio::task::block_in_place(|| { dafny_tokio_runtime.block_on(async { self.inner.update_time_to_live() - .set_table_name(inner_input.table_name) -.set_time_to_live_specification(inner_input.time_to_live_specification) + .set_table_name(inner_input.r#table_name) +.set_time_to_live_specification(inner_input.r#time_to_live_specification) .send() .await }) @@ -1302,4 +1302,4 @@ impl crate::r#software::amazon::cryptography::services::dynamodb::internaldafny: crate::deps::com_amazonaws_dynamodb::conversions::update_time_to_live::_update_time_to_live_response::to_dafny, crate::deps::com_amazonaws_dynamodb::conversions::update_time_to_live::to_dafny_error) } -} +} diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions.rs index 366cd7989..e9ebef5a9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions.rs @@ -3,408 +3,408 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod approximate_creation_date_time_precision; - pub mod archival_summary; +pub mod archival_summary; - pub mod attribute_action; +pub mod attribute_action; - pub mod attribute_definition; +pub mod attribute_definition; - pub mod attribute_value; +pub mod attribute_value; - pub mod attribute_value_update; +pub mod attribute_value_update; - pub mod auto_scaling_policy_description; +pub mod auto_scaling_policy_description; - pub mod auto_scaling_policy_update; +pub mod auto_scaling_policy_update; - pub mod auto_scaling_settings_description; +pub mod auto_scaling_settings_description; - pub mod auto_scaling_settings_update; +pub mod auto_scaling_settings_update; - pub mod auto_scaling_target_tracking_scaling_policy_configuration_description; +pub mod auto_scaling_target_tracking_scaling_policy_configuration_description; - pub mod auto_scaling_target_tracking_scaling_policy_configuration_update; +pub mod auto_scaling_target_tracking_scaling_policy_configuration_update; - pub mod backup_description; +pub mod backup_description; - pub mod backup_details; +pub mod backup_details; - pub mod backup_status; +pub mod backup_status; - pub mod backup_summary; +pub mod backup_summary; - pub mod backup_type; +pub mod backup_type; - pub mod backup_type_filter; +pub mod backup_type_filter; - pub mod batch_execute_statement; +pub mod batch_execute_statement; - pub mod batch_get_item; +pub mod batch_get_item; - pub mod batch_statement_error; +pub mod batch_statement_error; - pub mod batch_statement_error_code_enum; +pub mod batch_statement_error_code_enum; - pub mod batch_statement_request; +pub mod batch_statement_request; - pub mod batch_statement_response; +pub mod batch_statement_response; - pub mod batch_write_item; +pub mod batch_write_item; - pub mod billing_mode; +pub mod billing_mode; - pub mod billing_mode_summary; +pub mod billing_mode_summary; - pub mod cancellation_reason; +pub mod cancellation_reason; - pub mod capacity; +pub mod capacity; - pub mod client; +pub mod client; - pub mod comparison_operator; +pub mod comparison_operator; - pub mod condition; +pub mod condition; - pub mod condition_check; +pub mod condition_check; - pub mod conditional_operator; +pub mod conditional_operator; - pub mod consumed_capacity; +pub mod consumed_capacity; - pub mod continuous_backups_description; +pub mod continuous_backups_description; - pub mod continuous_backups_status; +pub mod continuous_backups_status; - pub mod contributor_insights_action; +pub mod contributor_insights_action; - pub mod contributor_insights_status; +pub mod contributor_insights_status; - pub mod contributor_insights_summary; +pub mod contributor_insights_summary; - pub mod create_backup; +pub mod create_backup; - pub mod create_global_secondary_index_action; +pub mod create_global_secondary_index_action; - pub mod create_global_table; +pub mod create_global_table; - pub mod create_replica_action; +pub mod create_replica_action; - pub mod create_replication_group_member_action; +pub mod create_replication_group_member_action; - pub mod create_table; +pub mod create_table; - pub mod csv_options; +pub mod csv_options; - pub mod delete; +pub mod delete; - pub mod delete_backup; +pub mod delete_backup; - pub mod delete_global_secondary_index_action; +pub mod delete_global_secondary_index_action; - pub mod delete_item; +pub mod delete_item; - pub mod delete_replica_action; +pub mod delete_replica_action; - pub mod delete_replication_group_member_action; +pub mod delete_replication_group_member_action; - pub mod delete_request; +pub mod delete_request; - pub mod delete_resource_policy; +pub mod delete_resource_policy; - pub mod delete_table; +pub mod delete_table; - pub mod describe_backup; +pub mod describe_backup; - pub mod describe_continuous_backups; +pub mod describe_continuous_backups; - pub mod describe_contributor_insights; +pub mod describe_contributor_insights; - pub mod describe_endpoints; +pub mod describe_endpoints; - pub mod describe_export; +pub mod describe_export; - pub mod describe_global_table; +pub mod describe_global_table; - pub mod describe_global_table_settings; +pub mod describe_global_table_settings; - pub mod describe_import; +pub mod describe_import; - pub mod describe_kinesis_streaming_destination; +pub mod describe_kinesis_streaming_destination; - pub mod describe_limits; +pub mod describe_limits; - pub mod describe_table; +pub mod describe_table; - pub mod describe_table_replica_auto_scaling; +pub mod describe_table_replica_auto_scaling; - pub mod describe_time_to_live; +pub mod describe_time_to_live; - pub mod destination_status; +pub mod destination_status; - pub mod disable_kinesis_streaming_destination; +pub mod disable_kinesis_streaming_destination; - pub mod enable_kinesis_streaming_configuration; +pub mod enable_kinesis_streaming_configuration; - pub mod enable_kinesis_streaming_destination; +pub mod enable_kinesis_streaming_destination; - pub mod endpoint; +pub mod endpoint; - pub mod error; +pub mod error; - pub mod execute_statement; +pub mod execute_statement; - pub mod execute_transaction; +pub mod execute_transaction; - pub mod expected_attribute_value; +pub mod expected_attribute_value; - pub mod export_description; +pub mod export_description; - pub mod export_format; +pub mod export_format; - pub mod export_status; +pub mod export_status; - pub mod export_summary; +pub mod export_summary; - pub mod export_table_to_point_in_time; +pub mod export_table_to_point_in_time; - pub mod export_type; +pub mod export_type; - pub mod export_view_type; +pub mod export_view_type; - pub mod failure_exception; +pub mod failure_exception; - pub mod get; +pub mod get; - pub mod get_item; +pub mod get_item; - pub mod get_resource_policy; +pub mod get_resource_policy; - pub mod global_secondary_index; +pub mod global_secondary_index; - pub mod global_secondary_index_auto_scaling_update; +pub mod global_secondary_index_auto_scaling_update; - pub mod global_secondary_index_description; +pub mod global_secondary_index_description; - pub mod global_secondary_index_info; +pub mod global_secondary_index_info; - pub mod global_secondary_index_update; +pub mod global_secondary_index_update; - pub mod global_table; +pub mod global_table; - pub mod global_table_description; +pub mod global_table_description; - pub mod global_table_global_secondary_index_settings_update; +pub mod global_table_global_secondary_index_settings_update; - pub mod global_table_status; +pub mod global_table_status; - pub mod import_status; +pub mod import_status; - pub mod import_summary; +pub mod import_summary; - pub mod import_table; +pub mod import_table; - pub mod import_table_description; +pub mod import_table_description; - pub mod incremental_export_specification; +pub mod incremental_export_specification; - pub mod index_status; +pub mod index_status; - pub mod input_compression_type; +pub mod input_compression_type; - pub mod input_format; +pub mod input_format; - pub mod input_format_options; +pub mod input_format_options; - pub mod item_collection_metrics; +pub mod item_collection_metrics; - pub mod item_response; +pub mod item_response; - pub mod key_schema_element; +pub mod key_schema_element; - pub mod key_type; +pub mod key_type; - pub mod keys_and_attributes; +pub mod keys_and_attributes; - pub mod kinesis_data_stream_destination; +pub mod kinesis_data_stream_destination; - pub mod list_backups; +pub mod list_backups; - pub mod list_contributor_insights; +pub mod list_contributor_insights; - pub mod list_exports; +pub mod list_exports; - pub mod list_global_tables; +pub mod list_global_tables; - pub mod list_imports; +pub mod list_imports; - pub mod list_tables; +pub mod list_tables; - pub mod list_tags_of_resource; +pub mod list_tags_of_resource; - pub mod local_secondary_index; +pub mod local_secondary_index; - pub mod local_secondary_index_description; +pub mod local_secondary_index_description; - pub mod local_secondary_index_info; +pub mod local_secondary_index_info; - pub mod on_demand_throughput; +pub mod on_demand_throughput; - pub mod on_demand_throughput_override; +pub mod on_demand_throughput_override; - pub mod parameterized_statement; +pub mod parameterized_statement; - pub mod point_in_time_recovery_description; +pub mod point_in_time_recovery_description; - pub mod point_in_time_recovery_specification; +pub mod point_in_time_recovery_specification; - pub mod point_in_time_recovery_status; +pub mod point_in_time_recovery_status; - pub mod projection; +pub mod projection; - pub mod projection_type; +pub mod projection_type; - pub mod provisioned_throughput; +pub mod provisioned_throughput; - pub mod provisioned_throughput_description; +pub mod provisioned_throughput_description; - pub mod provisioned_throughput_override; +pub mod provisioned_throughput_override; - pub mod put; +pub mod put; - pub mod put_item; +pub mod put_item; - pub mod put_request; +pub mod put_request; - pub mod put_resource_policy; +pub mod put_resource_policy; - pub mod query; +pub mod query; - pub mod replica; +pub mod replica; - pub mod replica_auto_scaling_description; +pub mod replica_auto_scaling_description; - pub mod replica_auto_scaling_update; +pub mod replica_auto_scaling_update; - pub mod replica_description; +pub mod replica_description; - pub mod replica_global_secondary_index; +pub mod replica_global_secondary_index; - pub mod replica_global_secondary_index_auto_scaling_description; +pub mod replica_global_secondary_index_auto_scaling_description; - pub mod replica_global_secondary_index_auto_scaling_update; +pub mod replica_global_secondary_index_auto_scaling_update; - pub mod replica_global_secondary_index_description; +pub mod replica_global_secondary_index_description; - pub mod replica_global_secondary_index_settings_description; +pub mod replica_global_secondary_index_settings_description; - pub mod replica_global_secondary_index_settings_update; +pub mod replica_global_secondary_index_settings_update; - pub mod replica_settings_description; +pub mod replica_settings_description; - pub mod replica_settings_update; +pub mod replica_settings_update; - pub mod replica_status; +pub mod replica_status; - pub mod replica_update; +pub mod replica_update; - pub mod replication_group_update; +pub mod replication_group_update; - pub mod restore_summary; +pub mod restore_summary; - pub mod restore_table_from_backup; +pub mod restore_table_from_backup; - pub mod restore_table_to_point_in_time; +pub mod restore_table_to_point_in_time; - pub mod return_consumed_capacity; +pub mod return_consumed_capacity; - pub mod return_item_collection_metrics; +pub mod return_item_collection_metrics; - pub mod return_value; +pub mod return_value; - pub mod return_values_on_condition_check_failure; +pub mod return_values_on_condition_check_failure; - pub mod s3_bucket_source; +pub mod s3_bucket_source; - pub mod s3_sse_algorithm; +pub mod s3_sse_algorithm; - pub mod scalar_attribute_type; +pub mod scalar_attribute_type; - pub mod scan; +pub mod scan; - pub mod select; +pub mod select; - pub mod source_table_details; +pub mod source_table_details; - pub mod source_table_feature_details; +pub mod source_table_feature_details; - pub mod sse_description; +pub mod sse_description; - pub mod sse_specification; +pub mod sse_specification; - pub mod sse_status; +pub mod sse_status; - pub mod sse_type; +pub mod sse_type; - pub mod stream_specification; +pub mod stream_specification; - pub mod stream_view_type; +pub mod stream_view_type; - pub mod table_auto_scaling_description; +pub mod table_auto_scaling_description; - pub mod table_class; +pub mod table_class; - pub mod table_class_summary; +pub mod table_class_summary; - pub mod table_creation_parameters; +pub mod table_creation_parameters; - pub mod table_description; +pub mod table_description; - pub mod table_status; +pub mod table_status; - pub mod tag; +pub mod tag; - pub mod tag_resource; +pub mod tag_resource; - pub mod time_to_live_description; +pub mod time_to_live_description; - pub mod time_to_live_specification; +pub mod time_to_live_specification; - pub mod time_to_live_status; +pub mod time_to_live_status; - pub mod transact_get_item; +pub mod transact_get_item; - pub mod transact_get_items; +pub mod transact_get_items; - pub mod transact_write_item; +pub mod transact_write_item; - pub mod transact_write_items; +pub mod transact_write_items; - pub mod untag_resource; +pub mod untag_resource; - pub mod update; +pub mod update; - pub mod update_continuous_backups; +pub mod update_continuous_backups; - pub mod update_contributor_insights; +pub mod update_contributor_insights; - pub mod update_global_secondary_index_action; +pub mod update_global_secondary_index_action; - pub mod update_global_table; +pub mod update_global_table; - pub mod update_global_table_settings; +pub mod update_global_table_settings; - pub mod update_item; +pub mod update_item; - pub mod update_kinesis_streaming_configuration; +pub mod update_kinesis_streaming_configuration; - pub mod update_kinesis_streaming_destination; +pub mod update_kinesis_streaming_destination; - pub mod update_replication_group_member_action; +pub mod update_replication_group_member_action; - pub mod update_table; +pub mod update_table; - pub mod update_table_replica_auto_scaling; +pub mod update_table_replica_auto_scaling; - pub mod update_time_to_live; +pub mod update_time_to_live; - pub mod write_request; +pub mod write_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/approximate_creation_date_time_precision.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/approximate_creation_date_time_precision.rs index f0b35c194..bc6dc588f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/approximate_creation_date_time_precision.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/approximate_creation_date_time_precision.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ApproximateCreationDateTimePrecision, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ApproximateCreationDateTimePrecision::Millisecond => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ApproximateCreationDateTimePrecision::MILLISECOND {}, aws_sdk_dynamodb::types::ApproximateCreationDateTimePrecision::Microsecond => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ApproximateCreationDateTimePrecision::MICROSECOND {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ApproximateCreationDateTimePrecision, ) -> aws_sdk_dynamodb::types::ApproximateCreationDateTimePrecision { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/archival_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/archival_summary.rs index 2bd909c7c..8376ef07d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/archival_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/archival_summary.rs @@ -4,24 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ArchivalSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ArchivalSummary::ArchivalSummary { ArchivalDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.archival_date_time), ArchivalReason: crate::standard_library_conversions::ostring_to_dafny(&value.archival_reason), ArchivalBackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.archival_backup_arn), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ArchivalSummary, >, ) -> aws_sdk_dynamodb::types::ArchivalSummary { aws_sdk_dynamodb::types::ArchivalSummary::builder() - .set_archival_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.ArchivalDateTime().clone())) - .set_archival_reason(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ArchivalReason().clone())) - .set_archival_backup_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ArchivalBackupArn().clone())) - .build() - + .set_archival_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.ArchivalDateTime().clone(), + )) + .set_archival_reason(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ArchivalReason().clone(), + )) + .set_archival_backup_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ArchivalBackupArn().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_action.rs index 86959a17b..19079a436 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_action.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::AttributeAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::AttributeAction::Add => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeAction::ADD {}, aws_sdk_dynamodb::types::AttributeAction::Put => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeAction::PUT {}, aws_sdk_dynamodb::types::AttributeAction::Delete => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeAction::DELETE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeAction, ) -> aws_sdk_dynamodb::types::AttributeAction { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_definition.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_definition.rs index 7237d688a..a9e8f2cea 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_definition.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_definition.rs @@ -4,22 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AttributeDefinition, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeDefinition::AttributeDefinition { AttributeName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.attribute_name), AttributeType: crate::deps::com_amazonaws_dynamodb::conversions::scalar_attribute_type::to_dafny(value.attribute_type.clone()), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeDefinition, >, ) -> aws_sdk_dynamodb::types::AttributeDefinition { aws_sdk_dynamodb::types::AttributeDefinition::builder() - .set_attribute_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AttributeName()) )) - .set_attribute_type(Some( crate::deps::com_amazonaws_dynamodb::conversions::scalar_attribute_type::from_dafny(dafny_value.AttributeType()) )) - .build() - .unwrap() + .set_attribute_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AttributeName(), + ), + )) + .set_attribute_type(Some( + crate::deps::com_amazonaws_dynamodb::conversions::scalar_attribute_type::from_dafny( + dafny_value.AttributeType(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value.rs index 07025b77c..e9cf05da5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AttributeValue, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue, -> { - ::std::rc::Rc::new(match value { +>{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::AttributeValue::S(x) => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue::S { S: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&x), @@ -72,11 +72,11 @@ aws_sdk_dynamodb::types::AttributeValue::Bool(x) => #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue, >, ) -> aws_sdk_dynamodb::types::AttributeValue { - match &::std::rc::Rc::unwrap_or_clone(dafny_value) { + match &::dafny_runtime::Rc::unwrap_or_clone(dafny_value) { crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue::S { S: x @ _, } => aws_sdk_dynamodb::types::AttributeValue::S(dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(x)), @@ -108,14 +108,14 @@ crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::type M: x @ _, } => aws_sdk_dynamodb::types::AttributeValue::M(::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&x, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue::L { L: x @ _, } => aws_sdk_dynamodb::types::AttributeValue::L(::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(x, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value_update.rs index 7c6274546..35604af7c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/attribute_value_update.rs @@ -4,41 +4,44 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AttributeValueUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValueUpdate::AttributeValueUpdate { - Value: ::std::rc::Rc::new(match &value.value { + Value: ::dafny_runtime::Rc::new(match &value.value { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Action: ::std::rc::Rc::new(match &value.action { + Action: ::dafny_runtime::Rc::new(match &value.action { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::attribute_action::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValueUpdate, >, ) -> aws_sdk_dynamodb::types::AttributeValueUpdate { aws_sdk_dynamodb::types::AttributeValueUpdate::builder() - .set_value(match (*dafny_value.Value()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(value.clone())), - _ => None, -} -) - .set_action(match &**dafny_value.Action() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::attribute_action::from_dafny(value) - ), - _ => None, -} -) - .build() - + .set_value(match (*dafny_value.Value()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .set_action(match &**dafny_value.Action() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::attribute_action::from_dafny( + value, + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_description.rs index b95482859..549d5a01d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_description.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingPolicyDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingPolicyDescription::AutoScalingPolicyDescription { PolicyName: crate::standard_library_conversions::ostring_to_dafny(&value.policy_name), - TargetTrackingScalingPolicyConfiguration: ::std::rc::Rc::new(match &value.target_tracking_scaling_policy_configuration { + TargetTrackingScalingPolicyConfiguration: ::dafny_runtime::Rc::new(match &value.target_tracking_scaling_policy_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_target_tracking_scaling_policy_configuration_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingPolicyDescription, >, ) -> aws_sdk_dynamodb::types::AutoScalingPolicyDescription { @@ -30,5 +31,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_update.rs index 15140ccde..6ee1251f9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_policy_update.rs @@ -4,17 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingPolicyUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingPolicyUpdate::AutoScalingPolicyUpdate { PolicyName: crate::standard_library_conversions::ostring_to_dafny(&value.policy_name), TargetTrackingScalingPolicyConfiguration: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_target_tracking_scaling_policy_configuration_update::to_dafny(&value.target_tracking_scaling_policy_configuration.clone().unwrap()) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingPolicyUpdate, >, ) -> aws_sdk_dynamodb::types::AutoScalingPolicyUpdate { @@ -23,5 +24,4 @@ pub fn from_dafny( .set_target_tracking_scaling_policy_configuration(Some( crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_target_tracking_scaling_policy_configuration_update::from_dafny(dafny_value.TargetTrackingScalingPolicyConfiguration().clone()) )) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_description.rs index 62c6f4e85..95184beab 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_description.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingSettingsDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingSettingsDescription::AutoScalingSettingsDescription { MinimumUnits: crate::standard_library_conversions::olong_to_dafny(&value.minimum_units), MaximumUnits: crate::standard_library_conversions::olong_to_dafny(&value.maximum_units), AutoScalingDisabled: crate::standard_library_conversions::obool_to_dafny(&value.auto_scaling_disabled), AutoScalingRoleArn: crate::standard_library_conversions::ostring_to_dafny(&value.auto_scaling_role_arn), - ScalingPolicies: ::std::rc::Rc::new(match &value.scaling_policies { + ScalingPolicies: ::dafny_runtime::Rc::new(match &value.scaling_policies { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_policy_description::to_dafny(e) @@ -23,9 +23,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingSettingsDescription, >, ) -> aws_sdk_dynamodb::types::AutoScalingSettingsDescription { @@ -38,7 +39,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_policy_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_policy_description::from_dafny(e.clone()) , ) ), @@ -46,5 +47,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_update.rs index a8697ad7e..d92e3c6c6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_settings_update.rs @@ -4,23 +4,24 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingSettingsUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingSettingsUpdate::AutoScalingSettingsUpdate { MinimumUnits: crate::standard_library_conversions::olong_to_dafny(&value.minimum_units), MaximumUnits: crate::standard_library_conversions::olong_to_dafny(&value.maximum_units), AutoScalingDisabled: crate::standard_library_conversions::obool_to_dafny(&value.auto_scaling_disabled), AutoScalingRoleArn: crate::standard_library_conversions::ostring_to_dafny(&value.auto_scaling_role_arn), - ScalingPolicyUpdate: ::std::rc::Rc::new(match &value.scaling_policy_update { + ScalingPolicyUpdate: ::dafny_runtime::Rc::new(match &value.scaling_policy_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_policy_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingSettingsUpdate, >, ) -> aws_sdk_dynamodb::types::AutoScalingSettingsUpdate { @@ -36,5 +37,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_description.rs index 70a1b938c..6f6e8fd4e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_description.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingTargetTrackingScalingPolicyConfigurationDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription { DisableScaleIn: crate::standard_library_conversions::obool_to_dafny(&value.disable_scale_in), ScaleInCooldown: crate::standard_library_conversions::oint_to_dafny(value.scale_in_cooldown), @@ -13,9 +13,10 @@ pub fn to_dafny( TargetValue: crate::standard_library_conversions::double_to_dafny(value.target_value.clone()), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingTargetTrackingScalingPolicyConfigurationDescription, >, ) -> aws_sdk_dynamodb::types::AutoScalingTargetTrackingScalingPolicyConfigurationDescription { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_update.rs index 9f08e5bab..776cb2135 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/auto_scaling_target_tracking_scaling_policy_configuration_update.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { DisableScaleIn: crate::standard_library_conversions::obool_to_dafny(&value.disable_scale_in), ScaleInCooldown: crate::standard_library_conversions::oint_to_dafny(value.scale_in_cooldown), @@ -13,17 +13,28 @@ pub fn to_dafny( TargetValue: crate::standard_library_conversions::double_to_dafny(value.target_value.clone()), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate, >, ) -> aws_sdk_dynamodb::types::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { aws_sdk_dynamodb::types::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::builder() - .set_disable_scale_in(crate::standard_library_conversions::obool_from_dafny(dafny_value.DisableScaleIn().clone())) - .set_scale_in_cooldown(crate::standard_library_conversions::oint_from_dafny(dafny_value.ScaleInCooldown().clone())) - .set_scale_out_cooldown(crate::standard_library_conversions::oint_from_dafny(dafny_value.ScaleOutCooldown().clone())) - .set_target_value(Some( crate::standard_library_conversions::double_from_dafny(&dafny_value.TargetValue().clone()) )) - .build() - .unwrap() + .set_disable_scale_in(crate::standard_library_conversions::obool_from_dafny( + dafny_value.DisableScaleIn().clone(), + )) + .set_scale_in_cooldown(crate::standard_library_conversions::oint_from_dafny( + dafny_value.ScaleInCooldown().clone(), + )) + .set_scale_out_cooldown(crate::standard_library_conversions::oint_from_dafny( + dafny_value.ScaleOutCooldown().clone(), + )) + .set_target_value(Some( + crate::standard_library_conversions::double_from_dafny( + &dafny_value.TargetValue().clone(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_description.rs index 5bf74a3a0..6d63af68f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_description.rs @@ -4,29 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BackupDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupDescription::BackupDescription { - BackupDetails: ::std::rc::Rc::new(match &value.backup_details { + BackupDetails: ::dafny_runtime::Rc::new(match &value.backup_details { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_details::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SourceTableDetails: ::std::rc::Rc::new(match &value.source_table_details { + SourceTableDetails: ::dafny_runtime::Rc::new(match &value.source_table_details { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::source_table_details::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SourceTableFeatureDetails: ::std::rc::Rc::new(match &value.source_table_feature_details { + SourceTableFeatureDetails: ::dafny_runtime::Rc::new(match &value.source_table_feature_details { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::source_table_feature_details::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupDescription, >, ) -> aws_sdk_dynamodb::types::BackupDescription { @@ -50,5 +51,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_details.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_details.rs index 63c28794f..e4c3ef8dd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_details.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_details.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BackupDetails, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupDetails::BackupDetails { BackupArn: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.backup_arn), BackupName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.backup_name), @@ -16,20 +16,45 @@ pub fn to_dafny( BackupExpiryDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.backup_expiry_date_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupDetails, >, ) -> aws_sdk_dynamodb::types::BackupDetails { aws_sdk_dynamodb::types::BackupDetails::builder() - .set_backup_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.BackupArn()) )) - .set_backup_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.BackupName()) )) - .set_backup_size_bytes(crate::standard_library_conversions::olong_from_dafny(dafny_value.BackupSizeBytes().clone())) - .set_backup_status(Some( crate::deps::com_amazonaws_dynamodb::conversions::backup_status::from_dafny(dafny_value.BackupStatus()) )) - .set_backup_type(Some( crate::deps::com_amazonaws_dynamodb::conversions::backup_type::from_dafny(dafny_value.BackupType()) )) - .set_backup_creation_date_time(Some(crate::standard_library_conversions::timestamp_from_dafny(dafny_value.BackupCreationDateTime().clone()))) - .set_backup_expiry_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.BackupExpiryDateTime().clone())) - .build() - .unwrap() + .set_backup_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.BackupArn(), + ), + )) + .set_backup_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.BackupName(), + ), + )) + .set_backup_size_bytes(crate::standard_library_conversions::olong_from_dafny( + dafny_value.BackupSizeBytes().clone(), + )) + .set_backup_status(Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_status::from_dafny( + dafny_value.BackupStatus(), + ), + )) + .set_backup_type(Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_type::from_dafny( + dafny_value.BackupType(), + ), + )) + .set_backup_creation_date_time(Some( + crate::standard_library_conversions::timestamp_from_dafny( + dafny_value.BackupCreationDateTime().clone(), + ), + )) + .set_backup_expiry_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.BackupExpiryDateTime().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_status.rs index 849f3dfb9..1ac420660 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_status.rs @@ -5,15 +5,17 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::BackupStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::BackupStatus::Creating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupStatus::CREATING {}, aws_sdk_dynamodb::types::BackupStatus::Deleted => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupStatus::DELETED {}, aws_sdk_dynamodb::types::BackupStatus::Available => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupStatus::AVAILABLE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupStatus, ) -> aws_sdk_dynamodb::types::BackupStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_summary.rs index f9475dc6d..66df297e8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_summary.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BackupSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupSummary::BackupSummary { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), TableId: crate::standard_library_conversions::ostring_to_dafny(&value.table_id), @@ -14,12 +14,12 @@ pub fn to_dafny( BackupName: crate::standard_library_conversions::ostring_to_dafny(&value.backup_name), BackupCreationDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.backup_creation_date_time), BackupExpiryDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.backup_expiry_date_time), - BackupStatus: ::std::rc::Rc::new(match &value.backup_status { + BackupStatus: ::dafny_runtime::Rc::new(match &value.backup_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - BackupType: ::std::rc::Rc::new(match &value.backup_type { + BackupType: ::dafny_runtime::Rc::new(match &value.backup_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -27,35 +27,49 @@ pub fn to_dafny( BackupSizeBytes: crate::standard_library_conversions::olong_to_dafny(&value.backup_size_bytes), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupSummary, >, ) -> aws_sdk_dynamodb::types::BackupSummary { aws_sdk_dynamodb::types::BackupSummary::builder() - .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) - .set_table_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableId().clone())) - .set_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableArn().clone())) - .set_backup_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.BackupArn().clone())) - .set_backup_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.BackupName().clone())) - .set_backup_creation_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.BackupCreationDateTime().clone())) - .set_backup_expiry_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.BackupExpiryDateTime().clone())) - .set_backup_status(match &**dafny_value.BackupStatus() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::backup_status::from_dafny(value) - ), - _ => None, -} -) - .set_backup_type(match &**dafny_value.BackupType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::backup_type::from_dafny(value) - ), - _ => None, -} -) - .set_backup_size_bytes(crate::standard_library_conversions::olong_from_dafny(dafny_value.BackupSizeBytes().clone())) - .build() - + .set_table_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableName().clone(), + )) + .set_table_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableId().clone(), + )) + .set_table_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableArn().clone(), + )) + .set_backup_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.BackupArn().clone(), + )) + .set_backup_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.BackupName().clone(), + )) + .set_backup_creation_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.BackupCreationDateTime().clone(), + )) + .set_backup_expiry_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.BackupExpiryDateTime().clone(), + )) + .set_backup_status(match &**dafny_value.BackupStatus() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_status::from_dafny(value), + ), + _ => None, + }) + .set_backup_type(match &**dafny_value.BackupType() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_type::from_dafny(value), + ), + _ => None, + }) + .set_backup_size_bytes(crate::standard_library_conversions::olong_from_dafny( + dafny_value.BackupSizeBytes().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type.rs index d9d38e63e..ce2950d3c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type.rs @@ -5,15 +5,17 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::BackupType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::BackupType::User => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupType::USER {}, aws_sdk_dynamodb::types::BackupType::System => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupType::SYSTEM {}, aws_sdk_dynamodb::types::BackupType::AwsBackup => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupType::AWS_BACKUP {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupType, ) -> aws_sdk_dynamodb::types::BackupType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type_filter.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type_filter.rs index 93fc245c7..553f7b549 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type_filter.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/backup_type_filter.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::BackupTypeFilter, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::BackupTypeFilter::User => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupTypeFilter::USER {}, aws_sdk_dynamodb::types::BackupTypeFilter::System => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupTypeFilter::SYSTEM {}, aws_sdk_dynamodb::types::BackupTypeFilter::AwsBackup => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupTypeFilter::AWS_BACKUP {}, @@ -14,7 +14,7 @@ aws_sdk_dynamodb::types::BackupTypeFilter::All => crate::r#software::amazon::cry _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BackupTypeFilter, ) -> aws_sdk_dynamodb::types::BackupTypeFilter { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement.rs index 736739eba..d16e46001 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _batch_execute_statement_request; +pub mod _batch_execute_statement_request; - pub mod _batch_execute_statement_response; +pub mod _batch_execute_statement_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_request.rs index 6e559a4f4..39f0c331e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_request.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput::BatchExecuteStatementInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput::BatchExecuteStatementInput { Statements: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.statements.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_request::to_dafny(e) , ) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementInput { aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementInput::builder() .set_statements(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Statements(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_request::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_request::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_response.rs index 36119a5fb..f5e1ef837 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_execute_statement/_batch_execute_statement_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput::BatchExecuteStatementOutput { - Responses: ::std::rc::Rc::new(match &value.responses { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput::BatchExecuteStatementOutput { + Responses: ::dafny_runtime::Rc::new(match &value.responses { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_response::to_dafny(e) @@ -18,7 +18,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -30,18 +30,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementOutput { aws_sdk_dynamodb::operation::batch_execute_statement::BatchExecuteStatementOutput::builder() .set_responses(match (*dafny_value.Responses()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_response::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_response::from_dafny(e.clone()) , ) ), @@ -52,7 +52,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -60,6 +60,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item.rs index 6983ca563..05dab2c5b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _batch_get_item_request; +pub mod _batch_get_item_request; - pub mod _batch_get_item_response; +pub mod _batch_get_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_request.rs index 7ab7dddf1..3496a28e2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_request.rs @@ -4,33 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput::BatchGetItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput::BatchGetItemInput { RequestItems: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.request_items.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| crate::deps::com_amazonaws_dynamodb::conversions::keys_and_attributes::to_dafny(v) , ) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemInput { aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemInput::builder() .set_request_items(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.RequestItems(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::keys_and_attributes::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::keys_and_attributes::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_response.rs index 8c68028da..645beb90d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_get_item/_batch_get_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput::BatchGetItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput::BatchGetItemOutput { Responses: -::std::rc::Rc::new(match &value.responses { +::dafny_runtime::Rc::new(match &value.responses { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -28,7 +28,7 @@ pub fn to_dafny( }) , UnprocessedKeys: -::std::rc::Rc::new(match &value.unprocessed_keys { +::dafny_runtime::Rc::new(match &value.unprocessed_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -39,7 +39,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -51,11 +51,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemOutput { aws_sdk_dynamodb::operation::batch_get_item::BatchGetItemOutput::builder() .set_responses(match (*dafny_value.Responses()).as_ref() { @@ -63,10 +63,10 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, - |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, + |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) , @@ -82,7 +82,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::keys_and_attributes::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::keys_and_attributes::from_dafny(v.clone()) , ) ), @@ -93,7 +93,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -101,6 +101,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error.rs index 0cf0caff6..5cfdcb5e5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BatchStatementError, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementError::BatchStatementError { - Code: ::std::rc::Rc::new(match &value.code { + Code: ::dafny_runtime::Rc::new(match &value.code { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_error_code_enum::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -15,9 +15,10 @@ pub fn to_dafny( Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementError, >, ) -> aws_sdk_dynamodb::types::BatchStatementError { @@ -31,5 +32,4 @@ pub fn from_dafny( ) .set_message(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Message().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error_code_enum.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error_code_enum.rs index fd53a818a..f2f1ce190 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error_code_enum.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_error_code_enum.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum::ConditionalCheckFailed => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementErrorCodeEnum::ConditionalCheckFailed {}, aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded {}, aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum::RequestLimitExceeded => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementErrorCodeEnum::RequestLimitExceeded {}, @@ -21,7 +21,7 @@ aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum::DuplicateItem => crate::r# _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementErrorCodeEnum, ) -> aws_sdk_dynamodb::types::BatchStatementErrorCodeEnum { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_request.rs index 26d8e9c55..45e33585e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_request.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BatchStatementRequest, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementRequest::BatchStatementRequest { Statement: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.statement), - Parameters: ::std::rc::Rc::new(match &value.parameters { + Parameters: ::dafny_runtime::Rc::new(match &value.parameters { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(e) @@ -21,9 +21,10 @@ pub fn to_dafny( ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementRequest, >, ) -> aws_sdk_dynamodb::types::BatchStatementRequest { @@ -33,7 +34,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_response.rs index 7283116ee..b14a87b8a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_statement_response.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BatchStatementResponse, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementResponse::BatchStatementResponse { - Error: ::std::rc::Rc::new(match &value.error { + Error: ::dafny_runtime::Rc::new(match &value.error { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::batch_statement_error::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), Item: -::std::rc::Rc::new(match &value.item { +::dafny_runtime::Rc::new(match &value.item { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,9 +27,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchStatementResponse, >, ) -> aws_sdk_dynamodb::types::BatchStatementResponse { @@ -46,7 +47,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -54,5 +55,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item.rs index 62c68551f..271c82157 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemError::InternalServerError(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _batch_write_item_request; +pub mod _batch_write_item_request; - pub mod _batch_write_item_response; +pub mod _batch_write_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_request.rs index 0c42f1908..2adb02783 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput::BatchWriteItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput::BatchWriteItemInput { RequestItems: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.request_items.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), |v| ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&v, @@ -17,29 +17,29 @@ pub fn to_dafny( , ) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnItemCollectionMetrics: ::std::rc::Rc::new(match &value.return_item_collection_metrics { + ReturnItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.return_item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_item_collection_metrics::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemInput { aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemInput::builder() .set_request_items(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.RequestItems(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::write_request::from_dafny(e.clone()) + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::write_request::from_dafny(e.clone()) , ) , diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_response.rs index 8cc8bb396..8d1f57a9f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/batch_write_item/_batch_write_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput::BatchWriteItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput::BatchWriteItemOutput { UnprocessedItems: -::std::rc::Rc::new(match &value.unprocessed_items { +::dafny_runtime::Rc::new(match &value.unprocessed_items { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -24,7 +24,7 @@ pub fn to_dafny( }) , ItemCollectionMetrics: -::std::rc::Rc::new(match &value.item_collection_metrics { +::dafny_runtime::Rc::new(match &value.item_collection_metrics { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -38,7 +38,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -50,11 +50,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemOutput { aws_sdk_dynamodb::operation::batch_write_item::BatchWriteItemOutput::builder() .set_unprocessed_items(match (*dafny_value.UnprocessedItems()).as_ref() { @@ -62,8 +62,8 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::write_request::from_dafny(e.clone()) + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::write_request::from_dafny(e.clone()) , ) , @@ -77,8 +77,8 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::from_dafny(e.clone()) + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::from_dafny(e.clone()) , ) , @@ -91,7 +91,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -99,6 +99,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode.rs index a29d5b356..bfbe17413 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::BillingMode, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingMode, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::BillingMode::Provisioned => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingMode::PROVISIONED {}, aws_sdk_dynamodb::types::BillingMode::PayPerRequest => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingMode::PAY_PER_REQUEST {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingMode, ) -> aws_sdk_dynamodb::types::BillingMode { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode_summary.rs index b4b8339f7..86af3d98c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/billing_mode_summary.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::BillingModeSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingModeSummary::BillingModeSummary { - BillingMode: ::std::rc::Rc::new(match &value.billing_mode { + BillingMode: ::dafny_runtime::Rc::new(match &value.billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -15,21 +15,24 @@ pub fn to_dafny( LastUpdateToPayPerRequestDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_update_to_pay_per_request_date_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::BillingModeSummary, >, ) -> aws_sdk_dynamodb::types::BillingModeSummary { aws_sdk_dynamodb::types::BillingModeSummary::builder() - .set_billing_mode(match &**dafny_value.BillingMode() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::from_dafny(value) - ), - _ => None, -} -) - .set_last_update_to_pay_per_request_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LastUpdateToPayPerRequestDateTime().clone())) - .build() - + .set_billing_mode(match &**dafny_value.BillingMode() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::from_dafny(value), + ), + _ => None, + }) + .set_last_update_to_pay_per_request_date_time( + crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.LastUpdateToPayPerRequestDateTime().clone(), + ), + ) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/cancellation_reason.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/cancellation_reason.rs index 75a324421..fc9531d95 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/cancellation_reason.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/cancellation_reason.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::CancellationReason, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CancellationReason::CancellationReason { Item: -::std::rc::Rc::new(match &value.item { +::dafny_runtime::Rc::new(match &value.item { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -23,9 +23,10 @@ pub fn to_dafny( Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CancellationReason, >, ) -> aws_sdk_dynamodb::types::CancellationReason { @@ -35,7 +36,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -45,5 +46,4 @@ pub fn from_dafny( .set_code(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Code().clone())) .set_message(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Message().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/capacity.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/capacity.rs index 67c651928..bd7c33a78 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/capacity.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/capacity.rs @@ -4,24 +4,32 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Capacity, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Capacity, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Capacity::Capacity { ReadCapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.read_capacity_units), WriteCapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.write_capacity_units), CapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.capacity_units), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Capacity, >, ) -> aws_sdk_dynamodb::types::Capacity { aws_sdk_dynamodb::types::Capacity::builder() - .set_read_capacity_units(crate::standard_library_conversions::odouble_from_dafny(dafny_value.ReadCapacityUnits().clone())) - .set_write_capacity_units(crate::standard_library_conversions::odouble_from_dafny(dafny_value.WriteCapacityUnits().clone())) - .set_capacity_units(crate::standard_library_conversions::odouble_from_dafny(dafny_value.CapacityUnits().clone())) - .build() - + .set_read_capacity_units(crate::standard_library_conversions::odouble_from_dafny( + dafny_value.ReadCapacityUnits().clone(), + )) + .set_write_capacity_units(crate::standard_library_conversions::odouble_from_dafny( + dafny_value.WriteCapacityUnits().clone(), + )) + .set_capacity_units(crate::standard_library_conversions::odouble_from_dafny( + dafny_value.CapacityUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/client.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/client.rs index 02edf6a18..dd894dced 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/client.rs @@ -5,7 +5,6 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] - use std::any::Any; pub fn to_dafny( @@ -13,11 +12,10 @@ pub fn to_dafny( ) -> ::dafny_runtime::Object { - let x: std::rc::Rc = std::rc::Rc::new(value.clone()); - let y = x as std::rc::Rc; - unsafe { - ::dafny_runtime::dafny_runtime_conversions::object::rc_struct_to_dafny_class(y) - } + let x: dafny_runtime::Rc = + dafny_runtime::Rc::new(value.clone()); + let y = x as dafny_runtime::Rc; + unsafe { ::dafny_runtime::dafny_runtime_conversions::object::rc_struct_to_dafny_class(y) } } #[allow(dead_code)] @@ -26,13 +24,22 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient >, ) -> crate::deps::com_amazonaws_dynamodb::client::Client { - let as_boxed_any = dafny_runtime::cast_any_object!(dafny_value); - if (dafny_runtime::is_object!(as_boxed_any, crate::deps::com_amazonaws_dynamodb::client::Client)) { - let as_boxed_client = ::dafny_runtime::object::downcast::(as_boxed_any); - unsafe { - ::dafny_runtime::dafny_runtime_conversions::object::dafny_class_to_rc_struct(as_boxed_client).as_ref().clone() + let as_boxed_any = dafny_runtime::cast_any_object!(dafny_value); + if (dafny_runtime::is_object!( + as_boxed_any, + crate::deps::com_amazonaws_dynamodb::client::Client + )) { + let as_boxed_client = ::dafny_runtime::object::downcast::< + crate::deps::com_amazonaws_dynamodb::client::Client, + >(as_boxed_any); + unsafe { + ::dafny_runtime::dafny_runtime_conversions::object::dafny_class_to_rc_struct( + as_boxed_client, + ) + .as_ref() + .clone() + } + } else { + panic!("Unexpected implementation of Dafny client interface"); } - } else { - panic!("Unexpected implementation of Dafny client interface"); - } } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/comparison_operator.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/comparison_operator.rs index a18dec568..08c9b0a59 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/comparison_operator.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/comparison_operator.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ComparisonOperator, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ComparisonOperator::Eq => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ComparisonOperator::EQ {}, aws_sdk_dynamodb::types::ComparisonOperator::Ne => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ComparisonOperator::NE {}, aws_sdk_dynamodb::types::ComparisonOperator::In => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ComparisonOperator::IN {}, @@ -23,7 +23,7 @@ aws_sdk_dynamodb::types::ComparisonOperator::BeginsWith => crate::r#software::am _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ComparisonOperator, ) -> aws_sdk_dynamodb::types::ComparisonOperator { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition.rs index 01fdf84bd..590549d21 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition.rs @@ -4,10 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Condition, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Condition, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Condition::Condition { - AttributeValueList: ::std::rc::Rc::new(match &value.attribute_value_list { + AttributeValueList: ::dafny_runtime::Rc::new(match &value.attribute_value_list { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(e) @@ -20,9 +22,10 @@ pub fn to_dafny( ComparisonOperator: crate::deps::com_amazonaws_dynamodb::conversions::comparison_operator::to_dafny(value.comparison_operator.clone()), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Condition, >, ) -> aws_sdk_dynamodb::types::Condition { @@ -31,7 +34,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition_check.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition_check.rs index 69f644332..df75d06c7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition_check.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/condition_check.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ConditionCheck, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConditionCheck::ConditionCheck { Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +16,7 @@ pub fn to_dafny( TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), ConditionExpression: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,7 +27,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -38,23 +38,24 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnValuesOnConditionCheckFailure: ::std::rc::Rc::new(match &value.return_values_on_condition_check_failure { + ReturnValuesOnConditionCheckFailure: ::dafny_runtime::Rc::new(match &value.return_values_on_condition_check_failure { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_values_on_condition_check_failure::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConditionCheck, >, ) -> aws_sdk_dynamodb::types::ConditionCheck { aws_sdk_dynamodb::types::ConditionCheck::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -76,7 +77,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/conditional_operator.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/conditional_operator.rs index 216ac006f..c16c17a16 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/conditional_operator.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/conditional_operator.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ConditionalOperator, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ConditionalOperator::And => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConditionalOperator::AND {}, aws_sdk_dynamodb::types::ConditionalOperator::Or => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConditionalOperator::OR {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConditionalOperator, ) -> aws_sdk_dynamodb::types::ConditionalOperator { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/consumed_capacity.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/consumed_capacity.rs index 88129b44a..66f42e30c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/consumed_capacity.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/consumed_capacity.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ConsumedCapacity, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConsumedCapacity::ConsumedCapacity { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), CapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.capacity_units), ReadCapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.read_capacity_units), WriteCapacityUnits: crate::standard_library_conversions::odouble_to_dafny(&value.write_capacity_units), - Table: ::std::rc::Rc::new(match &value.table { + Table: ::dafny_runtime::Rc::new(match &value.table { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , LocalSecondaryIndexes: -::std::rc::Rc::new(match &value.local_secondary_indexes { +::dafny_runtime::Rc::new(match &value.local_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -29,7 +29,7 @@ pub fn to_dafny( }) , GlobalSecondaryIndexes: -::std::rc::Rc::new(match &value.global_secondary_indexes { +::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -42,9 +42,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ConsumedCapacity, >, ) -> aws_sdk_dynamodb::types::ConsumedCapacity { @@ -64,7 +65,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::capacity::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::capacity::from_dafny(v.clone()) , ) ), @@ -76,7 +77,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::capacity::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::capacity::from_dafny(v.clone()) , ) ), @@ -84,5 +85,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_description.rs index 683aa1974..505fbb713 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_description.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ContinuousBackupsDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContinuousBackupsDescription::ContinuousBackupsDescription { ContinuousBackupsStatus: crate::deps::com_amazonaws_dynamodb::conversions::continuous_backups_status::to_dafny(value.continuous_backups_status.clone()), - PointInTimeRecoveryDescription: ::std::rc::Rc::new(match &value.point_in_time_recovery_description { + PointInTimeRecoveryDescription: ::dafny_runtime::Rc::new(match &value.point_in_time_recovery_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::point_in_time_recovery_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContinuousBackupsDescription, >, ) -> aws_sdk_dynamodb::types::ContinuousBackupsDescription { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_status.rs index a535be766..daf6e8758 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/continuous_backups_status.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ContinuousBackupsStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ContinuousBackupsStatus::Enabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContinuousBackupsStatus::ENABLED {}, aws_sdk_dynamodb::types::ContinuousBackupsStatus::Disabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContinuousBackupsStatus::DISABLED {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContinuousBackupsStatus, ) -> aws_sdk_dynamodb::types::ContinuousBackupsStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_action.rs index ace5bf1fe..34d828615 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_action.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ContributorInsightsAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ContributorInsightsAction::Enable => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsAction::ENABLE {}, aws_sdk_dynamodb::types::ContributorInsightsAction::Disable => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsAction::DISABLE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsAction, ) -> aws_sdk_dynamodb::types::ContributorInsightsAction { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_status.rs index 360f086d4..779a78264 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_status.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ContributorInsightsStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ContributorInsightsStatus::Enabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsStatus::ENABLING {}, aws_sdk_dynamodb::types::ContributorInsightsStatus::Enabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsStatus::ENABLED {}, aws_sdk_dynamodb::types::ContributorInsightsStatus::Disabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsStatus::DISABLING {}, @@ -15,7 +15,7 @@ aws_sdk_dynamodb::types::ContributorInsightsStatus::Failed => crate::r#software: _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsStatus, ) -> aws_sdk_dynamodb::types::ContributorInsightsStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_summary.rs index 3d9176658..6ae6ceeca 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/contributor_insights_summary.rs @@ -4,21 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ContributorInsightsSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsSummary::ContributorInsightsSummary { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ContributorInsightsStatus: ::std::rc::Rc::new(match &value.contributor_insights_status { + ContributorInsightsStatus: ::dafny_runtime::Rc::new(match &value.contributor_insights_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ContributorInsightsSummary, >, ) -> aws_sdk_dynamodb::types::ContributorInsightsSummary { @@ -33,5 +34,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup.rs index 7fc73f4ba..33ae18f13 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::create_backup::CreateBackupError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::create_backup::CreateBackupError::BackupInUseException(e) => @@ -36,6 +38,6 @@ pub fn to_dafny_error( } } - pub mod _create_backup_request; +pub mod _create_backup_request; - pub mod _create_backup_response; +pub mod _create_backup_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_request.rs index c7b38dbce..226b9be18 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_request.rs @@ -4,23 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_backup::CreateBackupInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupInput::CreateBackupInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupInput::CreateBackupInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), BackupName: crate::standard_library_conversions::ostring_to_dafny(&value.backup_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupInput, - > + >, ) -> aws_sdk_dynamodb::operation::create_backup::CreateBackupInput { aws_sdk_dynamodb::operation::create_backup::CreateBackupInput::builder() - .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) - .set_backup_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.BackupName()) )) - .build() - .unwrap() + .set_table_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TableName(), + ), + )) + .set_backup_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.BackupName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_response.rs index 147dc1909..20d4d550a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_backup/_create_backup_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_backup::CreateBackupOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupOutput::CreateBackupOutput { - BackupDetails: ::std::rc::Rc::new(match &value.backup_details { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupOutput::CreateBackupOutput { + BackupDetails: ::dafny_runtime::Rc::new(match &value.backup_details { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_details::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateBackupOutput, - > + >, ) -> aws_sdk_dynamodb::operation::create_backup::CreateBackupOutput { aws_sdk_dynamodb::operation::create_backup::CreateBackupOutput::builder() - .set_backup_details(match (*dafny_value.BackupDetails()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::backup_details::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_backup_details(match (*dafny_value.BackupDetails()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_details::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_secondary_index_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_secondary_index_action.rs index 5e0125402..2a11057d0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_secondary_index_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_secondary_index_action.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::CreateGlobalSecondaryIndexAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), KeySchema: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.key_schema, @@ -15,28 +15,29 @@ pub fn to_dafny( , Projection: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(&value.projection.clone().unwrap()) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalSecondaryIndexAction, >, ) -> aws_sdk_dynamodb::types::CreateGlobalSecondaryIndexAction { aws_sdk_dynamodb::types::CreateGlobalSecondaryIndexAction::builder() .set_index_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.IndexName()) )) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table.rs index 97fb17be7..0ca80e5d8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableError::GlobalTableAlreadyExistsException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _create_global_table_request; +pub mod _create_global_table_request; - pub mod _create_global_table_response; +pub mod _create_global_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_request.rs index 6cd162a83..285fa2c78 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableInput::CreateGlobalTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableInput::CreateGlobalTableInput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name) .Extract(), ReplicationGroup: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.replication_group.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::replica::to_dafny(e) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableInput { aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableInput::builder() .set_global_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GlobalTableName()) )) .set_replication_group(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.ReplicationGroup(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_response.rs index f5fdabbf0..fd5fb85a4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_global_table/_create_global_table_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableOutput::CreateGlobalTableOutput { - GlobalTableDescription: ::std::rc::Rc::new(match &value.global_table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableOutput::CreateGlobalTableOutput { + GlobalTableDescription: ::dafny_runtime::Rc::new(match &value.global_table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::global_table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateGlobalTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableOutput { aws_sdk_dynamodb::operation::create_global_table::CreateGlobalTableOutput::builder() .set_global_table_description(match (*dafny_value.GlobalTableDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replica_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replica_action.rs index cfbc465a0..8c005264f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replica_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replica_action.rs @@ -4,20 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::CreateReplicaAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateReplicaAction::CreateReplicaAction { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateReplicaAction, >, ) -> aws_sdk_dynamodb::types::CreateReplicaAction { aws_sdk_dynamodb::types::CreateReplicaAction::builder() - .set_region_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.RegionName()) )) - .build() - .unwrap() + .set_region_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.RegionName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replication_group_member_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replication_group_member_action.rs index 16cf13f0b..a243413b0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replication_group_member_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_replication_group_member_action.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::CreateReplicationGroupMemberAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), KMSMasterKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_master_key_id), - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::to_dafny(e) @@ -29,16 +29,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - TableClassOverride: ::std::rc::Rc::new(match &value.table_class_override { + TableClassOverride: ::dafny_runtime::Rc::new(match &value.table_class_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateReplicationGroupMemberAction, >, ) -> aws_sdk_dynamodb::types::CreateReplicationGroupMemberAction { @@ -61,7 +62,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table.rs index 8f8109b3a..7d83c384b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::create_table::CreateTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::create_table::CreateTableError::InternalServerError(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _create_table_request; +pub mod _create_table_request; - pub mod _create_table_response; +pub mod _create_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_request.rs index 84754ae8c..5e8a60aef 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_table::CreateTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableInput::CreateTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableInput::CreateTableInput { AttributeDefinitions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.attribute_definitions.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::to_dafny(e) , @@ -19,7 +19,7 @@ pub fn to_dafny( , ) , - LocalSecondaryIndexes: ::std::rc::Rc::new(match &value.local_secondary_indexes { + LocalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.local_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::to_dafny(e) @@ -29,7 +29,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::to_dafny(e) @@ -39,27 +39,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - BillingMode: ::std::rc::Rc::new(match &value.billing_mode { + BillingMode: ::dafny_runtime::Rc::new(match &value.billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - StreamSpecification: ::std::rc::Rc::new(match &value.stream_specification { + StreamSpecification: ::dafny_runtime::Rc::new(match &value.stream_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::stream_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSESpecification: ::std::rc::Rc::new(match &value.sse_specification { + SSESpecification: ::dafny_runtime::Rc::new(match &value.sse_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Tags: ::std::rc::Rc::new(match &value.tags { + Tags: ::dafny_runtime::Rc::new(match &value.tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::tag::to_dafny(e) @@ -69,35 +69,35 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - TableClass: ::std::rc::Rc::new(match &value.table_class { + TableClass: ::dafny_runtime::Rc::new(match &value.table_class { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , DeletionProtectionEnabled: crate::standard_library_conversions::obool_to_dafny(&value.deletion_protection_enabled), ResourcePolicy: crate::standard_library_conversions::ostring_to_dafny(&value.resource_policy), - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::create_table::CreateTableInput { aws_sdk_dynamodb::operation::create_table::CreateTableInput::builder() .set_attribute_definitions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.AttributeDefinitions(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) , ) )) .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) @@ -105,7 +105,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) , ) ), @@ -116,7 +116,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) , ) ), @@ -152,7 +152,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_response.rs index a28099c9f..a0c59e5e7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/create_table/_create_table_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::create_table::CreateTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableOutput::CreateTableOutput { - TableDescription: ::std::rc::Rc::new(match &value.table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableOutput::CreateTableOutput { + TableDescription: ::dafny_runtime::Rc::new(match &value.table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CreateTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::create_table::CreateTableOutput { aws_sdk_dynamodb::operation::create_table::CreateTableOutput::builder() - .set_table_description(match (*dafny_value.TableDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_table_description(match (*dafny_value.TableDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/csv_options.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/csv_options.rs index f5358d460..cbed2a953 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/csv_options.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/csv_options.rs @@ -4,11 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::CsvOptions, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CsvOptions, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CsvOptions::CsvOptions { Delimiter: crate::standard_library_conversions::ostring_to_dafny(&value.delimiter), - HeaderList: ::std::rc::Rc::new(match &value.header_list { + HeaderList: ::dafny_runtime::Rc::new(match &value.header_list { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -19,9 +21,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::CsvOptions, >, ) -> aws_sdk_dynamodb::types::CsvOptions { @@ -38,5 +41,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete.rs index 18b1385ab..0ec1cc139 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Delete, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Delete, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Delete::Delete { Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +18,7 @@ pub fn to_dafny( TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,7 +29,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -38,23 +40,24 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnValuesOnConditionCheckFailure: ::std::rc::Rc::new(match &value.return_values_on_condition_check_failure { + ReturnValuesOnConditionCheckFailure: ::dafny_runtime::Rc::new(match &value.return_values_on_condition_check_failure { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_values_on_condition_check_failure::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Delete, >, ) -> aws_sdk_dynamodb::types::Delete { aws_sdk_dynamodb::types::Delete::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -76,7 +79,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup.rs index 703fcd26a..842b7d334 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::delete_backup::DeleteBackupError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::delete_backup::DeleteBackupError::BackupInUseException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _delete_backup_request; +pub mod _delete_backup_request; - pub mod _delete_backup_response; +pub mod _delete_backup_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_request.rs index eafc8d39d..a42e1c7b9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_backup::DeleteBackupInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupInput::DeleteBackupInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupInput::DeleteBackupInput { BackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.backup_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupInput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_backup::DeleteBackupInput { aws_sdk_dynamodb::operation::delete_backup::DeleteBackupInput::builder() - .set_backup_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.BackupArn()) )) - .build() - .unwrap() + .set_backup_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.BackupArn(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_response.rs index 85da3f8f6..8f859386b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_backup/_delete_backup_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_backup::DeleteBackupOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupOutput::DeleteBackupOutput { - BackupDescription: ::std::rc::Rc::new(match &value.backup_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupOutput::DeleteBackupOutput { + BackupDescription: ::dafny_runtime::Rc::new(match &value.backup_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteBackupOutput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_backup::DeleteBackupOutput { aws_sdk_dynamodb::operation::delete_backup::DeleteBackupOutput::builder() - .set_backup_description(match (*dafny_value.BackupDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::backup_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_backup_description(match (*dafny_value.BackupDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_global_secondary_index_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_global_secondary_index_action.rs index f1708e4cf..fd8958401 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_global_secondary_index_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_global_secondary_index_action.rs @@ -4,20 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::DeleteGlobalSecondaryIndexAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteGlobalSecondaryIndexAction, >, ) -> aws_sdk_dynamodb::types::DeleteGlobalSecondaryIndexAction { aws_sdk_dynamodb::types::DeleteGlobalSecondaryIndexAction::builder() - .set_index_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.IndexName()) )) - .build() - .unwrap() + .set_index_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.IndexName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item.rs index e680ab5cc..2e9ee4e65 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::delete_item::DeleteItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::delete_item::DeleteItemError::ConditionalCheckFailedException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _delete_item_request; +pub mod _delete_item_request; - pub mod _delete_item_response; +pub mod _delete_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_request.rs index 4f11ff70f..464b1a0a3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_item::DeleteItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput::DeleteItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput::DeleteItemInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +16,7 @@ pub fn to_dafny( ) , Expected: -::std::rc::Rc::new(match &value.expected { +::dafny_runtime::Rc::new(match &value.expected { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,29 +27,29 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConditionalOperator: ::std::rc::Rc::new(match &value.conditional_operator { + ConditionalOperator: ::dafny_runtime::Rc::new(match &value.conditional_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::conditional_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnValues: ::std::rc::Rc::new(match &value.return_values { + ReturnValues: ::dafny_runtime::Rc::new(match &value.return_values { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_value::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnItemCollectionMetrics: ::std::rc::Rc::new(match &value.return_item_collection_metrics { + ReturnItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.return_item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_item_collection_metrics::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -60,7 +60,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -73,17 +73,17 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_item::DeleteItemInput { aws_sdk_dynamodb::operation::delete_item::DeleteItemInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -92,7 +92,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) , ) ), @@ -144,7 +144,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_response.rs index 6fdad0f5e..8585b831f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_item/_delete_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_item::DeleteItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput::DeleteItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput::DeleteItemOutput { Attributes: -::std::rc::Rc::new(match &value.attributes { +::dafny_runtime::Rc::new(match &value.attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,23 +20,23 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ItemCollectionMetrics: ::std::rc::Rc::new(match &value.item_collection_metrics { + ItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_item::DeleteItemOutput { aws_sdk_dynamodb::operation::delete_item::DeleteItemOutput::builder() .set_attributes(match (*dafny_value.Attributes()).as_ref() { @@ -44,7 +44,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -64,6 +64,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replica_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replica_action.rs index 13a08fabe..8beddc6d0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replica_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replica_action.rs @@ -4,20 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::DeleteReplicaAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteReplicaAction::DeleteReplicaAction { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteReplicaAction, >, ) -> aws_sdk_dynamodb::types::DeleteReplicaAction { aws_sdk_dynamodb::types::DeleteReplicaAction::builder() - .set_region_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.RegionName()) )) - .build() - .unwrap() + .set_region_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.RegionName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replication_group_member_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replication_group_member_action.rs index 5a4cc8f05..06f53b5dc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replication_group_member_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_replication_group_member_action.rs @@ -4,20 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::DeleteReplicationGroupMemberAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteReplicationGroupMemberAction, >, ) -> aws_sdk_dynamodb::types::DeleteReplicationGroupMemberAction { aws_sdk_dynamodb::types::DeleteReplicationGroupMemberAction::builder() - .set_region_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.RegionName()) )) - .build() - .unwrap() + .set_region_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.RegionName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_request.rs index 0ea1ba497..ae9fccbc9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_request.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::DeleteRequest, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteRequest::DeleteRequest { Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -15,16 +15,17 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteRequest, >, ) -> aws_sdk_dynamodb::types::DeleteRequest { aws_sdk_dynamodb::types::DeleteRequest::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy.rs index 1765a93af..b3d32bc54 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyError::InternalServerError(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _delete_resource_policy_request; +pub mod _delete_resource_policy_request; - pub mod _delete_resource_policy_response; +pub mod _delete_resource_policy_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_request.rs index 95412ef28..620459d6c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_request.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyInput::DeleteResourcePolicyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyInput::DeleteResourcePolicyInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), ExpectedRevisionId: crate::standard_library_conversions::ostring_to_dafny(&value.expected_revision_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyInput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyInput { aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyInput::builder() - .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) - .set_expected_revision_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExpectedRevisionId().clone())) - .build() - .unwrap() + .set_resource_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ResourceArn(), + ), + )) + .set_expected_revision_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExpectedRevisionId().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_response.rs index c48b038f4..97c501452 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_resource_policy/_delete_resource_policy_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyOutput::DeleteResourcePolicyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyOutput::DeleteResourcePolicyOutput { RevisionId: crate::standard_library_conversions::ostring_to_dafny(&value.revision_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteResourcePolicyOutput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyOutput { aws_sdk_dynamodb::operation::delete_resource_policy::DeleteResourcePolicyOutput::builder() - .set_revision_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RevisionId().clone())) - .build() - - + .set_revision_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.RevisionId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table.rs index a36472923..f190ebf7b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::delete_table::DeleteTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::delete_table::DeleteTableError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _delete_table_request; +pub mod _delete_table_request; - pub mod _delete_table_response; +pub mod _delete_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_request.rs index 448b5de54..63f3aefd5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_table::DeleteTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableInput::DeleteTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableInput::DeleteTableInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_table::DeleteTableInput { aws_sdk_dynamodb::operation::delete_table::DeleteTableInput::builder() - .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) - .build() - .unwrap() + .set_table_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TableName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_response.rs index ec94ac94a..28739bcb8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/delete_table/_delete_table_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::delete_table::DeleteTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableOutput::DeleteTableOutput { - TableDescription: ::std::rc::Rc::new(match &value.table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableOutput::DeleteTableOutput { + TableDescription: ::dafny_runtime::Rc::new(match &value.table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::delete_table::DeleteTableOutput { aws_sdk_dynamodb::operation::delete_table::DeleteTableOutput::builder() - .set_table_description(match (*dafny_value.TableDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_table_description(match (*dafny_value.TableDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup.rs index 62714bde3..aa1435440 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_backup::DescribeBackupError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_backup::DescribeBackupError::BackupNotFoundException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_backup_request; +pub mod _describe_backup_request; - pub mod _describe_backup_response; +pub mod _describe_backup_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_request.rs index 25da37ae9..8d17d842d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_backup::DescribeBackupInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupInput::DescribeBackupInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupInput::DescribeBackupInput { BackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.backup_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_backup::DescribeBackupInput { aws_sdk_dynamodb::operation::describe_backup::DescribeBackupInput::builder() - .set_backup_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.BackupArn()) )) - .build() - .unwrap() + .set_backup_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.BackupArn(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_response.rs index 3540f6fdd..453fad5ef 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_backup/_describe_backup_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_backup::DescribeBackupOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupOutput::DescribeBackupOutput { - BackupDescription: ::std::rc::Rc::new(match &value.backup_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupOutput::DescribeBackupOutput { + BackupDescription: ::dafny_runtime::Rc::new(match &value.backup_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeBackupOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_backup::DescribeBackupOutput { aws_sdk_dynamodb::operation::describe_backup::DescribeBackupOutput::builder() - .set_backup_description(match (*dafny_value.BackupDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::backup_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_backup_description(match (*dafny_value.BackupDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups.rs index 6494116cc..e69215971 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsError::InternalServerError(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_continuous_backups_request; +pub mod _describe_continuous_backups_request; - pub mod _describe_continuous_backups_response; +pub mod _describe_continuous_backups_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_request.rs index 2a4c5070a..3c46b78bf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_request.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsInput::DescribeContinuousBackupsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsInput::DescribeContinuousBackupsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsInput { aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_response.rs index 925912994..5dfd8d79a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_continuous_backups/_describe_continuous_backups_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput { - ContinuousBackupsDescription: ::std::rc::Rc::new(match &value.continuous_backups_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput { + ContinuousBackupsDescription: ::dafny_runtime::Rc::new(match &value.continuous_backups_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::continuous_backups_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContinuousBackupsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsOutput { aws_sdk_dynamodb::operation::describe_continuous_backups::DescribeContinuousBackupsOutput::builder() .set_continuous_backups_description(match (*dafny_value.ContinuousBackupsDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights.rs index df3d14a6e..6c1642d3c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _describe_contributor_insights_request; +pub mod _describe_contributor_insights_request; - pub mod _describe_contributor_insights_response; +pub mod _describe_contributor_insights_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_request.rs index 1c4dc21a2..845797fcf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_request.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsInput::DescribeContributorInsightsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsInput::DescribeContributorInsightsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsInput { aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_response.rs index 596b9e1e7..eaaf27ee6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_contributor_insights/_describe_contributor_insights_response.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsOutput::DescribeContributorInsightsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsOutput::DescribeContributorInsightsOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ContributorInsightsRuleList: ::std::rc::Rc::new(match &value.contributor_insights_rule_list { + ContributorInsightsRuleList: ::dafny_runtime::Rc::new(match &value.contributor_insights_rule_list { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -19,24 +19,24 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ContributorInsightsStatus: ::std::rc::Rc::new(match &value.contributor_insights_status { + ContributorInsightsStatus: ::dafny_runtime::Rc::new(match &value.contributor_insights_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , LastUpdateDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_update_date_time), - FailureException: ::std::rc::Rc::new(match &value.failure_exception { + FailureException: ::dafny_runtime::Rc::new(match &value.failure_exception { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::failure_exception::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeContributorInsightsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsOutput { aws_sdk_dynamodb::operation::describe_contributor_insights::DescribeContributorInsightsOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) @@ -66,6 +66,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints.rs index e2187582a..f42caa665 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints.rs @@ -7,22 +7,24 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { - aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { - - e => { - let msg = format!("{:?}", e); - crate::deps::com_amazonaws_dynamodb::conversions::error::to_opaque_error(msg) + aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() + { + e => { + let msg = format!("{:?}", e); + crate::deps::com_amazonaws_dynamodb::conversions::error::to_opaque_error(msg) + } + }, + _ => { + let msg = format!("{:?}", value); + crate::deps::com_amazonaws_dynamodb::conversions::error::to_opaque_error(msg) } - }, - _ => { - let msg = format!("{:?}", value); - crate::deps::com_amazonaws_dynamodb::conversions::error::to_opaque_error(msg) - } - } + } } - pub mod _describe_endpoints_request; +pub mod _describe_endpoints_request; - pub mod _describe_endpoints_response; +pub mod _describe_endpoints_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_request.rs index 5b62acf5b..bd0fd618e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_request.rs @@ -4,21 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsRequest::DescribeEndpointsRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsRequest::DescribeEndpointsRequest { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsRequest, - > + >, ) -> aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsInput { aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsInput::builder() - - .build() - .unwrap() + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_response.rs index f43101fbc..b1bd08a67 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_endpoints/_describe_endpoints_response.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsResponse::DescribeEndpointsResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsResponse::DescribeEndpointsResponse { Endpoints: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.endpoints, |e| crate::deps::com_amazonaws_dynamodb::conversions::endpoint::to_dafny(e) , @@ -15,19 +15,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeEndpointsResponse, - > + >, ) -> aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsOutput { aws_sdk_dynamodb::operation::describe_endpoints::DescribeEndpointsOutput::builder() .set_endpoints(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Endpoints(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::endpoint::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::endpoint::from_dafny(e.clone()) , ) )) .build() .unwrap() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export.rs index 5af7a8ce7..7e12ed2d7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_export::DescribeExportError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_export::DescribeExportError::ExportNotFoundException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_export_request; +pub mod _describe_export_request; - pub mod _describe_export_response; +pub mod _describe_export_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_request.rs index 0aa9b57d1..b41e8178f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_export::DescribeExportInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportInput::DescribeExportInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportInput::DescribeExportInput { ExportArn: crate::standard_library_conversions::ostring_to_dafny(&value.export_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_export::DescribeExportInput { aws_sdk_dynamodb::operation::describe_export::DescribeExportInput::builder() - .set_export_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ExportArn()) )) - .build() - .unwrap() + .set_export_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ExportArn(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_response.rs index 69cbd9b55..7af94d12b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_export/_describe_export_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_export::DescribeExportOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportOutput::DescribeExportOutput { - ExportDescription: ::std::rc::Rc::new(match &value.export_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportOutput::DescribeExportOutput { + ExportDescription: ::dafny_runtime::Rc::new(match &value.export_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeExportOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_export::DescribeExportOutput { aws_sdk_dynamodb::operation::describe_export::DescribeExportOutput::builder() - .set_export_description(match (*dafny_value.ExportDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::export_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_export_description(match (*dafny_value.ExportDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::export_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table.rs index c0f1b8575..9f94197c1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableError::GlobalTableNotFoundException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_global_table_request; +pub mod _describe_global_table_request; - pub mod _describe_global_table_response; +pub mod _describe_global_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_request.rs index 0915e78aa..e7f0a5bd4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableInput::DescribeGlobalTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableInput::DescribeGlobalTableInput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableInput { aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableInput::builder() - .set_global_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GlobalTableName()) )) - .build() - .unwrap() + .set_global_table_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.GlobalTableName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_response.rs index c06b6d557..0f0ccca06 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table/_describe_global_table_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableOutput::DescribeGlobalTableOutput { - GlobalTableDescription: ::std::rc::Rc::new(match &value.global_table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableOutput::DescribeGlobalTableOutput { + GlobalTableDescription: ::dafny_runtime::Rc::new(match &value.global_table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::global_table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableOutput { aws_sdk_dynamodb::operation::describe_global_table::DescribeGlobalTableOutput::builder() .set_global_table_description(match (*dafny_value.GlobalTableDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings.rs index 32365c2a5..6ecc8889a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsError::GlobalTableNotFoundException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_global_table_settings_request; +pub mod _describe_global_table_settings_request; - pub mod _describe_global_table_settings_response; +pub mod _describe_global_table_settings_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_request.rs index 8be4182cb..92e118efc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_request.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsInput { aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsInput::builder() .set_global_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GlobalTableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_response.rs index 68d9280a7..2c6ddf2f3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_global_table_settings/_describe_global_table_settings_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name), - ReplicaSettings: ::std::rc::Rc::new(match &value.replica_settings { + ReplicaSettings: ::dafny_runtime::Rc::new(match &value.replica_settings { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::to_dafny(e) @@ -21,19 +21,20 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeGlobalTableSettingsOutput, - > -) -> aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsOutput { + >, +) -> aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsOutput +{ aws_sdk_dynamodb::operation::describe_global_table_settings::DescribeGlobalTableSettingsOutput::builder() .set_global_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GlobalTableName().clone())) .set_replica_settings(match (*dafny_value.ReplicaSettings()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::from_dafny(e.clone()) , ) ), @@ -41,6 +42,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import.rs index 5cd5786ad..58eb99f76 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_import::DescribeImportError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_import::DescribeImportError::ImportNotFoundException(e) => @@ -24,6 +26,6 @@ pub fn to_dafny_error( } } - pub mod _describe_import_request; +pub mod _describe_import_request; - pub mod _describe_import_response; +pub mod _describe_import_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_request.rs index 3dc2d2098..64a767799 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_import::DescribeImportInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportInput::DescribeImportInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportInput::DescribeImportInput { ImportArn: crate::standard_library_conversions::ostring_to_dafny(&value.import_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_import::DescribeImportInput { aws_sdk_dynamodb::operation::describe_import::DescribeImportInput::builder() - .set_import_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ImportArn()) )) - .build() - .unwrap() + .set_import_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ImportArn(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_response.rs index 91e2129f0..438ca3f48 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_import/_describe_import_response.rs @@ -4,24 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_import::DescribeImportOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportOutput::DescribeImportOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportOutput::DescribeImportOutput { ImportTableDescription: crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::to_dafny(&value.import_table_description.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeImportOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_import::DescribeImportOutput { aws_sdk_dynamodb::operation::describe_import::DescribeImportOutput::builder() - .set_import_table_description(Some( crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::from_dafny(dafny_value.ImportTableDescription().clone()) - )) - .build() - - + .set_import_table_description(Some( + crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::from_dafny( + dafny_value.ImportTableDescription().clone(), + ), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination.rs index 886273ace..d7e7715cc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationError::InternalServerError(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_kinesis_streaming_destination_request; +pub mod _describe_kinesis_streaming_destination_request; - pub mod _describe_kinesis_streaming_destination_response; +pub mod _describe_kinesis_streaming_destination_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_request.rs index 2ffa3ef3d..5eba29da3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_request.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationInput, > -) -> aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationInput { +) -> aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationInput{ aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_response.rs index e2e9adf96..331eff289 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_kinesis_streaming_destination/_describe_kinesis_streaming_destination_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), - KinesisDataStreamDestinations: ::std::rc::Rc::new(match &value.kinesis_data_stream_destinations { + KinesisDataStreamDestinations: ::dafny_runtime::Rc::new(match &value.kinesis_data_stream_destinations { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::kinesis_data_stream_destination::to_dafny(e) @@ -21,19 +21,19 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeKinesisStreamingDestinationOutput, > -) -> aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationOutput { +) -> aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationOutput{ aws_sdk_dynamodb::operation::describe_kinesis_streaming_destination::DescribeKinesisStreamingDestinationOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) .set_kinesis_data_stream_destinations(match (*dafny_value.KinesisDataStreamDestinations()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::kinesis_data_stream_destination::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::kinesis_data_stream_destination::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits.rs index 27c7aa723..1c3014e70 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _describe_limits_request; +pub mod _describe_limits_request; - pub mod _describe_limits_response; +pub mod _describe_limits_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_request.rs index 37c4dde91..5f0f313ff 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_request.rs @@ -4,21 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsInput::DescribeLimitsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsInput::DescribeLimitsInput { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsInput { aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsInput::builder() - - .build() - .unwrap() + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_response.rs index dc570fc1f..0799e5402 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_limits/_describe_limits_response.rs @@ -4,28 +4,36 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsOutput::DescribeLimitsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsOutput::DescribeLimitsOutput { AccountMaxReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.account_max_read_capacity_units), AccountMaxWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.account_max_write_capacity_units), TableMaxReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.table_max_read_capacity_units), TableMaxWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.table_max_write_capacity_units), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeLimitsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsOutput { aws_sdk_dynamodb::operation::describe_limits::DescribeLimitsOutput::builder() - .set_account_max_read_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.AccountMaxReadCapacityUnits().clone())) - .set_account_max_write_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.AccountMaxWriteCapacityUnits().clone())) - .set_table_max_read_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.TableMaxReadCapacityUnits().clone())) - .set_table_max_write_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.TableMaxWriteCapacityUnits().clone())) - .build() - - + .set_account_max_read_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.AccountMaxReadCapacityUnits().clone(), + )) + .set_account_max_write_capacity_units( + crate::standard_library_conversions::olong_from_dafny( + dafny_value.AccountMaxWriteCapacityUnits().clone(), + ), + ) + .set_table_max_read_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.TableMaxReadCapacityUnits().clone(), + )) + .set_table_max_write_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.TableMaxWriteCapacityUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table.rs index bbc02f9a9..f80ce5322 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_table::DescribeTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_table::DescribeTableError::InternalServerError(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_table_request; +pub mod _describe_table_request; - pub mod _describe_table_response; +pub mod _describe_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_request.rs index b4b45e88c..4213cb1e5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_table::DescribeTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableInput::DescribeTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableInput::DescribeTableInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_table::DescribeTableInput { aws_sdk_dynamodb::operation::describe_table::DescribeTableInput::builder() - .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) - .build() - .unwrap() + .set_table_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TableName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_response.rs index 8f3dddba9..f868471b7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table/_describe_table_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_table::DescribeTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableOutput::DescribeTableOutput { - Table: ::std::rc::Rc::new(match &value.table { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableOutput::DescribeTableOutput { + Table: ::dafny_runtime::Rc::new(match &value.table { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_table::DescribeTableOutput { aws_sdk_dynamodb::operation::describe_table::DescribeTableOutput::builder() - .set_table(match (*dafny_value.Table()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_table(match (*dafny_value.Table()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling.rs index f0b68f71b..29df51f97 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _describe_table_replica_auto_scaling_request; +pub mod _describe_table_replica_auto_scaling_request; - pub mod _describe_table_replica_auto_scaling_response; +pub mod _describe_table_replica_auto_scaling_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_request.rs index b9b556b71..83b295f4a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_request.rs @@ -4,19 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingInput, > -) -> aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingInput { +) -> aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingInput{ aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .build() diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_response.rs index 08a5afab4..128124785 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_table_replica_auto_scaling/_describe_table_replica_auto_scaling_response.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput { - TableAutoScalingDescription: ::std::rc::Rc::new(match &value.table_auto_scaling_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput { + TableAutoScalingDescription: ::dafny_runtime::Rc::new(match &value.table_auto_scaling_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_auto_scaling_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTableReplicaAutoScalingOutput, > -) -> aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingOutput { +) -> aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingOutput{ aws_sdk_dynamodb::operation::describe_table_replica_auto_scaling::DescribeTableReplicaAutoScalingOutput::builder() .set_table_auto_scaling_description(match (*dafny_value.TableAutoScalingDescription()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live.rs index 7ba2fc208..bffffec64 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveError::InternalServerError(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_time_to_live_request; +pub mod _describe_time_to_live_request; - pub mod _describe_time_to_live_response; +pub mod _describe_time_to_live_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_request.rs index 66f0e1bb8..9bb1b502c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveInput::DescribeTimeToLiveInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveInput::DescribeTimeToLiveInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveInput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveInput { aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveInput::builder() - .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) - .build() - .unwrap() + .set_table_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TableName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_response.rs index 78ec78b4c..e55873f0e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/describe_time_to_live/_describe_time_to_live_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveOutput::DescribeTimeToLiveOutput { - TimeToLiveDescription: ::std::rc::Rc::new(match &value.time_to_live_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveOutput::DescribeTimeToLiveOutput { + TimeToLiveDescription: ::dafny_runtime::Rc::new(match &value.time_to_live_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DescribeTimeToLiveOutput, - > + >, ) -> aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveOutput { aws_sdk_dynamodb::operation::describe_time_to_live::DescribeTimeToLiveOutput::builder() .set_time_to_live_description(match (*dafny_value.TimeToLiveDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/destination_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/destination_status.rs index 53288c3fa..594c44e84 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/destination_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/destination_status.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::DestinationStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::DestinationStatus::Enabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DestinationStatus::ENABLING {}, aws_sdk_dynamodb::types::DestinationStatus::Active => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DestinationStatus::ACTIVE {}, aws_sdk_dynamodb::types::DestinationStatus::Disabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DestinationStatus::DISABLING {}, @@ -16,7 +16,7 @@ aws_sdk_dynamodb::types::DestinationStatus::Updating => crate::r#software::amazo _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DestinationStatus, ) -> aws_sdk_dynamodb::types::DestinationStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination.rs index 5a2f9cf59..ff5e7857d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _disable_kinesis_streaming_destination_request; +pub mod _disable_kinesis_streaming_destination_request; - pub mod _disable_kinesis_streaming_destination_response; +pub mod _disable_kinesis_streaming_destination_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_request.rs index c5628cc45..7dbbc3372 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_request.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn) .Extract(), - EnableKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.enable_kinesis_streaming_configuration { + EnableKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.enable_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationInput, > -) -> aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationInput { +) -> aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationInput{ aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_stream_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.StreamArn()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_response.rs index ef22f91e1..9dfb42d8a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/disable_kinesis_streaming_destination/_disable_kinesis_streaming_destination_response.rs @@ -4,30 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn), - DestinationStatus: ::std::rc::Rc::new(match &value.destination_status { + DestinationStatus: ::dafny_runtime::Rc::new(match &value.destination_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::destination_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - EnableKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.enable_kinesis_streaming_configuration { + EnableKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.enable_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::DisableKinesisStreamingDestinationOutput, > -) -> aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationOutput { +) -> aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationOutput{ aws_sdk_dynamodb::operation::disable_kinesis_streaming_destination::DisableKinesisStreamingDestinationOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) .set_stream_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.StreamArn().clone())) @@ -45,6 +45,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_configuration.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_configuration.rs index bfec2234b..b2908fc3c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_configuration.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_configuration.rs @@ -4,19 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::EnableKinesisStreamingConfiguration, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: ::std::rc::Rc::new(match &value.approximate_creation_date_time_precision { + ApproximateCreationDateTimePrecision: ::dafny_runtime::Rc::new(match &value.approximate_creation_date_time_precision { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::approximate_creation_date_time_precision::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingConfiguration, >, ) -> aws_sdk_dynamodb::types::EnableKinesisStreamingConfiguration { @@ -29,5 +30,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination.rs index f5bbdcc98..d316f239e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _enable_kinesis_streaming_destination_request; +pub mod _enable_kinesis_streaming_destination_request; - pub mod _enable_kinesis_streaming_destination_response; +pub mod _enable_kinesis_streaming_destination_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_request.rs index 75d7247d8..8a8783cda 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_request.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn) .Extract(), - EnableKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.enable_kinesis_streaming_configuration { + EnableKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.enable_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationInput, > -) -> aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationInput { +) -> aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationInput{ aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_stream_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.StreamArn()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_response.rs index 228e71a6a..922bfb6db 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/enable_kinesis_streaming_destination/_enable_kinesis_streaming_destination_response.rs @@ -4,30 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn), - DestinationStatus: ::std::rc::Rc::new(match &value.destination_status { + DestinationStatus: ::dafny_runtime::Rc::new(match &value.destination_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::destination_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - EnableKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.enable_kinesis_streaming_configuration { + EnableKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.enable_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::enable_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::EnableKinesisStreamingDestinationOutput, > -) -> aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationOutput { +) -> aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationOutput{ aws_sdk_dynamodb::operation::enable_kinesis_streaming_destination::EnableKinesisStreamingDestinationOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) .set_stream_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.StreamArn().clone())) @@ -45,6 +45,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/endpoint.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/endpoint.rs index 0d33c9f4f..e08e7a530 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/endpoint.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/endpoint.rs @@ -4,22 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Endpoint, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Endpoint, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Endpoint::Endpoint { Address: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.address), CachePeriodInMinutes: value.cache_period_in_minutes, } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Endpoint, >, ) -> aws_sdk_dynamodb::types::Endpoint { aws_sdk_dynamodb::types::Endpoint::builder() - .set_address(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Address()) )) - .set_cache_period_in_minutes(Some( dafny_value.CachePeriodInMinutes() .clone() )) - .build() - .unwrap() + .set_address(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Address(), + ), + )) + .set_cache_period_in_minutes(Some(dafny_value.CachePeriodInMinutes().clone())) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error.rs index 17450bcf7..76430bb5e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error.rs @@ -3,79 +3,85 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod backup_in_use_exception; - pub mod backup_not_found_exception; +pub mod backup_not_found_exception; - pub mod conditional_check_failed_exception; +pub mod conditional_check_failed_exception; - pub mod continuous_backups_unavailable_exception; +pub mod continuous_backups_unavailable_exception; - pub mod duplicate_item_exception; +pub mod duplicate_item_exception; - pub mod export_conflict_exception; +pub mod export_conflict_exception; - pub mod export_not_found_exception; +pub mod export_not_found_exception; - pub mod global_table_already_exists_exception; +pub mod global_table_already_exists_exception; - pub mod global_table_not_found_exception; +pub mod global_table_not_found_exception; - pub mod idempotent_parameter_mismatch_exception; +pub mod idempotent_parameter_mismatch_exception; - pub mod import_conflict_exception; +pub mod import_conflict_exception; - pub mod import_not_found_exception; +pub mod import_not_found_exception; - pub mod index_not_found_exception; +pub mod index_not_found_exception; - pub mod internal_server_error; +pub mod internal_server_error; - pub mod invalid_endpoint_exception; +pub mod invalid_endpoint_exception; - pub mod invalid_export_time_exception; +pub mod invalid_export_time_exception; - pub mod invalid_restore_time_exception; +pub mod invalid_restore_time_exception; - pub mod item_collection_size_limit_exceeded_exception; +pub mod item_collection_size_limit_exceeded_exception; - pub mod limit_exceeded_exception; +pub mod limit_exceeded_exception; - pub mod point_in_time_recovery_unavailable_exception; +pub mod point_in_time_recovery_unavailable_exception; - pub mod policy_not_found_exception; +pub mod policy_not_found_exception; - pub mod provisioned_throughput_exceeded_exception; +pub mod provisioned_throughput_exceeded_exception; - pub mod replica_already_exists_exception; +pub mod replica_already_exists_exception; - pub mod replica_not_found_exception; +pub mod replica_not_found_exception; - pub mod request_limit_exceeded; +pub mod request_limit_exceeded; - pub mod resource_in_use_exception; +pub mod resource_in_use_exception; - pub mod resource_not_found_exception; +pub mod resource_not_found_exception; - pub mod table_already_exists_exception; +pub mod table_already_exists_exception; - pub mod table_in_use_exception; +pub mod table_in_use_exception; - pub mod table_not_found_exception; +pub mod table_not_found_exception; - pub mod transaction_canceled_exception; +pub mod transaction_canceled_exception; - pub mod transaction_conflict_exception; +pub mod transaction_conflict_exception; - pub mod transaction_in_progress_exception; - /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub mod transaction_in_progress_exception; +/// Wraps up an arbitrary Rust Error value as a Dafny Error +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -85,20 +91,22 @@ pub fn to_opaque_error(value: String) -> /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< + ::dafny_runtime::Rc< crate::_Wrappers_Compile::Result< T, - ::std::rc::Rc + ::dafny_runtime::Rc > > { - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::com_amazonaws_dynamodb::types::error::Error, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { crate::deps::com_amazonaws_dynamodb::types::error::Error::BackupInUseException { error } => crate::deps::com_amazonaws_dynamodb::conversions::error::backup_in_use_exception::to_dafny(error), @@ -167,11 +175,11 @@ crate::deps::com_amazonaws_dynamodb::types::error::Error::TransactionConflictExc crate::deps::com_amazonaws_dynamodb::types::error::Error::TransactionInProgressException { error } => crate::deps::com_amazonaws_dynamodb::conversions::error::transaction_in_progress_exception::to_dafny(error), crate::deps::com_amazonaws_dynamodb::types::error::Error::Opaque { obj } => - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::Opaque { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::Opaque { obj: ::dafny_runtime::Object(obj.0) }), crate::deps::com_amazonaws_dynamodb::types::error::Error::OpaqueWithText { obj, objMessage } => - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::OpaqueWithText { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::OpaqueWithText { obj: ::dafny_runtime::Object(obj.0), objMessage: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&objMessage), }), @@ -180,7 +188,7 @@ crate::deps::com_amazonaws_dynamodb::types::error::Error::TransactionInProgressE #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, >, ) -> crate::deps::com_amazonaws_dynamodb::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_in_use_exception.rs index 6281c3753..24fdb3a32 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::BackupInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::BackupInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_not_found_exception.rs index 7a88f5d06..a5244a2f5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/backup_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::BackupNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::BackupNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/conditional_check_failed_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/conditional_check_failed_exception.rs index dc580e8a2..eec3acd8e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/conditional_check_failed_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/conditional_check_failed_exception.rs @@ -4,12 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ConditionalCheckFailedException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ConditionalCheckFailedException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), Item: -::std::rc::Rc::new(match &value.item { +::dafny_runtime::Rc::new(match &value.item { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/continuous_backups_unavailable_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/continuous_backups_unavailable_exception.rs index c13de5fba..72ccf5dc8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/continuous_backups_unavailable_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/continuous_backups_unavailable_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ContinuousBackupsUnavailableException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ContinuousBackupsUnavailableException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/duplicate_item_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/duplicate_item_exception.rs index c1783796f..6fb6709fe 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/duplicate_item_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/duplicate_item_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::DuplicateItemException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::DuplicateItemException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_conflict_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_conflict_exception.rs index b795996fa..e3f48202c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_conflict_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_conflict_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ExportConflictException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ExportConflictException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_not_found_exception.rs index c7492a3ad..fc8881806 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/export_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ExportNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ExportNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_already_exists_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_already_exists_exception.rs index 41dd285ae..b524b0585 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_already_exists_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_already_exists_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::GlobalTableAlreadyExistsException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::GlobalTableAlreadyExistsException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_not_found_exception.rs index a37921883..0d71f77fd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/global_table_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::GlobalTableNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::GlobalTableNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/idempotent_parameter_mismatch_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/idempotent_parameter_mismatch_exception.rs index 870de4f3f..5fdd35dfe 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/idempotent_parameter_mismatch_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/idempotent_parameter_mismatch_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::IdempotentParameterMismatchException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::IdempotentParameterMismatchException { Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_conflict_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_conflict_exception.rs index 122c1568d..0ffb308b0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_conflict_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_conflict_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ImportConflictException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ImportConflictException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_not_found_exception.rs index 2f688744a..23514599f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/import_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ImportNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ImportNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/index_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/index_not_found_exception.rs index ae396b263..801c46528 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/index_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/index_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::IndexNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::IndexNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/internal_server_error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/internal_server_error.rs index a3816ac79..87232ee3d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/internal_server_error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/internal_server_error.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::InternalServerError, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::InternalServerError { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_endpoint_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_endpoint_exception.rs index a96d93843..63d254c91 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_endpoint_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_endpoint_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::InvalidEndpointException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::InvalidEndpointException { Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_export_time_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_export_time_exception.rs index edb0519be..e934215a0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_export_time_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_export_time_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::InvalidExportTimeException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::InvalidExportTimeException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_restore_time_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_restore_time_exception.rs index bb59a698e..9eceee3c8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_restore_time_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/invalid_restore_time_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::InvalidRestoreTimeException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::InvalidRestoreTimeException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/item_collection_size_limit_exceeded_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/item_collection_size_limit_exceeded_exception.rs index 867f55c57..3e81de307 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/item_collection_size_limit_exceeded_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/item_collection_size_limit_exceeded_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ItemCollectionSizeLimitExceededException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ItemCollectionSizeLimitExceededException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/limit_exceeded_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/limit_exceeded_exception.rs index ee15bff66..f18914194 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/limit_exceeded_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/limit_exceeded_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::LimitExceededException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::LimitExceededException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/point_in_time_recovery_unavailable_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/point_in_time_recovery_unavailable_exception.rs index 76b0f0d13..1ddc12f0e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/point_in_time_recovery_unavailable_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/point_in_time_recovery_unavailable_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::PointInTimeRecoveryUnavailableException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::PointInTimeRecoveryUnavailableException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/policy_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/policy_not_found_exception.rs index 6673102c2..bec209c53 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/policy_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/policy_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::PolicyNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::PolicyNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/provisioned_throughput_exceeded_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/provisioned_throughput_exceeded_exception.rs index bc2a2a249..88bf8e85a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/provisioned_throughput_exceeded_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/provisioned_throughput_exceeded_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ProvisionedThroughputExceededException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ProvisionedThroughputExceededException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_already_exists_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_already_exists_exception.rs index b84a15ba1..6356fa93d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_already_exists_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_already_exists_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ReplicaAlreadyExistsException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ReplicaAlreadyExistsException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_not_found_exception.rs index 46f28aff0..15c393107 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/replica_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ReplicaNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ReplicaNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/request_limit_exceeded.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/request_limit_exceeded.rs index f3e140f33..87515c150 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/request_limit_exceeded.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/request_limit_exceeded.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::RequestLimitExceeded, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::RequestLimitExceeded { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_in_use_exception.rs index d1380a0c3..ffd7439a2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ResourceInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ResourceInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_not_found_exception.rs index 01f18020d..3d332668f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/resource_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::ResourceNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::ResourceNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_already_exists_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_already_exists_exception.rs index 5db04ad71..f21558a39 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_already_exists_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_already_exists_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TableAlreadyExistsException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TableAlreadyExistsException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_in_use_exception.rs index 5197f544d..5a4dfb74e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TableInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TableInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_not_found_exception.rs index 17798f992..cbdddd716 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/table_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TableNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TableNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_canceled_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_canceled_exception.rs index c1a1cf71a..03b254874 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_canceled_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_canceled_exception.rs @@ -4,11 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TransactionCanceledException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TransactionCanceledException { Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), - CancellationReasons: ::std::rc::Rc::new(match &value.cancellation_reasons { + CancellationReasons: ::dafny_runtime::Rc::new(match &value.cancellation_reasons { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::cancellation_reason::to_dafny(e) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_conflict_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_conflict_exception.rs index 28376e335..692b90ee5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_conflict_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_conflict_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TransactionConflictException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TransactionConflictException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_in_progress_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_in_progress_exception.rs index 753ada5f9..9fc94597f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_in_progress_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/error/transaction_in_progress_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_dynamodb::types::error::TransactionInProgressException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error::TransactionInProgressException { Message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement.rs index 67e798166..69e839593 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementError::ConditionalCheckFailedException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _execute_statement_request; +pub mod _execute_statement_request; - pub mod _execute_statement_response; +pub mod _execute_statement_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_request.rs index d7ca59021..d6fbaa8b8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_request.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput::ExecuteStatementInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput::ExecuteStatementInput { Statement: crate::standard_library_conversions::ostring_to_dafny(&value.statement) .Extract(), - Parameters: ::std::rc::Rc::new(match &value.parameters { + Parameters: ::dafny_runtime::Rc::new(match &value.parameters { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(e) @@ -21,7 +21,7 @@ pub fn to_dafny( , ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -29,11 +29,11 @@ pub fn to_dafny( Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput, - > + >, ) -> aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementInput { aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementInput::builder() .set_statement(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Statement()) )) @@ -41,7 +41,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_response.rs index f0db6132e..310ee21f6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_statement/_execute_statement_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput::ExecuteStatementOutput { - Items: ::std::rc::Rc::new(match &value.items { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput::ExecuteStatementOutput { + Items: ::dafny_runtime::Rc::new(match &value.items { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&e.clone(), @@ -23,13 +23,13 @@ pub fn to_dafny( }) , NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , LastEvaluatedKey: -::std::rc::Rc::new(match &value.last_evaluated_key { +::dafny_runtime::Rc::new(match &value.last_evaluated_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -42,20 +42,20 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput, - > + >, ) -> aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementOutput { aws_sdk_dynamodb::operation::execute_statement::ExecuteStatementOutput::builder() .set_items(match (*dafny_value.Items()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, + |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) , @@ -76,7 +76,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -84,6 +84,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction.rs index 4e90435cb..96fd324d2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionError::IdempotentParameterMismatchException(e) => @@ -36,6 +38,6 @@ pub fn to_dafny_error( } } - pub mod _execute_transaction_request; +pub mod _execute_transaction_request; - pub mod _execute_transaction_response; +pub mod _execute_transaction_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_request.rs index 68b8a6412..e363455ba 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_request.rs @@ -4,32 +4,32 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput::ExecuteTransactionInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput::ExecuteTransactionInput { TransactStatements: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.transact_statements.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::parameterized_statement::to_dafny(e) , ) , ClientRequestToken: crate::standard_library_conversions::ostring_to_dafny(&value.client_request_token), - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput, - > + >, ) -> aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionInput { aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionInput::builder() .set_transact_statements(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.TransactStatements(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::parameterized_statement::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::parameterized_statement::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_response.rs index 21bbe3556..8a2542350 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/execute_transaction/_execute_transaction_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput::ExecuteTransactionOutput { - Responses: ::std::rc::Rc::new(match &value.responses { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput::ExecuteTransactionOutput { + Responses: ::dafny_runtime::Rc::new(match &value.responses { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::item_response::to_dafny(e) @@ -18,7 +18,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -30,18 +30,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput, - > + >, ) -> aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionOutput { aws_sdk_dynamodb::operation::execute_transaction::ExecuteTransactionOutput::builder() .set_responses(match (*dafny_value.Responses()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_response::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_response::from_dafny(e.clone()) , ) ), @@ -52,7 +52,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -60,6 +60,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/expected_attribute_value.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/expected_attribute_value.rs index 6d34597d7..1a76f1f63 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/expected_attribute_value.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/expected_attribute_value.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ExpectedAttributeValue, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExpectedAttributeValue::ExpectedAttributeValue { - Value: ::std::rc::Rc::new(match &value.value { + Value: ::dafny_runtime::Rc::new(match &value.value { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , Exists: crate::standard_library_conversions::obool_to_dafny(&value.exists), - ComparisonOperator: ::std::rc::Rc::new(match &value.comparison_operator { + ComparisonOperator: ::dafny_runtime::Rc::new(match &value.comparison_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::comparison_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - AttributeValueList: ::std::rc::Rc::new(match &value.attribute_value_list { + AttributeValueList: ::dafny_runtime::Rc::new(match &value.attribute_value_list { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(e) @@ -30,9 +30,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExpectedAttributeValue, >, ) -> aws_sdk_dynamodb::types::ExpectedAttributeValue { @@ -55,7 +56,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), @@ -63,5 +64,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_description.rs index ab8a5956b..4f3a9a0a3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ExportDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportDescription::ExportDescription { ExportArn: crate::standard_library_conversions::ostring_to_dafny(&value.export_arn), - ExportStatus: ::std::rc::Rc::new(match &value.export_status { + ExportStatus: ::dafny_runtime::Rc::new(match &value.export_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -23,7 +23,7 @@ pub fn to_dafny( S3Bucket: crate::standard_library_conversions::ostring_to_dafny(&value.s3_bucket), S3BucketOwner: crate::standard_library_conversions::ostring_to_dafny(&value.s3_bucket_owner), S3Prefix: crate::standard_library_conversions::ostring_to_dafny(&value.s3_prefix), - S3SseAlgorithm: ::std::rc::Rc::new(match &value.s3_sse_algorithm { + S3SseAlgorithm: ::dafny_runtime::Rc::new(match &value.s3_sse_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::s3_sse_algorithm::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -31,28 +31,29 @@ pub fn to_dafny( S3SseKmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.s3_sse_kms_key_id), FailureCode: crate::standard_library_conversions::ostring_to_dafny(&value.failure_code), FailureMessage: crate::standard_library_conversions::ostring_to_dafny(&value.failure_message), - ExportFormat: ::std::rc::Rc::new(match &value.export_format { + ExportFormat: ::dafny_runtime::Rc::new(match &value.export_format { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_format::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , BilledSizeBytes: crate::standard_library_conversions::olong_to_dafny(&value.billed_size_bytes), ItemCount: crate::standard_library_conversions::olong_to_dafny(&value.item_count), - ExportType: ::std::rc::Rc::new(match &value.export_type { + ExportType: ::dafny_runtime::Rc::new(match &value.export_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - IncrementalExportSpecification: ::std::rc::Rc::new(match &value.incremental_export_specification { + IncrementalExportSpecification: ::dafny_runtime::Rc::new(match &value.incremental_export_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::incremental_export_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportDescription, >, ) -> aws_sdk_dynamodb::types::ExportDescription { @@ -108,5 +109,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_format.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_format.rs index b11826b94..1fe1aa14f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_format.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_format.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ExportFormat, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportFormat, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ExportFormat::DynamodbJson => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportFormat::DYNAMODB_JSON {}, aws_sdk_dynamodb::types::ExportFormat::Ion => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportFormat::ION {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportFormat, ) -> aws_sdk_dynamodb::types::ExportFormat { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_status.rs index 563108871..6e2b3f069 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_status.rs @@ -5,15 +5,17 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ExportStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ExportStatus::InProgress => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportStatus::IN_PROGRESS {}, aws_sdk_dynamodb::types::ExportStatus::Completed => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportStatus::COMPLETED {}, aws_sdk_dynamodb::types::ExportStatus::Failed => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportStatus::FAILED {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportStatus, ) -> aws_sdk_dynamodb::types::ExportStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_summary.rs index facc7ed66..2c50da1a2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_summary.rs @@ -4,44 +4,44 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ExportSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportSummary::ExportSummary { ExportArn: crate::standard_library_conversions::ostring_to_dafny(&value.export_arn), - ExportStatus: ::std::rc::Rc::new(match &value.export_status { + ExportStatus: ::dafny_runtime::Rc::new(match &value.export_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ExportType: ::std::rc::Rc::new(match &value.export_type { + ExportType: ::dafny_runtime::Rc::new(match &value.export_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportSummary, >, ) -> aws_sdk_dynamodb::types::ExportSummary { aws_sdk_dynamodb::types::ExportSummary::builder() - .set_export_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExportArn().clone())) - .set_export_status(match &**dafny_value.ExportStatus() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::export_status::from_dafny(value) - ), - _ => None, -} -) - .set_export_type(match &**dafny_value.ExportType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::export_type::from_dafny(value) - ), - _ => None, -} -) - .build() - + .set_export_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExportArn().clone(), + )) + .set_export_status(match &**dafny_value.ExportStatus() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::export_status::from_dafny(value), + ), + _ => None, + }) + .set_export_type(match &**dafny_value.ExportType() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::export_type::from_dafny(value), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time.rs index 4ff958417..2c65b1921 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeError::ExportConflictException(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _export_table_to_point_in_time_request; +pub mod _export_table_to_point_in_time_request; - pub mod _export_table_to_point_in_time_response; +pub mod _export_table_to_point_in_time_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_request.rs index b0bb05488..732371b74 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_request.rs @@ -4,44 +4,44 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeInput::ExportTableToPointInTimeInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeInput::ExportTableToPointInTimeInput { TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn) .Extract(), ExportTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.export_time), ClientToken: crate::standard_library_conversions::ostring_to_dafny(&value.client_token), S3Bucket: crate::standard_library_conversions::ostring_to_dafny(&value.s3_bucket) .Extract(), S3BucketOwner: crate::standard_library_conversions::ostring_to_dafny(&value.s3_bucket_owner), S3Prefix: crate::standard_library_conversions::ostring_to_dafny(&value.s3_prefix), - S3SseAlgorithm: ::std::rc::Rc::new(match &value.s3_sse_algorithm { + S3SseAlgorithm: ::dafny_runtime::Rc::new(match &value.s3_sse_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::s3_sse_algorithm::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , S3SseKmsKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.s3_sse_kms_key_id), - ExportFormat: ::std::rc::Rc::new(match &value.export_format { + ExportFormat: ::dafny_runtime::Rc::new(match &value.export_format { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_format::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ExportType: ::std::rc::Rc::new(match &value.export_type { + ExportType: ::dafny_runtime::Rc::new(match &value.export_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - IncrementalExportSpecification: ::std::rc::Rc::new(match &value.incremental_export_specification { + IncrementalExportSpecification: ::dafny_runtime::Rc::new(match &value.incremental_export_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::incremental_export_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeInput, - > + >, ) -> aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeInput { aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeInput::builder() .set_table_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableArn()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_response.rs index 541ef2f5c..fc9116e00 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_table_to_point_in_time/_export_table_to_point_in_time_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput { - ExportDescription: ::std::rc::Rc::new(match &value.export_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput { + ExportDescription: ::dafny_runtime::Rc::new(match &value.export_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportTableToPointInTimeOutput, - > + >, ) -> aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeOutput { aws_sdk_dynamodb::operation::export_table_to_point_in_time::ExportTableToPointInTimeOutput::builder() .set_export_description(match (*dafny_value.ExportDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_type.rs index 39063076c..427d93f2e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ExportType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ExportType::FullExport => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportType::FULL_EXPORT {}, aws_sdk_dynamodb::types::ExportType::IncrementalExport => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportType::INCREMENTAL_EXPORT {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportType, ) -> aws_sdk_dynamodb::types::ExportType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_view_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_view_type.rs index b0ea372be..096428d07 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_view_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/export_view_type.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ExportViewType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ExportViewType::NewImage => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportViewType::NEW_IMAGE {}, aws_sdk_dynamodb::types::ExportViewType::NewAndOldImages => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportViewType::NEW_AND_OLD_IMAGES {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ExportViewType, ) -> aws_sdk_dynamodb::types::ExportViewType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/failure_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/failure_exception.rs index 5da1c85a7..46c006f54 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/failure_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/failure_exception.rs @@ -4,22 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::FailureException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::FailureException::FailureException { ExceptionName: crate::standard_library_conversions::ostring_to_dafny(&value.exception_name), ExceptionDescription: crate::standard_library_conversions::ostring_to_dafny(&value.exception_description), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::FailureException, >, ) -> aws_sdk_dynamodb::types::FailureException { aws_sdk_dynamodb::types::FailureException::builder() - .set_exception_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExceptionName().clone())) - .set_exception_description(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExceptionDescription().clone())) - .build() - + .set_exception_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExceptionName().clone(), + )) + .set_exception_description(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExceptionDescription().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get.rs index fef8977e6..3f25e8486 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Get, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Get, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Get::Get { Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +18,7 @@ pub fn to_dafny( TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), ProjectionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.projection_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -28,16 +30,17 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Get, >, ) -> aws_sdk_dynamodb::types::Get { aws_sdk_dynamodb::types::Get::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item.rs index d9d77a837..07f584611 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::get_item::GetItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::get_item::GetItemError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _get_item_request; +pub mod _get_item_request; - pub mod _get_item_response; +pub mod _get_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_request.rs index 79cf30fe4..7c002480a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::get_item::GetItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput::GetItemInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput::GetItemInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -15,7 +15,7 @@ pub fn to_dafny( , ) , - AttributesToGet: ::std::rc::Rc::new(match &value.attributes_to_get { + AttributesToGet: ::dafny_runtime::Rc::new(match &value.attributes_to_get { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -25,14 +25,14 @@ pub fn to_dafny( }) , ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ProjectionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.projection_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -44,17 +44,17 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::get_item::GetItemInput { aws_sdk_dynamodb::operation::get_item::GetItemInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_response.rs index 35e5926c9..eea713e6e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_item/_get_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::get_item::GetItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput::GetItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput::GetItemOutput { Item: -::std::rc::Rc::new(match &value.item { +::dafny_runtime::Rc::new(match &value.item { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,18 +20,18 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::get_item::GetItemOutput { aws_sdk_dynamodb::operation::get_item::GetItemOutput::builder() .set_item(match (*dafny_value.Item()).as_ref() { @@ -39,7 +39,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -53,6 +53,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy.rs index 13d5b51e4..53849361a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyError::InternalServerError(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _get_resource_policy_request; +pub mod _get_resource_policy_request; - pub mod _get_resource_policy_response; +pub mod _get_resource_policy_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_request.rs index 02c946d6d..55d681d86 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyInput::GetResourcePolicyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyInput::GetResourcePolicyInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyInput, - > + >, ) -> aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyInput { aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyInput::builder() - .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) - .build() - .unwrap() + .set_resource_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ResourceArn(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_response.rs index f45837df7..a9d636563 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/get_resource_policy/_get_resource_policy_response.rs @@ -4,24 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyOutput::GetResourcePolicyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyOutput::GetResourcePolicyOutput { Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy), RevisionId: crate::standard_library_conversions::ostring_to_dafny(&value.revision_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GetResourcePolicyOutput, - > + >, ) -> aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyOutput { aws_sdk_dynamodb::operation::get_resource_policy::GetResourcePolicyOutput::builder() - .set_policy(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Policy().clone())) - .set_revision_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RevisionId().clone())) - .build() - - + .set_policy(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Policy().clone(), + )) + .set_revision_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.RevisionId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index.rs index c30a817b2..293d3b00d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalSecondaryIndex, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndex::GlobalSecondaryIndex { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), KeySchema: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.key_schema, @@ -15,28 +15,29 @@ pub fn to_dafny( , Projection: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(&value.projection.clone().unwrap()) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndex, >, ) -> aws_sdk_dynamodb::types::GlobalSecondaryIndex { aws_sdk_dynamodb::types::GlobalSecondaryIndex::builder() .set_index_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.IndexName()) )) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_auto_scaling_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_auto_scaling_update.rs index a092411b3..06c6a099e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_auto_scaling_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_auto_scaling_update.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalSecondaryIndexAutoScalingUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ProvisionedWriteCapacityAutoScalingUpdate: ::std::rc::Rc::new(match &value.provisioned_write_capacity_auto_scaling_update { + ProvisionedWriteCapacityAutoScalingUpdate: ::dafny_runtime::Rc::new(match &value.provisioned_write_capacity_auto_scaling_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexAutoScalingUpdate, >, ) -> aws_sdk_dynamodb::types::GlobalSecondaryIndexAutoScalingUpdate { @@ -30,5 +31,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_description.rs index ed1ffbfd5..eba0bcdbe 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalSecondaryIndexDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - KeySchema: ::std::rc::Rc::new(match &value.key_schema { + KeySchema: ::dafny_runtime::Rc::new(match &value.key_schema { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::to_dafny(e) @@ -18,18 +18,18 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Projection: ::std::rc::Rc::new(match &value.projection { + Projection: ::dafny_runtime::Rc::new(match &value.projection { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - IndexStatus: ::std::rc::Rc::new(match &value.index_status { + IndexStatus: ::dafny_runtime::Rc::new(match &value.index_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::index_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , Backfilling: crate::standard_library_conversions::obool_to_dafny(&value.backfilling), - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -37,16 +37,17 @@ pub fn to_dafny( IndexSizeBytes: crate::standard_library_conversions::olong_to_dafny(&value.index_size_bytes), ItemCount: crate::standard_library_conversions::olong_to_dafny(&value.item_count), IndexArn: crate::standard_library_conversions::ostring_to_dafny(&value.index_arn), - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexDescription, >, ) -> aws_sdk_dynamodb::types::GlobalSecondaryIndexDescription { @@ -56,7 +57,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) ), @@ -93,5 +94,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_info.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_info.rs index 9d89e817d..c31e3fcdf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_info.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_info.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalSecondaryIndexInfo, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - KeySchema: ::std::rc::Rc::new(match &value.key_schema { + KeySchema: ::dafny_runtime::Rc::new(match &value.key_schema { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::to_dafny(e) @@ -18,26 +18,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Projection: ::std::rc::Rc::new(match &value.projection { + Projection: ::dafny_runtime::Rc::new(match &value.projection { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexInfo, >, ) -> aws_sdk_dynamodb::types::GlobalSecondaryIndexInfo { @@ -47,7 +48,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) ), @@ -73,5 +74,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_update.rs index d532e03e8..a81f6f450 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_secondary_index_update.rs @@ -4,29 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalSecondaryIndexUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate { - Update: ::std::rc::Rc::new(match &value.update { + Update: ::dafny_runtime::Rc::new(match &value.update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::update_global_secondary_index_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Create: ::std::rc::Rc::new(match &value.create { + Create: ::dafny_runtime::Rc::new(match &value.create { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::create_global_secondary_index_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Delete: ::std::rc::Rc::new(match &value.delete { + Delete: ::dafny_runtime::Rc::new(match &value.delete { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::delete_global_secondary_index_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalSecondaryIndexUpdate, >, ) -> aws_sdk_dynamodb::types::GlobalSecondaryIndexUpdate { @@ -50,5 +51,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table.rs index 3d96ab990..c44a88e19 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table.rs @@ -4,11 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalTable, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTable, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTable::GlobalTable { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name), - ReplicationGroup: ::std::rc::Rc::new(match &value.replication_group { + ReplicationGroup: ::dafny_runtime::Rc::new(match &value.replication_group { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica::to_dafny(e) @@ -20,9 +22,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTable, >, ) -> aws_sdk_dynamodb::types::GlobalTable { @@ -32,7 +35,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica::from_dafny(e.clone()) , ) ), @@ -40,5 +43,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_description.rs index 72d718c60..b964fabc9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_description.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalTableDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableDescription::GlobalTableDescription { - ReplicationGroup: ::std::rc::Rc::new(match &value.replication_group { + ReplicationGroup: ::dafny_runtime::Rc::new(match &value.replication_group { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::to_dafny(e) @@ -19,7 +19,7 @@ pub fn to_dafny( , GlobalTableArn: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_arn), CreationDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.creation_date_time), - GlobalTableStatus: ::std::rc::Rc::new(match &value.global_table_status { + GlobalTableStatus: ::dafny_runtime::Rc::new(match &value.global_table_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::global_table_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -27,9 +27,10 @@ pub fn to_dafny( GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableDescription, >, ) -> aws_sdk_dynamodb::types::GlobalTableDescription { @@ -38,7 +39,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::from_dafny(e.clone()) , ) ), @@ -56,5 +57,4 @@ pub fn from_dafny( ) .set_global_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GlobalTableName().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_global_secondary_index_settings_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_global_secondary_index_settings_update.rs index 59fb7115c..cd07acfbb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_global_secondary_index_settings_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_global_secondary_index_settings_update.rs @@ -4,21 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::GlobalTableGlobalSecondaryIndexSettingsUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), ProvisionedWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.provisioned_write_capacity_units), - ProvisionedWriteCapacityAutoScalingSettingsUpdate: ::std::rc::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings_update { + ProvisionedWriteCapacityAutoScalingSettingsUpdate: ::dafny_runtime::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableGlobalSecondaryIndexSettingsUpdate, >, ) -> aws_sdk_dynamodb::types::GlobalTableGlobalSecondaryIndexSettingsUpdate { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_status.rs index 632a61104..d7598cf0f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/global_table_status.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::GlobalTableStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::GlobalTableStatus::Creating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableStatus::CREATING {}, aws_sdk_dynamodb::types::GlobalTableStatus::Active => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableStatus::ACTIVE {}, aws_sdk_dynamodb::types::GlobalTableStatus::Deleting => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableStatus::DELETING {}, @@ -14,7 +14,7 @@ aws_sdk_dynamodb::types::GlobalTableStatus::Updating => crate::r#software::amazo _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::GlobalTableStatus, ) -> aws_sdk_dynamodb::types::GlobalTableStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_status.rs index a0373b8d4..d2794f889 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_status.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ImportStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ImportStatus::InProgress => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportStatus::IN_PROGRESS {}, aws_sdk_dynamodb::types::ImportStatus::Completed => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportStatus::COMPLETED {}, aws_sdk_dynamodb::types::ImportStatus::Cancelling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportStatus::CANCELLING {}, @@ -15,7 +17,7 @@ aws_sdk_dynamodb::types::ImportStatus::Failed => crate::r#software::amazon::cryp _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportStatus, ) -> aws_sdk_dynamodb::types::ImportStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_summary.rs index 30c510473..d889c4d71 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_summary.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ImportSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportSummary::ImportSummary { ImportArn: crate::standard_library_conversions::ostring_to_dafny(&value.import_arn), - ImportStatus: ::std::rc::Rc::new(match &value.import_status { + ImportStatus: ::dafny_runtime::Rc::new(match &value.import_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::import_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn), - S3BucketSource: ::std::rc::Rc::new(match &value.s3_bucket_source { + S3BucketSource: ::dafny_runtime::Rc::new(match &value.s3_bucket_source { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::s3_bucket_source::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , CloudWatchLogGroupArn: crate::standard_library_conversions::ostring_to_dafny(&value.cloud_watch_log_group_arn), - InputFormat: ::std::rc::Rc::new(match &value.input_format { + InputFormat: ::dafny_runtime::Rc::new(match &value.input_format { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_format::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -29,38 +29,48 @@ pub fn to_dafny( EndTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.end_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportSummary, >, ) -> aws_sdk_dynamodb::types::ImportSummary { aws_sdk_dynamodb::types::ImportSummary::builder() - .set_import_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ImportArn().clone())) - .set_import_status(match &**dafny_value.ImportStatus() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::import_status::from_dafny(value) - ), - _ => None, -} -) - .set_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableArn().clone())) - .set_s3_bucket_source(match (*dafny_value.S3BucketSource()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::s3_bucket_source::from_dafny(value.clone())), - _ => None, -} -) - .set_cloud_watch_log_group_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.CloudWatchLogGroupArn().clone())) - .set_input_format(match &**dafny_value.InputFormat() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::input_format::from_dafny(value) - ), - _ => None, -} -) - .set_start_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.StartTime().clone())) - .set_end_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.EndTime().clone())) - .build() - + .set_import_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ImportArn().clone(), + )) + .set_import_status(match &**dafny_value.ImportStatus() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::import_status::from_dafny(value), + ), + _ => None, + }) + .set_table_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableArn().clone(), + )) + .set_s3_bucket_source(match (*dafny_value.S3BucketSource()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::s3_bucket_source::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .set_cloud_watch_log_group_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.CloudWatchLogGroupArn().clone(), + )) + .set_input_format(match &**dafny_value.InputFormat() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::input_format::from_dafny(value), + ), + _ => None, + }) + .set_start_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.StartTime().clone(), + )) + .set_end_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.EndTime().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table.rs index 3699c845e..970fbc8ee 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::import_table::ImportTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::import_table::ImportTableError::ImportConflictException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _import_table_request; +pub mod _import_table_request; - pub mod _import_table_response; +pub mod _import_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_request.rs index d050352a3..f625f32c9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_request.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::import_table::ImportTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableInput::ImportTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableInput::ImportTableInput { ClientToken: crate::standard_library_conversions::ostring_to_dafny(&value.client_token), S3BucketSource: crate::deps::com_amazonaws_dynamodb::conversions::s3_bucket_source::to_dafny(&value.s3_bucket_source.clone().unwrap()) , InputFormat: crate::deps::com_amazonaws_dynamodb::conversions::input_format::to_dafny(value.input_format.clone().unwrap()), - InputFormatOptions: ::std::rc::Rc::new(match &value.input_format_options { + InputFormatOptions: ::dafny_runtime::Rc::new(match &value.input_format_options { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_format_options::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - InputCompressionType: ::std::rc::Rc::new(match &value.input_compression_type { + InputCompressionType: ::dafny_runtime::Rc::new(match &value.input_compression_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_compression_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -26,11 +26,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::import_table::ImportTableInput { aws_sdk_dynamodb::operation::import_table::ImportTableInput::builder() .set_client_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ClientToken().clone())) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_response.rs index 6724bcc21..6e1ece914 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table/_import_table_response.rs @@ -4,24 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::import_table::ImportTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableOutput::ImportTableOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableOutput::ImportTableOutput { ImportTableDescription: crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::to_dafny(&value.import_table_description.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::import_table::ImportTableOutput { aws_sdk_dynamodb::operation::import_table::ImportTableOutput::builder() - .set_import_table_description(Some( crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::from_dafny(dafny_value.ImportTableDescription().clone()) - )) - .build() - - + .set_import_table_description(Some( + crate::deps::com_amazonaws_dynamodb::conversions::import_table_description::from_dafny( + dafny_value.ImportTableDescription().clone(), + ), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table_description.rs index 813477e93..b430bffcd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/import_table_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ImportTableDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableDescription::ImportTableDescription { ImportArn: crate::standard_library_conversions::ostring_to_dafny(&value.import_arn), - ImportStatus: ::std::rc::Rc::new(match &value.import_status { + ImportStatus: ::dafny_runtime::Rc::new(match &value.import_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::import_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -16,29 +16,29 @@ pub fn to_dafny( TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn), TableId: crate::standard_library_conversions::ostring_to_dafny(&value.table_id), ClientToken: crate::standard_library_conversions::ostring_to_dafny(&value.client_token), - S3BucketSource: ::std::rc::Rc::new(match &value.s3_bucket_source { + S3BucketSource: ::dafny_runtime::Rc::new(match &value.s3_bucket_source { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::s3_bucket_source::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ErrorCount: crate::standard_library_conversions::olong_to_dafny(&Some(value.error_count)), CloudWatchLogGroupArn: crate::standard_library_conversions::ostring_to_dafny(&value.cloud_watch_log_group_arn), - InputFormat: ::std::rc::Rc::new(match &value.input_format { + InputFormat: ::dafny_runtime::Rc::new(match &value.input_format { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_format::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - InputFormatOptions: ::std::rc::Rc::new(match &value.input_format_options { + InputFormatOptions: ::dafny_runtime::Rc::new(match &value.input_format_options { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_format_options::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - InputCompressionType: ::std::rc::Rc::new(match &value.input_compression_type { + InputCompressionType: ::dafny_runtime::Rc::new(match &value.input_compression_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::input_compression_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - TableCreationParameters: ::std::rc::Rc::new(match &value.table_creation_parameters { + TableCreationParameters: ::dafny_runtime::Rc::new(match &value.table_creation_parameters { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_creation_parameters::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -52,9 +52,10 @@ pub fn to_dafny( FailureMessage: crate::standard_library_conversions::ostring_to_dafny(&value.failure_message), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ImportTableDescription, >, ) -> aws_sdk_dynamodb::types::ImportTableDescription { @@ -112,5 +113,4 @@ pub fn from_dafny( .set_failure_code(crate::standard_library_conversions::ostring_from_dafny(dafny_value.FailureCode().clone())) .set_failure_message(crate::standard_library_conversions::ostring_from_dafny(dafny_value.FailureMessage().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/incremental_export_specification.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/incremental_export_specification.rs index 4e54f629c..48aa461db 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/incremental_export_specification.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/incremental_export_specification.rs @@ -4,34 +4,39 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::IncrementalExportSpecification, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IncrementalExportSpecification::IncrementalExportSpecification { ExportFromTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.export_from_time), ExportToTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.export_to_time), - ExportViewType: ::std::rc::Rc::new(match &value.export_view_type { + ExportViewType: ::dafny_runtime::Rc::new(match &value.export_view_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::export_view_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IncrementalExportSpecification, >, ) -> aws_sdk_dynamodb::types::IncrementalExportSpecification { aws_sdk_dynamodb::types::IncrementalExportSpecification::builder() - .set_export_from_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.ExportFromTime().clone())) - .set_export_to_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.ExportToTime().clone())) - .set_export_view_type(match &**dafny_value.ExportViewType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::export_view_type::from_dafny(value) - ), - _ => None, -} -) - .build() - + .set_export_from_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.ExportFromTime().clone(), + )) + .set_export_to_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.ExportToTime().clone(), + )) + .set_export_view_type(match &**dafny_value.ExportViewType() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::export_view_type::from_dafny( + value, + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/index_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/index_status.rs index df88cdcb2..a88a70364 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/index_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/index_status.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::IndexStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IndexStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::IndexStatus::Creating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IndexStatus::CREATING {}, aws_sdk_dynamodb::types::IndexStatus::Updating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IndexStatus::UPDATING {}, aws_sdk_dynamodb::types::IndexStatus::Deleting => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IndexStatus::DELETING {}, @@ -14,7 +16,7 @@ aws_sdk_dynamodb::types::IndexStatus::Active => crate::r#software::amazon::crypt _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::IndexStatus, ) -> aws_sdk_dynamodb::types::IndexStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_compression_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_compression_type.rs index 57f33b428..77d9e8f96 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_compression_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_compression_type.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::InputCompressionType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::InputCompressionType::Gzip => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputCompressionType::GZIP {}, aws_sdk_dynamodb::types::InputCompressionType::Zstd => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputCompressionType::ZSTD {}, aws_sdk_dynamodb::types::InputCompressionType::None => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputCompressionType::NONE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputCompressionType, ) -> aws_sdk_dynamodb::types::InputCompressionType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format.rs index af98c314e..5a3f7d9d8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format.rs @@ -5,15 +5,17 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::InputFormat, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormat, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::InputFormat::DynamodbJson => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormat::DYNAMODB_JSON {}, aws_sdk_dynamodb::types::InputFormat::Ion => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormat::ION {}, aws_sdk_dynamodb::types::InputFormat::Csv => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormat::CSV {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormat, ) -> aws_sdk_dynamodb::types::InputFormat { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format_options.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format_options.rs index b74562f67..3e470fdfa 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format_options.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/input_format_options.rs @@ -4,29 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::InputFormatOptions, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormatOptions::InputFormatOptions { - Csv: ::std::rc::Rc::new(match &value.csv { + Csv: ::dafny_runtime::Rc::new(match &value.csv { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::csv_options::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::InputFormatOptions, >, ) -> aws_sdk_dynamodb::types::InputFormatOptions { aws_sdk_dynamodb::types::InputFormatOptions::builder() - .set_csv(match (*dafny_value.Csv()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::csv_options::from_dafny(value.clone())), - _ => None, -} -) - .build() - + .set_csv(match (*dafny_value.Csv()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::csv_options::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_collection_metrics.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_collection_metrics.rs index 3be139281..fef8136dd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_collection_metrics.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_collection_metrics.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ItemCollectionMetrics, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ItemCollectionMetrics::ItemCollectionMetrics { ItemCollectionKey: -::std::rc::Rc::new(match &value.item_collection_key { +::dafny_runtime::Rc::new(match &value.item_collection_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -19,7 +19,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - SizeEstimateRangeGB: ::std::rc::Rc::new(match &value.size_estimate_range_gb { + SizeEstimateRangeGB: ::dafny_runtime::Rc::new(match &value.size_estimate_range_gb { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::standard_library_conversions::double_to_dafny(e.clone()), @@ -30,9 +30,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ItemCollectionMetrics, >, ) -> aws_sdk_dynamodb::types::ItemCollectionMetrics { @@ -42,7 +43,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -60,5 +61,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_response.rs index c7ef4d668..82965dca1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/item_response.rs @@ -4,11 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ItemResponse, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ItemResponse, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ItemResponse::ItemResponse { Item: -::std::rc::Rc::new(match &value.item { +::dafny_runtime::Rc::new(match &value.item { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,9 +23,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ItemResponse, >, ) -> aws_sdk_dynamodb::types::ItemResponse { @@ -33,7 +36,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -41,5 +44,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_schema_element.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_schema_element.rs index 8fb2d2fb7..0e9862f78 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_schema_element.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_schema_element.rs @@ -4,22 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::KeySchemaElement, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchemaElement::KeySchemaElement { AttributeName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.attribute_name), KeyType: crate::deps::com_amazonaws_dynamodb::conversions::key_type::to_dafny(value.key_type.clone()), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchemaElement, >, ) -> aws_sdk_dynamodb::types::KeySchemaElement { aws_sdk_dynamodb::types::KeySchemaElement::builder() - .set_attribute_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AttributeName()) )) - .set_key_type(Some( crate::deps::com_amazonaws_dynamodb::conversions::key_type::from_dafny(dafny_value.KeyType()) )) - .build() - .unwrap() + .set_attribute_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AttributeName(), + ), + )) + .set_key_type(Some( + crate::deps::com_amazonaws_dynamodb::conversions::key_type::from_dafny( + dafny_value.KeyType(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_type.rs index ea86df5b0..83db22875 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/key_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::KeyType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::KeyType::Hash => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyType::HASH {}, aws_sdk_dynamodb::types::KeyType::Range => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyType::RANGE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyType, ) -> aws_sdk_dynamodb::types::KeyType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/keys_and_attributes.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/keys_and_attributes.rs index 6932febce..60056fdc1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/keys_and_attributes.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/keys_and_attributes.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::KeysAndAttributes, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeysAndAttributes::KeysAndAttributes { Keys: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.keys, |e| ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&e.clone(), @@ -16,7 +16,7 @@ pub fn to_dafny( , ) , - AttributesToGet: ::std::rc::Rc::new(match &value.attributes_to_get { + AttributesToGet: ::dafny_runtime::Rc::new(match &value.attributes_to_get { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -28,7 +28,7 @@ pub fn to_dafny( ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), ProjectionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.projection_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -40,17 +40,18 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KeysAndAttributes, >, ) -> aws_sdk_dynamodb::types::KeysAndAttributes { aws_sdk_dynamodb::types::KeysAndAttributes::builder() .set_keys(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Keys(), - |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, + |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) , diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/kinesis_data_stream_destination.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/kinesis_data_stream_destination.rs index e070e97aa..5996ded79 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/kinesis_data_stream_destination.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/kinesis_data_stream_destination.rs @@ -4,26 +4,27 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::KinesisDataStreamDestination, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KinesisDataStreamDestination::KinesisDataStreamDestination { StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn), - DestinationStatus: ::std::rc::Rc::new(match &value.destination_status { + DestinationStatus: ::dafny_runtime::Rc::new(match &value.destination_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::destination_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , DestinationStatusDescription: crate::standard_library_conversions::ostring_to_dafny(&value.destination_status_description), - ApproximateCreationDateTimePrecision: ::std::rc::Rc::new(match &value.approximate_creation_date_time_precision { + ApproximateCreationDateTimePrecision: ::dafny_runtime::Rc::new(match &value.approximate_creation_date_time_precision { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::approximate_creation_date_time_precision::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::KinesisDataStreamDestination, >, ) -> aws_sdk_dynamodb::types::KinesisDataStreamDestination { @@ -45,5 +46,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups.rs index f2cc2c548..8d7b04f22 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_backups::ListBackupsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_backups::ListBackupsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _list_backups_request; +pub mod _list_backups_request; - pub mod _list_backups_response; +pub mod _list_backups_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_request.rs index 9f1d0aa8e..c051b0d70 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_request.rs @@ -4,41 +4,52 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_backups::ListBackupsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsInput::ListBackupsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsInput::ListBackupsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), TimeRangeLowerBound: crate::standard_library_conversions::otimestamp_to_dafny(&value.time_range_lower_bound), TimeRangeUpperBound: crate::standard_library_conversions::otimestamp_to_dafny(&value.time_range_upper_bound), ExclusiveStartBackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.exclusive_start_backup_arn), - BackupType: ::std::rc::Rc::new(match &value.backup_type { + BackupType: ::dafny_runtime::Rc::new(match &value.backup_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::backup_type_filter::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_backups::ListBackupsInput { aws_sdk_dynamodb::operation::list_backups::ListBackupsInput::builder() - .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_time_range_lower_bound(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.TimeRangeLowerBound().clone())) - .set_time_range_upper_bound(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.TimeRangeUpperBound().clone())) - .set_exclusive_start_backup_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExclusiveStartBackupArn().clone())) - .set_backup_type(match &**dafny_value.BackupType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::backup_type_filter::from_dafny(value) - ), - _ => None, -} -) - .build() - .unwrap() + .set_table_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableName().clone(), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_time_range_lower_bound(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.TimeRangeLowerBound().clone(), + )) + .set_time_range_upper_bound(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.TimeRangeUpperBound().clone(), + )) + .set_exclusive_start_backup_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExclusiveStartBackupArn().clone(), + )) + .set_backup_type(match &**dafny_value.BackupType() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::backup_type_filter::from_dafny( + value, + ), + ), + _ => None, + }) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_response.rs index 6d5138f7d..0e6b1f8ad 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_backups/_list_backups_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_backups::ListBackupsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsOutput::ListBackupsOutput { - BackupSummaries: ::std::rc::Rc::new(match &value.backup_summaries { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsOutput::ListBackupsOutput { + BackupSummaries: ::dafny_runtime::Rc::new(match &value.backup_summaries { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::backup_summary::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( LastEvaluatedBackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.last_evaluated_backup_arn), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListBackupsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_backups::ListBackupsOutput { aws_sdk_dynamodb::operation::list_backups::ListBackupsOutput::builder() .set_backup_summaries(match (*dafny_value.BackupSummaries()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::backup_summary::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::backup_summary::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_last_evaluated_backup_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.LastEvaluatedBackupArn().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights.rs index 472edcb87..a45293f22 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _list_contributor_insights_request; +pub mod _list_contributor_insights_request; - pub mod _list_contributor_insights_response; +pub mod _list_contributor_insights_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_request.rs index 286573b40..59497eeab 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_request.rs @@ -4,25 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsInput::ListContributorInsightsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsInput::ListContributorInsightsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), MaxResults: crate::standard_library_conversions::oint_to_dafny(value.max_results), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsInput { aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsInput::builder() - .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) - .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) - .set_max_results(crate::standard_library_conversions::oint_from_dafny(dafny_value.MaxResults().clone())) - .build() - .unwrap() + .set_table_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableName().clone(), + )) + .set_next_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.NextToken().clone(), + )) + .set_max_results(crate::standard_library_conversions::oint_from_dafny( + dafny_value.MaxResults().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_response.rs index 2effb5ebe..2fd1dab38 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_contributor_insights/_list_contributor_insights_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsOutput::ListContributorInsightsOutput { - ContributorInsightsSummaries: ::std::rc::Rc::new(match &value.contributor_insights_summaries { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsOutput::ListContributorInsightsOutput { + ContributorInsightsSummaries: ::dafny_runtime::Rc::new(match &value.contributor_insights_summaries { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_summary::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListContributorInsightsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsOutput { aws_sdk_dynamodb::operation::list_contributor_insights::ListContributorInsightsOutput::builder() .set_contributor_insights_summaries(match (*dafny_value.ContributorInsightsSummaries()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_summary::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_summary::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports.rs index f48c1b12e..f94eb5d48 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_exports::ListExportsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_exports::ListExportsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _list_exports_request; +pub mod _list_exports_request; - pub mod _list_exports_response; +pub mod _list_exports_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_request.rs index 3bfd44be5..85e8b982a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_request.rs @@ -4,25 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_exports::ListExportsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsInput::ListExportsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsInput::ListExportsInput { TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn), MaxResults: crate::standard_library_conversions::oint_to_dafny(value.max_results), NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_exports::ListExportsInput { aws_sdk_dynamodb::operation::list_exports::ListExportsInput::builder() - .set_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableArn().clone())) - .set_max_results(crate::standard_library_conversions::oint_from_dafny(dafny_value.MaxResults().clone())) - .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) - .build() - .unwrap() + .set_table_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableArn().clone(), + )) + .set_max_results(crate::standard_library_conversions::oint_from_dafny( + dafny_value.MaxResults().clone(), + )) + .set_next_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.NextToken().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_response.rs index c668c6869..b4bb66ff7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_exports/_list_exports_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_exports::ListExportsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsOutput::ListExportsOutput { - ExportSummaries: ::std::rc::Rc::new(match &value.export_summaries { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsOutput::ListExportsOutput { + ExportSummaries: ::dafny_runtime::Rc::new(match &value.export_summaries { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::export_summary::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListExportsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_exports::ListExportsOutput { aws_sdk_dynamodb::operation::list_exports::ListExportsOutput::builder() .set_export_summaries(match (*dafny_value.ExportSummaries()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::export_summary::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::export_summary::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables.rs index d3ffce053..b8213d23b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _list_global_tables_request; +pub mod _list_global_tables_request; - pub mod _list_global_tables_response; +pub mod _list_global_tables_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_request.rs index fce19f38a..2e143b7b2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_request.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesInput::ListGlobalTablesInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesInput::ListGlobalTablesInput { ExclusiveStartGlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.exclusive_start_global_table_name), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), RegionName: crate::standard_library_conversions::ostring_to_dafny(&value.region_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesInput { aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesInput::builder() - .set_exclusive_start_global_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExclusiveStartGlobalTableName().clone())) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_region_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RegionName().clone())) - .build() - .unwrap() + .set_exclusive_start_global_table_name( + crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExclusiveStartGlobalTableName().clone(), + ), + ) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_region_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.RegionName().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_response.rs index 06c2dd5e8..53a2a6dec 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_global_tables/_list_global_tables_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesOutput::ListGlobalTablesOutput { - GlobalTables: ::std::rc::Rc::new(match &value.global_tables { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesOutput::ListGlobalTablesOutput { + GlobalTables: ::dafny_runtime::Rc::new(match &value.global_tables { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_table::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( LastEvaluatedGlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.last_evaluated_global_table_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListGlobalTablesOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesOutput { aws_sdk_dynamodb::operation::list_global_tables::ListGlobalTablesOutput::builder() .set_global_tables(match (*dafny_value.GlobalTables()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_table::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_table::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_last_evaluated_global_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.LastEvaluatedGlobalTableName().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports.rs index 3861ccf0f..454f4e4d3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_imports::ListImportsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_imports::ListImportsError::LimitExceededException(e) => @@ -24,6 +26,6 @@ pub fn to_dafny_error( } } - pub mod _list_imports_request; +pub mod _list_imports_request; - pub mod _list_imports_response; +pub mod _list_imports_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_request.rs index c279e4016..122dd6534 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_request.rs @@ -4,25 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_imports::ListImportsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsInput::ListImportsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsInput::ListImportsInput { TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn), PageSize: crate::standard_library_conversions::oint_to_dafny(value.page_size), NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_imports::ListImportsInput { aws_sdk_dynamodb::operation::list_imports::ListImportsInput::builder() - .set_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableArn().clone())) - .set_page_size(crate::standard_library_conversions::oint_from_dafny(dafny_value.PageSize().clone())) - .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) - .build() - .unwrap() + .set_table_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TableArn().clone(), + )) + .set_page_size(crate::standard_library_conversions::oint_from_dafny( + dafny_value.PageSize().clone(), + )) + .set_next_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.NextToken().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_response.rs index 95ab44f40..3abedf2c8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_imports/_list_imports_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_imports::ListImportsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsOutput::ListImportsOutput { - ImportSummaryList: ::std::rc::Rc::new(match &value.import_summary_list { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsOutput::ListImportsOutput { + ImportSummaryList: ::dafny_runtime::Rc::new(match &value.import_summary_list { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::import_summary::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListImportsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_imports::ListImportsOutput { aws_sdk_dynamodb::operation::list_imports::ListImportsOutput::builder() .set_import_summary_list(match (*dafny_value.ImportSummaryList()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::import_summary::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::import_summary::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables.rs index 382ab1e24..c1f722b1e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_tables::ListTablesError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_tables::ListTablesError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _list_tables_request; +pub mod _list_tables_request; - pub mod _list_tables_response; +pub mod _list_tables_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_request.rs index 4fab0fd2f..d50c084dd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_request.rs @@ -4,23 +4,27 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_tables::ListTablesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesInput::ListTablesInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesInput::ListTablesInput { ExclusiveStartTableName: crate::standard_library_conversions::ostring_to_dafny(&value.exclusive_start_table_name), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_tables::ListTablesInput { aws_sdk_dynamodb::operation::list_tables::ListTablesInput::builder() - .set_exclusive_start_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExclusiveStartTableName().clone())) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .build() - .unwrap() + .set_exclusive_start_table_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExclusiveStartTableName().clone(), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_response.rs index 506a60476..7ae77152d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tables/_list_tables_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_tables::ListTablesOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesOutput::ListTablesOutput { - TableNames: ::std::rc::Rc::new(match &value.table_names { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesOutput::ListTablesOutput { + TableNames: ::dafny_runtime::Rc::new(match &value.table_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -20,11 +20,11 @@ pub fn to_dafny( LastEvaluatedTableName: crate::standard_library_conversions::ostring_to_dafny(&value.last_evaluated_table_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTablesOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_tables::ListTablesOutput { aws_sdk_dynamodb::operation::list_tables::ListTablesOutput::builder() .set_table_names(match (*dafny_value.TableNames()).as_ref() { @@ -39,6 +39,4 @@ pub fn from_dafny( ) .set_last_evaluated_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.LastEvaluatedTableName().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource.rs index 237ce7f1f..f3104079a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceError::InternalServerError(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _list_tags_of_resource_request; +pub mod _list_tags_of_resource_request; - pub mod _list_tags_of_resource_response; +pub mod _list_tags_of_resource_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_request.rs index 1c1041d93..76750ab46 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_request.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceInput::ListTagsOfResourceInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceInput::ListTagsOfResourceInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceInput, - > + >, ) -> aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceInput { aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceInput::builder() - .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) - .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) - .build() - .unwrap() + .set_resource_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ResourceArn(), + ), + )) + .set_next_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.NextToken().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_response.rs index 4b7e03968..b07590046 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/list_tags_of_resource/_list_tags_of_resource_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceOutput::ListTagsOfResourceOutput { - Tags: ::std::rc::Rc::new(match &value.tags { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceOutput::ListTagsOfResourceOutput { + Tags: ::dafny_runtime::Rc::new(match &value.tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::tag::to_dafny(e) @@ -21,18 +21,18 @@ pub fn to_dafny( NextToken: crate::standard_library_conversions::ostring_to_dafny(&value.next_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ListTagsOfResourceOutput, - > + >, ) -> aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceOutput { aws_sdk_dynamodb::operation::list_tags_of_resource::ListTagsOfResourceOutput::builder() .set_tags(match (*dafny_value.Tags()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( ) .set_next_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextToken().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index.rs index 8a9851932..ee8ae54c1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::LocalSecondaryIndex, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndex::LocalSecondaryIndex { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), KeySchema: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.key_schema, @@ -17,16 +17,17 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndex, >, ) -> aws_sdk_dynamodb::types::LocalSecondaryIndex { aws_sdk_dynamodb::types::LocalSecondaryIndex::builder() .set_index_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.IndexName()) )) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_description.rs index bad83c18a..13e2bc395 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::LocalSecondaryIndexDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndexDescription::LocalSecondaryIndexDescription { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - KeySchema: ::std::rc::Rc::new(match &value.key_schema { + KeySchema: ::dafny_runtime::Rc::new(match &value.key_schema { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::to_dafny(e) @@ -18,7 +18,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Projection: ::std::rc::Rc::new(match &value.projection { + Projection: ::dafny_runtime::Rc::new(match &value.projection { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -28,9 +28,10 @@ pub fn to_dafny( IndexArn: crate::standard_library_conversions::ostring_to_dafny(&value.index_arn), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndexDescription, >, ) -> aws_sdk_dynamodb::types::LocalSecondaryIndexDescription { @@ -40,7 +41,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) ), @@ -57,5 +58,4 @@ pub fn from_dafny( .set_item_count(crate::standard_library_conversions::olong_from_dafny(dafny_value.ItemCount().clone())) .set_index_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.IndexArn().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_info.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_info.rs index a49ef07f9..1a07dbd1d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_info.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/local_secondary_index_info.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::LocalSecondaryIndexInfo, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndexInfo::LocalSecondaryIndexInfo { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - KeySchema: ::std::rc::Rc::new(match &value.key_schema { + KeySchema: ::dafny_runtime::Rc::new(match &value.key_schema { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::to_dafny(e) @@ -18,16 +18,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Projection: ::std::rc::Rc::new(match &value.projection { + Projection: ::dafny_runtime::Rc::new(match &value.projection { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::projection::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::LocalSecondaryIndexInfo, >, ) -> aws_sdk_dynamodb::types::LocalSecondaryIndexInfo { @@ -37,7 +38,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) ), @@ -51,5 +52,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput.rs index affc15bb1..fe4122d6a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput.rs @@ -4,22 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::OnDemandThroughput, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::OnDemandThroughput::OnDemandThroughput { MaxReadRequestUnits: crate::standard_library_conversions::olong_to_dafny(&value.max_read_request_units), MaxWriteRequestUnits: crate::standard_library_conversions::olong_to_dafny(&value.max_write_request_units), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::OnDemandThroughput, >, ) -> aws_sdk_dynamodb::types::OnDemandThroughput { aws_sdk_dynamodb::types::OnDemandThroughput::builder() - .set_max_read_request_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.MaxReadRequestUnits().clone())) - .set_max_write_request_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.MaxWriteRequestUnits().clone())) - .build() - + .set_max_read_request_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.MaxReadRequestUnits().clone(), + )) + .set_max_write_request_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.MaxWriteRequestUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput_override.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput_override.rs index abad93cd4..b0f9df94e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput_override.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/on_demand_throughput_override.rs @@ -4,20 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::OnDemandThroughputOverride, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::OnDemandThroughputOverride::OnDemandThroughputOverride { MaxReadRequestUnits: crate::standard_library_conversions::olong_to_dafny(&value.max_read_request_units), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::OnDemandThroughputOverride, >, ) -> aws_sdk_dynamodb::types::OnDemandThroughputOverride { aws_sdk_dynamodb::types::OnDemandThroughputOverride::builder() - .set_max_read_request_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.MaxReadRequestUnits().clone())) - .build() - + .set_max_read_request_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.MaxReadRequestUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/parameterized_statement.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/parameterized_statement.rs index d18ee2b90..be3b426c9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/parameterized_statement.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/parameterized_statement.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ParameterizedStatement, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatement::ParameterizedStatement { Statement: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.statement), - Parameters: ::std::rc::Rc::new(match &value.parameters { + Parameters: ::dafny_runtime::Rc::new(match &value.parameters { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::to_dafny(e) @@ -20,9 +20,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatement, >, ) -> aws_sdk_dynamodb::types::ParameterizedStatement { @@ -32,7 +33,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_description.rs index d26c64954..680c054bf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_description.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::PointInTimeRecoveryDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoveryDescription::PointInTimeRecoveryDescription { - PointInTimeRecoveryStatus: ::std::rc::Rc::new(match &value.point_in_time_recovery_status { + PointInTimeRecoveryStatus: ::dafny_runtime::Rc::new(match &value.point_in_time_recovery_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::point_in_time_recovery_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -16,9 +16,10 @@ pub fn to_dafny( LatestRestorableDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.latest_restorable_date_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoveryDescription, >, ) -> aws_sdk_dynamodb::types::PointInTimeRecoveryDescription { @@ -33,5 +34,4 @@ pub fn from_dafny( .set_earliest_restorable_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.EarliestRestorableDateTime().clone())) .set_latest_restorable_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LatestRestorableDateTime().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_specification.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_specification.rs index d79e68e5f..364a5066a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_specification.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_specification.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::PointInTimeRecoverySpecification, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoverySpecification::PointInTimeRecoverySpecification { PointInTimeRecoveryEnabled: value.point_in_time_recovery_enabled.clone(), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoverySpecification, >, ) -> aws_sdk_dynamodb::types::PointInTimeRecoverySpecification { aws_sdk_dynamodb::types::PointInTimeRecoverySpecification::builder() - .set_point_in_time_recovery_enabled(Some( dafny_value.PointInTimeRecoveryEnabled() .clone() )) - .build() - .unwrap() + .set_point_in_time_recovery_enabled(Some(dafny_value.PointInTimeRecoveryEnabled().clone())) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_status.rs index 081d470a8..7a07e784f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/point_in_time_recovery_status.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::PointInTimeRecoveryStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::PointInTimeRecoveryStatus::Enabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoveryStatus::ENABLED {}, aws_sdk_dynamodb::types::PointInTimeRecoveryStatus::Disabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoveryStatus::DISABLED {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PointInTimeRecoveryStatus, ) -> aws_sdk_dynamodb::types::PointInTimeRecoveryStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection.rs index a0a3f9a26..6eaeb71b6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection.rs @@ -4,15 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Projection, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Projection, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Projection::Projection { - ProjectionType: ::std::rc::Rc::new(match &value.projection_type { + ProjectionType: ::dafny_runtime::Rc::new(match &value.projection_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::projection_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - NonKeyAttributes: ::std::rc::Rc::new(match &value.non_key_attributes { + NonKeyAttributes: ::dafny_runtime::Rc::new(match &value.non_key_attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -23,9 +25,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Projection, >, ) -> aws_sdk_dynamodb::types::Projection { @@ -48,5 +51,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection_type.rs index 28b89124f..68b0b68f9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/projection_type.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ProjectionType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ProjectionType::All => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProjectionType::ALL {}, aws_sdk_dynamodb::types::ProjectionType::KeysOnly => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProjectionType::KEYS_ONLY {}, aws_sdk_dynamodb::types::ProjectionType::Include => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProjectionType::INCLUDE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProjectionType, ) -> aws_sdk_dynamodb::types::ProjectionType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput.rs index f5090829c..11a65c563 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput.rs @@ -4,22 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ProvisionedThroughput, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughput::ProvisionedThroughput { ReadCapacityUnits: value.read_capacity_units, WriteCapacityUnits: value.write_capacity_units, } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughput, >, ) -> aws_sdk_dynamodb::types::ProvisionedThroughput { aws_sdk_dynamodb::types::ProvisionedThroughput::builder() - .set_read_capacity_units(Some( dafny_value.ReadCapacityUnits() .clone() )) - .set_write_capacity_units(Some( dafny_value.WriteCapacityUnits() .clone() )) - .build() - .unwrap() + .set_read_capacity_units(Some(dafny_value.ReadCapacityUnits().clone())) + .set_write_capacity_units(Some(dafny_value.WriteCapacityUnits().clone())) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_description.rs index bbac7e6fe..d30cb9b8d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_description.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ProvisionedThroughputDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughputDescription::ProvisionedThroughputDescription { LastIncreaseDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_increase_date_time), LastDecreaseDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_decrease_date_time), @@ -14,18 +14,28 @@ pub fn to_dafny( WriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.write_capacity_units), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughputDescription, >, ) -> aws_sdk_dynamodb::types::ProvisionedThroughputDescription { aws_sdk_dynamodb::types::ProvisionedThroughputDescription::builder() - .set_last_increase_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LastIncreaseDateTime().clone())) - .set_last_decrease_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LastDecreaseDateTime().clone())) - .set_number_of_decreases_today(crate::standard_library_conversions::olong_from_dafny(dafny_value.NumberOfDecreasesToday().clone())) - .set_read_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.ReadCapacityUnits().clone())) - .set_write_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.WriteCapacityUnits().clone())) - .build() - + .set_last_increase_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.LastIncreaseDateTime().clone(), + )) + .set_last_decrease_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.LastDecreaseDateTime().clone(), + )) + .set_number_of_decreases_today(crate::standard_library_conversions::olong_from_dafny( + dafny_value.NumberOfDecreasesToday().clone(), + )) + .set_read_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.ReadCapacityUnits().clone(), + )) + .set_write_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.WriteCapacityUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_override.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_override.rs index da4165734..1f6759658 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_override.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/provisioned_throughput_override.rs @@ -4,20 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ProvisionedThroughputOverride, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughputOverride::ProvisionedThroughputOverride { ReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.read_capacity_units), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ProvisionedThroughputOverride, >, ) -> aws_sdk_dynamodb::types::ProvisionedThroughputOverride { aws_sdk_dynamodb::types::ProvisionedThroughputOverride::builder() - .set_read_capacity_units(crate::standard_library_conversions::olong_from_dafny(dafny_value.ReadCapacityUnits().clone())) - .build() - + .set_read_capacity_units(crate::standard_library_conversions::olong_from_dafny( + dafny_value.ReadCapacityUnits().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put.rs index 14cdec509..266976498 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Put, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Put, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Put::Put { Item: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.item.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +18,7 @@ pub fn to_dafny( TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,7 +29,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -38,23 +40,24 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnValuesOnConditionCheckFailure: ::std::rc::Rc::new(match &value.return_values_on_condition_check_failure { + ReturnValuesOnConditionCheckFailure: ::dafny_runtime::Rc::new(match &value.return_values_on_condition_check_failure { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_values_on_condition_check_failure::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Put, >, ) -> aws_sdk_dynamodb::types::Put { aws_sdk_dynamodb::types::Put::builder() .set_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Item(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -76,7 +79,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item.rs index 63379554a..0b0c6a23f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::put_item::PutItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::put_item::PutItemError::ConditionalCheckFailedException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _put_item_request; +pub mod _put_item_request; - pub mod _put_item_response; +pub mod _put_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_request.rs index d45d54776..a8e69e620 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::put_item::PutItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput::PutItemInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput::PutItemInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Item: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.item.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +16,7 @@ pub fn to_dafny( ) , Expected: -::std::rc::Rc::new(match &value.expected { +::dafny_runtime::Rc::new(match &value.expected { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -27,29 +27,29 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnValues: ::std::rc::Rc::new(match &value.return_values { + ReturnValues: ::dafny_runtime::Rc::new(match &value.return_values { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_value::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnItemCollectionMetrics: ::std::rc::Rc::new(match &value.return_item_collection_metrics { + ReturnItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.return_item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_item_collection_metrics::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ConditionalOperator: ::std::rc::Rc::new(match &value.conditional_operator { + ConditionalOperator: ::dafny_runtime::Rc::new(match &value.conditional_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::conditional_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -60,7 +60,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -73,17 +73,17 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::put_item::PutItemInput { aws_sdk_dynamodb::operation::put_item::PutItemInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Item(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -92,7 +92,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) , ) ), @@ -144,7 +144,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_response.rs index 687d199dc..b38c0d4eb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_item/_put_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::put_item::PutItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput::PutItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput::PutItemOutput { Attributes: -::std::rc::Rc::new(match &value.attributes { +::dafny_runtime::Rc::new(match &value.attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,23 +20,23 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ItemCollectionMetrics: ::std::rc::Rc::new(match &value.item_collection_metrics { + ItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::put_item::PutItemOutput { aws_sdk_dynamodb::operation::put_item::PutItemOutput::builder() .set_attributes(match (*dafny_value.Attributes()).as_ref() { @@ -44,7 +44,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -64,6 +64,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_request.rs index cbb029ec2..5f9b72244 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_request.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::PutRequest, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutRequest, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutRequest::PutRequest { Item: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.item.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -15,16 +17,17 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutRequest, >, ) -> aws_sdk_dynamodb::types::PutRequest { aws_sdk_dynamodb::types::PutRequest::builder() .set_item(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Item(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy.rs index 0b1309706..47a72417b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyError::InternalServerError(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _put_resource_policy_request; +pub mod _put_resource_policy_request; - pub mod _put_resource_policy_response; +pub mod _put_resource_policy_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_request.rs index d0f9e49c9..6aae5fc0f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_request.rs @@ -4,27 +4,41 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyInput::PutResourcePolicyInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyInput::PutResourcePolicyInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy) .Extract(), ExpectedRevisionId: crate::standard_library_conversions::ostring_to_dafny(&value.expected_revision_id), ConfirmRemoveSelfResourceAccess: crate::standard_library_conversions::obool_to_dafny(&value.confirm_remove_self_resource_access), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyInput, - > + >, ) -> aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyInput { aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyInput::builder() - .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) - .set_policy(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Policy()) )) - .set_expected_revision_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.ExpectedRevisionId().clone())) - .set_confirm_remove_self_resource_access(crate::standard_library_conversions::obool_from_dafny(dafny_value.ConfirmRemoveSelfResourceAccess().clone())) - .build() - .unwrap() + .set_resource_arn(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.ResourceArn(), + ), + )) + .set_policy(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Policy(), + ), + )) + .set_expected_revision_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.ExpectedRevisionId().clone(), + )) + .set_confirm_remove_self_resource_access( + crate::standard_library_conversions::obool_from_dafny( + dafny_value.ConfirmRemoveSelfResourceAccess().clone(), + ), + ) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_response.rs index 8f47c4802..774b85888 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/put_resource_policy/_put_resource_policy_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyOutput::PutResourcePolicyOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyOutput::PutResourcePolicyOutput { RevisionId: crate::standard_library_conversions::ostring_to_dafny(&value.revision_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::PutResourcePolicyOutput, - > + >, ) -> aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyOutput { aws_sdk_dynamodb::operation::put_resource_policy::PutResourcePolicyOutput::builder() - .set_revision_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RevisionId().clone())) - .build() - - + .set_revision_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.RevisionId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query.rs index 77293dd16..ad4cb03b1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::query::QueryError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::query::QueryError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _query_request; +pub mod _query_request; - pub mod _query_response; +pub mod _query_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_request.rs index c6d820158..2c3e1d063 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_request.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::query::QueryInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput::QueryInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput::QueryInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - Select: ::std::rc::Rc::new(match &value.select { + Select: ::dafny_runtime::Rc::new(match &value.select { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::select::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - AttributesToGet: ::std::rc::Rc::new(match &value.attributes_to_get { + AttributesToGet: ::dafny_runtime::Rc::new(match &value.attributes_to_get { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -27,7 +27,7 @@ pub fn to_dafny( Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), KeyConditions: -::std::rc::Rc::new(match &value.key_conditions { +::dafny_runtime::Rc::new(match &value.key_conditions { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -39,7 +39,7 @@ pub fn to_dafny( }) , QueryFilter: -::std::rc::Rc::new(match &value.query_filter { +::dafny_runtime::Rc::new(match &value.query_filter { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -50,14 +50,14 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConditionalOperator: ::std::rc::Rc::new(match &value.conditional_operator { + ConditionalOperator: ::dafny_runtime::Rc::new(match &value.conditional_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::conditional_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ScanIndexForward: crate::standard_library_conversions::obool_to_dafny(&value.scan_index_forward), ExclusiveStartKey: -::std::rc::Rc::new(match &value.exclusive_start_key { +::dafny_runtime::Rc::new(match &value.exclusive_start_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -68,7 +68,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -77,7 +77,7 @@ pub fn to_dafny( FilterExpression: crate::standard_library_conversions::ostring_to_dafny(&value.filter_expression), KeyConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.key_condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -88,7 +88,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -101,11 +101,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput, - > + >, ) -> aws_sdk_dynamodb::operation::query::QueryInput { aws_sdk_dynamodb::operation::query::QueryInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) @@ -134,7 +134,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) , ) ), @@ -146,7 +146,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) , ) ), @@ -166,7 +166,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -199,7 +199,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_response.rs index c2a15cafb..563f5148c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/query/_query_response.rs @@ -3,12 +3,12 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_dynamodb::operation::query::QueryOutput -) -> ::std::rc::Rc< + value: &aws_sdk_dynamodb::operation::query::QueryOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput::QueryOutput { - Items: ::std::rc::Rc::new(match &value.items { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput::QueryOutput { + Items: ::dafny_runtime::Rc::new(match &value.items { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&e.clone(), @@ -25,7 +25,7 @@ pub fn to_dafny( Count: crate::standard_library_conversions::oint_to_dafny(Some(value.count)), ScannedCount: crate::standard_library_conversions::oint_to_dafny(Some(value.scanned_count)), LastEvaluatedKey: -::std::rc::Rc::new(match &value.last_evaluated_key { +::dafny_runtime::Rc::new(match &value.last_evaluated_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -36,27 +36,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput, - > + >, ) -> aws_sdk_dynamodb::operation::query::QueryOutput { aws_sdk_dynamodb::operation::query::QueryOutput::builder() .set_items(match (*dafny_value.Items()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, + |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) , @@ -72,7 +72,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -86,6 +86,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica.rs index 8dff008be..0174daac9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica.rs @@ -4,20 +4,24 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Replica, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Replica, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Replica::Replica { RegionName: crate::standard_library_conversions::ostring_to_dafny(&value.region_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Replica, >, ) -> aws_sdk_dynamodb::types::Replica { aws_sdk_dynamodb::types::Replica::builder() - .set_region_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RegionName().clone())) - .build() - + .set_region_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.RegionName().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_description.rs index 99369e969..897b748d4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaAutoScalingDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaAutoScalingDescription::ReplicaAutoScalingDescription { RegionName: crate::standard_library_conversions::ostring_to_dafny(&value.region_name), - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_description::to_dafny(e) @@ -18,26 +18,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReplicaProvisionedReadCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings { + ReplicaProvisionedReadCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaProvisionedWriteCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.replica_provisioned_write_capacity_auto_scaling_settings { + ReplicaProvisionedWriteCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.replica_provisioned_write_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaStatus: ::std::rc::Rc::new(match &value.replica_status { + ReplicaStatus: ::dafny_runtime::Rc::new(match &value.replica_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::replica_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaAutoScalingDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaAutoScalingDescription { @@ -47,7 +48,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_description::from_dafny(e.clone()) , ) ), @@ -74,5 +75,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_update.rs index 723de2e58..fab0a1d3d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_auto_scaling_update.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaAutoScalingUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), - ReplicaGlobalSecondaryIndexUpdates: ::std::rc::Rc::new(match &value.replica_global_secondary_index_updates { + ReplicaGlobalSecondaryIndexUpdates: ::dafny_runtime::Rc::new(match &value.replica_global_secondary_index_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_update::to_dafny(e) @@ -18,16 +18,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReplicaProvisionedReadCapacityAutoScalingUpdate: ::std::rc::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_update { + ReplicaProvisionedReadCapacityAutoScalingUpdate: ::dafny_runtime::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaAutoScalingUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicaAutoScalingUpdate { @@ -37,7 +38,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_auto_scaling_update::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_description.rs index cc2408106..722875402 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_description.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaDescription::ReplicaDescription { RegionName: crate::standard_library_conversions::ostring_to_dafny(&value.region_name), - ReplicaStatus: ::std::rc::Rc::new(match &value.replica_status { + ReplicaStatus: ::dafny_runtime::Rc::new(match &value.replica_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::replica_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -16,17 +16,17 @@ pub fn to_dafny( ReplicaStatusDescription: crate::standard_library_conversions::ostring_to_dafny(&value.replica_status_description), ReplicaStatusPercentProgress: crate::standard_library_conversions::ostring_to_dafny(&value.replica_status_percent_progress), KMSMasterKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_master_key_id), - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_description::to_dafny(e) @@ -37,16 +37,17 @@ pub fn to_dafny( }) , ReplicaInaccessibleDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.replica_inaccessible_date_time), - ReplicaTableClassSummary: ::std::rc::Rc::new(match &value.replica_table_class_summary { + ReplicaTableClassSummary: ::dafny_runtime::Rc::new(match &value.replica_table_class_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaDescription { @@ -78,7 +79,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_description::from_dafny(e.clone()) , ) ), @@ -93,5 +94,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index.rs index c7e6c1330..f6a35bf48 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index.rs @@ -4,25 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndex, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndex, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndex { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_description.rs index 3ab2b4a65..12a3f05f1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_description.rs @@ -4,30 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexAutoScalingDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - IndexStatus: ::std::rc::Rc::new(match &value.index_status { + IndexStatus: ::dafny_runtime::Rc::new(match &value.index_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::index_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedReadCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings { + ProvisionedReadCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedWriteCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings { + ProvisionedWriteCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexAutoScalingDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexAutoScalingDescription { @@ -53,5 +54,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_update.rs index e5cc89d3c..11befc452 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_auto_scaling_update.rs @@ -4,20 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexAutoScalingUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ProvisionedReadCapacityAutoScalingUpdate: ::std::rc::Rc::new(match &value.provisioned_read_capacity_auto_scaling_update { + ProvisionedReadCapacityAutoScalingUpdate: ::dafny_runtime::Rc::new(match &value.provisioned_read_capacity_auto_scaling_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexAutoScalingUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexAutoScalingUpdate { @@ -30,5 +31,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_description.rs index c3ccd6850..938323fa2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_description.rs @@ -4,25 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription { IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexDescription { @@ -41,5 +42,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_description.rs index 7bcf99030..8bea23f9d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_description.rs @@ -4,32 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexSettingsDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), - IndexStatus: ::std::rc::Rc::new(match &value.index_status { + IndexStatus: ::dafny_runtime::Rc::new(match &value.index_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::index_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ProvisionedReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.provisioned_read_capacity_units), - ProvisionedReadCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings { + ProvisionedReadCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ProvisionedWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.provisioned_write_capacity_units), - ProvisionedWriteCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings { + ProvisionedWriteCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.provisioned_write_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexSettingsDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexSettingsDescription { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_update.rs index bf257f62c..9ee56a14a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_global_secondary_index_settings_update.rs @@ -4,21 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexSettingsUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), ProvisionedReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.provisioned_read_capacity_units), - ProvisionedReadCapacityAutoScalingSettingsUpdate: ::std::rc::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings_update { + ProvisionedReadCapacityAutoScalingSettingsUpdate: ::dafny_runtime::Rc::new(match &value.provisioned_read_capacity_auto_scaling_settings_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaGlobalSecondaryIndexSettingsUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicaGlobalSecondaryIndexSettingsUpdate { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_description.rs index de28bd0b0..43ed09eee 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_description.rs @@ -4,33 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaSettingsDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaSettingsDescription::ReplicaSettingsDescription { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), - ReplicaStatus: ::std::rc::Rc::new(match &value.replica_status { + ReplicaStatus: ::dafny_runtime::Rc::new(match &value.replica_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::replica_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaBillingModeSummary: ::std::rc::Rc::new(match &value.replica_billing_mode_summary { + ReplicaBillingModeSummary: ::dafny_runtime::Rc::new(match &value.replica_billing_mode_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ReplicaProvisionedReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.replica_provisioned_read_capacity_units), - ReplicaProvisionedReadCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings { + ReplicaProvisionedReadCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ReplicaProvisionedWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.replica_provisioned_write_capacity_units), - ReplicaProvisionedWriteCapacityAutoScalingSettings: ::std::rc::Rc::new(match &value.replica_provisioned_write_capacity_auto_scaling_settings { + ReplicaProvisionedWriteCapacityAutoScalingSettings: ::dafny_runtime::Rc::new(match &value.replica_provisioned_write_capacity_auto_scaling_settings { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaGlobalSecondaryIndexSettings: ::std::rc::Rc::new(match &value.replica_global_secondary_index_settings { + ReplicaGlobalSecondaryIndexSettings: ::dafny_runtime::Rc::new(match &value.replica_global_secondary_index_settings { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_description::to_dafny(e) @@ -40,16 +40,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReplicaTableClassSummary: ::std::rc::Rc::new(match &value.replica_table_class_summary { + ReplicaTableClassSummary: ::dafny_runtime::Rc::new(match &value.replica_table_class_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaSettingsDescription, >, ) -> aws_sdk_dynamodb::types::ReplicaSettingsDescription { @@ -86,7 +87,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_description::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_update.rs index ce6e3bf8d..0efa10834 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_settings_update.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaSettingsUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaSettingsUpdate::ReplicaSettingsUpdate { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), ReplicaProvisionedReadCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.replica_provisioned_read_capacity_units), - ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate: ::std::rc::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings_update { + ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate: ::dafny_runtime::Rc::new(match &value.replica_provisioned_read_capacity_auto_scaling_settings_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaGlobalSecondaryIndexSettingsUpdate: ::std::rc::Rc::new(match &value.replica_global_secondary_index_settings_update { + ReplicaGlobalSecondaryIndexSettingsUpdate: ::dafny_runtime::Rc::new(match &value.replica_global_secondary_index_settings_update { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_update::to_dafny(e) @@ -24,16 +24,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReplicaTableClass: ::std::rc::Rc::new(match &value.replica_table_class { + ReplicaTableClass: ::dafny_runtime::Rc::new(match &value.replica_table_class { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaSettingsUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicaSettingsUpdate { @@ -50,7 +51,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index_settings_update::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_status.rs index fd626473a..0ddf53bcd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_status.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ReplicaStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ReplicaStatus::Creating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaStatus::CREATING {}, aws_sdk_dynamodb::types::ReplicaStatus::CreationFailed => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaStatus::CREATION_FAILED {}, aws_sdk_dynamodb::types::ReplicaStatus::Updating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaStatus::UPDATING {}, @@ -17,7 +17,7 @@ aws_sdk_dynamodb::types::ReplicaStatus::InaccessibleEncryptionCredentials => cra _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaStatus, ) -> aws_sdk_dynamodb::types::ReplicaStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_update.rs index a768a899b..9db4aa226 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replica_update.rs @@ -4,40 +4,44 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicaUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaUpdate::ReplicaUpdate { - Create: ::std::rc::Rc::new(match &value.create { + Create: ::dafny_runtime::Rc::new(match &value.create { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::create_replica_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Delete: ::std::rc::Rc::new(match &value.delete { + Delete: ::dafny_runtime::Rc::new(match &value.delete { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::delete_replica_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicaUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicaUpdate { aws_sdk_dynamodb::types::ReplicaUpdate::builder() - .set_create(match (*dafny_value.Create()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::create_replica_action::from_dafny(value.clone())), - _ => None, -} -) - .set_delete(match (*dafny_value.Delete()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::delete_replica_action::from_dafny(value.clone())), - _ => None, -} -) - .build() - + .set_create(match (*dafny_value.Create()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::create_replica_action::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .set_delete(match (*dafny_value.Delete()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::delete_replica_action::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replication_group_update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replication_group_update.rs index d2d134b4e..c26b22b47 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replication_group_update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/replication_group_update.rs @@ -4,29 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::ReplicationGroupUpdate, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicationGroupUpdate::ReplicationGroupUpdate { - Create: ::std::rc::Rc::new(match &value.create { + Create: ::dafny_runtime::Rc::new(match &value.create { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::create_replication_group_member_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Update: ::std::rc::Rc::new(match &value.update { + Update: ::dafny_runtime::Rc::new(match &value.update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::update_replication_group_member_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Delete: ::std::rc::Rc::new(match &value.delete { + Delete: ::dafny_runtime::Rc::new(match &value.delete { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::delete_replication_group_member_action::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReplicationGroupUpdate, >, ) -> aws_sdk_dynamodb::types::ReplicationGroupUpdate { @@ -50,5 +51,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_summary.rs index f5e889989..3eff4064a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_summary.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::RestoreSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreSummary::RestoreSummary { SourceBackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.source_backup_arn), SourceTableArn: crate::standard_library_conversions::ostring_to_dafny(&value.source_table_arn), @@ -13,17 +13,26 @@ pub fn to_dafny( RestoreInProgress: value.restore_in_progress.clone(), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreSummary, >, ) -> aws_sdk_dynamodb::types::RestoreSummary { aws_sdk_dynamodb::types::RestoreSummary::builder() - .set_source_backup_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.SourceBackupArn().clone())) - .set_source_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.SourceTableArn().clone())) - .set_restore_date_time(Some(crate::standard_library_conversions::timestamp_from_dafny(dafny_value.RestoreDateTime().clone()))) - .set_restore_in_progress(Some( dafny_value.RestoreInProgress() .clone() )) - .build() - .unwrap() + .set_source_backup_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.SourceBackupArn().clone(), + )) + .set_source_table_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.SourceTableArn().clone(), + )) + .set_restore_date_time(Some( + crate::standard_library_conversions::timestamp_from_dafny( + dafny_value.RestoreDateTime().clone(), + ), + )) + .set_restore_in_progress(Some(dafny_value.RestoreInProgress().clone())) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup.rs index 5e8fee784..a85f3bc99 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupError::BackupInUseException(e) => @@ -36,6 +38,6 @@ pub fn to_dafny_error( } } - pub mod _restore_table_from_backup_request; +pub mod _restore_table_from_backup_request; - pub mod _restore_table_from_backup_response; +pub mod _restore_table_from_backup_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_request.rs index 54469be7d..4fa84976f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_request.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupInput::RestoreTableFromBackupInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupInput::RestoreTableFromBackupInput { TargetTableName: crate::standard_library_conversions::ostring_to_dafny(&value.target_table_name) .Extract(), BackupArn: crate::standard_library_conversions::ostring_to_dafny(&value.backup_arn) .Extract(), - BillingModeOverride: ::std::rc::Rc::new(match &value.billing_mode_override { + BillingModeOverride: ::dafny_runtime::Rc::new(match &value.billing_mode_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexOverride: ::std::rc::Rc::new(match &value.global_secondary_index_override { + GlobalSecondaryIndexOverride: ::dafny_runtime::Rc::new(match &value.global_secondary_index_override { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::to_dafny(e) @@ -25,7 +25,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - LocalSecondaryIndexOverride: ::std::rc::Rc::new(match &value.local_secondary_index_override { + LocalSecondaryIndexOverride: ::dafny_runtime::Rc::new(match &value.local_secondary_index_override { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::to_dafny(e) @@ -35,28 +35,28 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSESpecificationOverride: ::std::rc::Rc::new(match &value.sse_specification_override { + SSESpecificationOverride: ::dafny_runtime::Rc::new(match &value.sse_specification_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupInput, - > + >, ) -> aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupInput { aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupInput::builder() .set_target_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TargetTableName()) )) @@ -72,7 +72,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) , ) ), @@ -83,7 +83,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_response.rs index 63ba16c64..2dec76cca 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_from_backup/_restore_table_from_backup_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupOutput::RestoreTableFromBackupOutput { - TableDescription: ::std::rc::Rc::new(match &value.table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupOutput::RestoreTableFromBackupOutput { + TableDescription: ::dafny_runtime::Rc::new(match &value.table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableFromBackupOutput, - > + >, ) -> aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupOutput { aws_sdk_dynamodb::operation::restore_table_from_backup::RestoreTableFromBackupOutput::builder() - .set_table_description(match (*dafny_value.TableDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_table_description(match (*dafny_value.TableDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time.rs index 7c28af331..5b539922c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeError::InternalServerError(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _restore_table_to_point_in_time_request; +pub mod _restore_table_to_point_in_time_request; - pub mod _restore_table_to_point_in_time_response; +pub mod _restore_table_to_point_in_time_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_request.rs index e0621b5be..ba77f62c2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_request.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput { SourceTableArn: crate::standard_library_conversions::ostring_to_dafny(&value.source_table_arn), SourceTableName: crate::standard_library_conversions::ostring_to_dafny(&value.source_table_name), TargetTableName: crate::standard_library_conversions::ostring_to_dafny(&value.target_table_name) .Extract(), UseLatestRestorableTime: crate::standard_library_conversions::obool_to_dafny(&value.use_latest_restorable_time), RestoreDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.restore_date_time), - BillingModeOverride: ::std::rc::Rc::new(match &value.billing_mode_override { + BillingModeOverride: ::dafny_runtime::Rc::new(match &value.billing_mode_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexOverride: ::std::rc::Rc::new(match &value.global_secondary_index_override { + GlobalSecondaryIndexOverride: ::dafny_runtime::Rc::new(match &value.global_secondary_index_override { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::to_dafny(e) @@ -28,7 +28,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - LocalSecondaryIndexOverride: ::std::rc::Rc::new(match &value.local_secondary_index_override { + LocalSecondaryIndexOverride: ::dafny_runtime::Rc::new(match &value.local_secondary_index_override { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::to_dafny(e) @@ -38,28 +38,28 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSESpecificationOverride: ::std::rc::Rc::new(match &value.sse_specification_override { + SSESpecificationOverride: ::dafny_runtime::Rc::new(match &value.sse_specification_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeInput, - > + >, ) -> aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeInput { aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeInput::builder() .set_source_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.SourceTableArn().clone())) @@ -78,7 +78,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) , ) ), @@ -89,7 +89,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_response.rs index f5a83b889..f477dda3f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/restore_table_to_point_in_time/_restore_table_to_point_in_time_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput { - TableDescription: ::std::rc::Rc::new(match &value.table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput { + TableDescription: ::dafny_runtime::Rc::new(match &value.table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::RestoreTableToPointInTimeOutput, - > + >, ) -> aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeOutput { aws_sdk_dynamodb::operation::restore_table_to_point_in_time::RestoreTableToPointInTimeOutput::builder() .set_table_description(match (*dafny_value.TableDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_consumed_capacity.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_consumed_capacity.rs index b2526611f..0c516111b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_consumed_capacity.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_consumed_capacity.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ReturnConsumedCapacity, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ReturnConsumedCapacity::Indexes => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnConsumedCapacity::INDEXES {}, aws_sdk_dynamodb::types::ReturnConsumedCapacity::Total => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnConsumedCapacity::TOTAL {}, aws_sdk_dynamodb::types::ReturnConsumedCapacity::None => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnConsumedCapacity::NONE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnConsumedCapacity, ) -> aws_sdk_dynamodb::types::ReturnConsumedCapacity { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_item_collection_metrics.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_item_collection_metrics.rs index 685738730..345e64fdf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_item_collection_metrics.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_item_collection_metrics.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ReturnItemCollectionMetrics, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ReturnItemCollectionMetrics::Size => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnItemCollectionMetrics::SIZE {}, aws_sdk_dynamodb::types::ReturnItemCollectionMetrics::None => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnItemCollectionMetrics::NONE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnItemCollectionMetrics, ) -> aws_sdk_dynamodb::types::ReturnItemCollectionMetrics { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_value.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_value.rs index df8085df3..ee11f4b9e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_value.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_value.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ReturnValue, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValue, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ReturnValue::None => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValue::NONE {}, aws_sdk_dynamodb::types::ReturnValue::AllOld => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValue::ALL_OLD {}, aws_sdk_dynamodb::types::ReturnValue::UpdatedOld => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValue::UPDATED_OLD {}, @@ -15,7 +17,7 @@ aws_sdk_dynamodb::types::ReturnValue::UpdatedNew => crate::r#software::amazon::c _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValue, ) -> aws_sdk_dynamodb::types::ReturnValue { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_values_on_condition_check_failure.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_values_on_condition_check_failure.rs index 7d3380d94..80d8cc034 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_values_on_condition_check_failure.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/return_values_on_condition_check_failure.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ReturnValuesOnConditionCheckFailure, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ReturnValuesOnConditionCheckFailure::AllOld => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValuesOnConditionCheckFailure::ALL_OLD {}, aws_sdk_dynamodb::types::ReturnValuesOnConditionCheckFailure::None => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValuesOnConditionCheckFailure::NONE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ReturnValuesOnConditionCheckFailure, ) -> aws_sdk_dynamodb::types::ReturnValuesOnConditionCheckFailure { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_bucket_source.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_bucket_source.rs index d7540376d..bda098572 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_bucket_source.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_bucket_source.rs @@ -4,24 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::S3BucketSource, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::S3BucketSource::S3BucketSource { S3BucketOwner: crate::standard_library_conversions::ostring_to_dafny(&value.s3_bucket_owner), S3Bucket: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.s3_bucket), S3KeyPrefix: crate::standard_library_conversions::ostring_to_dafny(&value.s3_key_prefix), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::S3BucketSource, >, ) -> aws_sdk_dynamodb::types::S3BucketSource { aws_sdk_dynamodb::types::S3BucketSource::builder() - .set_s3_bucket_owner(crate::standard_library_conversions::ostring_from_dafny(dafny_value.S3BucketOwner().clone())) - .set_s3_bucket(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.S3Bucket()) )) - .set_s3_key_prefix(crate::standard_library_conversions::ostring_from_dafny(dafny_value.S3KeyPrefix().clone())) - .build() - .unwrap() + .set_s3_bucket_owner(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.S3BucketOwner().clone(), + )) + .set_s3_bucket(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.S3Bucket(), + ), + )) + .set_s3_key_prefix(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.S3KeyPrefix().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_sse_algorithm.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_sse_algorithm.rs index 5e7e786e1..e95dc9bbf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_sse_algorithm.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/s3_sse_algorithm.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::S3SseAlgorithm, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::S3SseAlgorithm::Aes256 => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::S3SseAlgorithm::AES256 {}, aws_sdk_dynamodb::types::S3SseAlgorithm::Kms => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::S3SseAlgorithm::KMS {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::S3SseAlgorithm, ) -> aws_sdk_dynamodb::types::S3SseAlgorithm { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scalar_attribute_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scalar_attribute_type.rs index f921f603f..be06a3016 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scalar_attribute_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scalar_attribute_type.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::ScalarAttributeType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::ScalarAttributeType::S => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScalarAttributeType::S {}, aws_sdk_dynamodb::types::ScalarAttributeType::N => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScalarAttributeType::N {}, aws_sdk_dynamodb::types::ScalarAttributeType::B => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScalarAttributeType::B {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScalarAttributeType, ) -> aws_sdk_dynamodb::types::ScalarAttributeType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan.rs index f3cdc3a94..81be51660 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::scan::ScanError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::scan::ScanError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _scan_request; +pub mod _scan_request; - pub mod _scan_response; +pub mod _scan_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_request.rs index 45fa03a39..d7742cc9a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_request.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::scan::ScanInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput::ScanInput { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput::ScanInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - AttributesToGet: ::std::rc::Rc::new(match &value.attributes_to_get { + AttributesToGet: ::dafny_runtime::Rc::new(match &value.attributes_to_get { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -20,13 +20,13 @@ pub fn to_dafny( }) , Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), - Select: ::std::rc::Rc::new(match &value.select { + Select: ::dafny_runtime::Rc::new(match &value.select { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::select::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ScanFilter: -::std::rc::Rc::new(match &value.scan_filter { +::dafny_runtime::Rc::new(match &value.scan_filter { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -37,13 +37,13 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConditionalOperator: ::std::rc::Rc::new(match &value.conditional_operator { + ConditionalOperator: ::dafny_runtime::Rc::new(match &value.conditional_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::conditional_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , ExclusiveStartKey: -::std::rc::Rc::new(match &value.exclusive_start_key { +::dafny_runtime::Rc::new(match &value.exclusive_start_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -54,7 +54,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -64,7 +64,7 @@ pub fn to_dafny( ProjectionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.projection_expression), FilterExpression: crate::standard_library_conversions::ostring_to_dafny(&value.filter_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -75,7 +75,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -89,11 +89,11 @@ pub fn to_dafny( ConsistentRead: crate::standard_library_conversions::obool_to_dafny(&value.consistent_read), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput, - > + >, ) -> aws_sdk_dynamodb::operation::scan::ScanInput { aws_sdk_dynamodb::operation::scan::ScanInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) @@ -121,7 +121,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::condition::from_dafny(v.clone()) , ) ), @@ -140,7 +140,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -174,7 +174,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_response.rs index 230f7d3a9..40f743173 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/scan/_scan_response.rs @@ -3,12 +3,12 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_dynamodb::operation::scan::ScanOutput -) -> ::std::rc::Rc< + value: &aws_sdk_dynamodb::operation::scan::ScanOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput::ScanOutput { - Items: ::std::rc::Rc::new(match &value.items { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput::ScanOutput { + Items: ::dafny_runtime::Rc::new(match &value.items { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&e.clone(), @@ -25,7 +25,7 @@ pub fn to_dafny( Count: crate::standard_library_conversions::oint_to_dafny(Some(value.count)), ScannedCount: crate::standard_library_conversions::oint_to_dafny(Some(value.scanned_count)), LastEvaluatedKey: -::std::rc::Rc::new(match &value.last_evaluated_key { +::dafny_runtime::Rc::new(match &value.last_evaluated_key { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -36,27 +36,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput, - > + >, ) -> aws_sdk_dynamodb::operation::scan::ScanOutput { aws_sdk_dynamodb::operation::scan::ScanOutput::builder() .set_items(match (*dafny_value.Items()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, + |e: &::dafny_runtime::dafny_runtime_conversions::DafnyMap<::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>, ::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&e, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) , @@ -72,7 +72,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -86,6 +86,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/select.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/select.rs index c52b7a634..d0f508472 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/select.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/select.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::Select, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Select, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::Select::AllAttributes => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Select::ALL_ATTRIBUTES {}, aws_sdk_dynamodb::types::Select::AllProjectedAttributes => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Select::ALL_PROJECTED_ATTRIBUTES {}, aws_sdk_dynamodb::types::Select::SpecificAttributes => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Select::SPECIFIC_ATTRIBUTES {}, @@ -14,7 +16,7 @@ aws_sdk_dynamodb::types::Select::Count => crate::r#software::amazon::cryptograph _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Select, ) -> aws_sdk_dynamodb::types::Select { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_details.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_details.rs index fc765d35d..41dedf0e2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_details.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_details.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::SourceTableDetails, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SourceTableDetails::SourceTableDetails { TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), TableId: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_id), @@ -19,22 +19,23 @@ pub fn to_dafny( TableCreationDateTime: crate::standard_library_conversions::timestamp_to_dafny(&value.table_creation_date_time), ProvisionedThroughput: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(&value.provisioned_throughput.clone().unwrap()) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ItemCount: crate::standard_library_conversions::olong_to_dafny(&value.item_count), - BillingMode: ::std::rc::Rc::new(match &value.billing_mode { + BillingMode: ::dafny_runtime::Rc::new(match &value.billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SourceTableDetails, >, ) -> aws_sdk_dynamodb::types::SourceTableDetails { @@ -44,7 +45,7 @@ pub fn from_dafny( .set_table_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableArn().clone())) .set_table_size_bytes(crate::standard_library_conversions::olong_from_dafny(dafny_value.TableSizeBytes().clone())) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_feature_details.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_feature_details.rs index 6ea2fcd5a..fd92bbe58 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_feature_details.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/source_table_feature_details.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::SourceTableFeatureDetails, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SourceTableFeatureDetails::SourceTableFeatureDetails { - LocalSecondaryIndexes: ::std::rc::Rc::new(match &value.local_secondary_indexes { + LocalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.local_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_info::to_dafny(e) @@ -17,7 +17,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_info::to_dafny(e) @@ -27,26 +27,27 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - StreamDescription: ::std::rc::Rc::new(match &value.stream_description { + StreamDescription: ::dafny_runtime::Rc::new(match &value.stream_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::stream_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - TimeToLiveDescription: ::std::rc::Rc::new(match &value.time_to_live_description { + TimeToLiveDescription: ::dafny_runtime::Rc::new(match &value.time_to_live_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSEDescription: ::std::rc::Rc::new(match &value.sse_description { + SSEDescription: ::dafny_runtime::Rc::new(match &value.sse_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SourceTableFeatureDetails, >, ) -> aws_sdk_dynamodb::types::SourceTableFeatureDetails { @@ -55,7 +56,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_info::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_info::from_dafny(e.clone()) , ) ), @@ -66,7 +67,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_info::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_info::from_dafny(e.clone()) , ) ), @@ -92,5 +93,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_description.rs index 3ee81984f..8895f17f3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_description.rs @@ -4,15 +4,15 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::SseDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEDescription::SSEDescription { - Status: ::std::rc::Rc::new(match &value.status { + Status: ::dafny_runtime::Rc::new(match &value.status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSEType: ::std::rc::Rc::new(match &value.sse_type { + SSEType: ::dafny_runtime::Rc::new(match &value.sse_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -21,29 +21,33 @@ pub fn to_dafny( InaccessibleEncryptionDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.inaccessible_encryption_date_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEDescription, >, ) -> aws_sdk_dynamodb::types::SseDescription { aws_sdk_dynamodb::types::SseDescription::builder() - .set_status(match &**dafny_value.Status() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::sse_status::from_dafny(value) - ), - _ => None, -} -) - .set_sse_type(match &**dafny_value.SSEType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::sse_type::from_dafny(value) - ), - _ => None, -} -) - .set_kms_master_key_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KMSMasterKeyArn().clone())) - .set_inaccessible_encryption_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.InaccessibleEncryptionDateTime().clone())) - .build() - + .set_status(match &**dafny_value.Status() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::sse_status::from_dafny(value), + ), + _ => None, + }) + .set_sse_type(match &**dafny_value.SSEType() { + crate::r#_Wrappers_Compile::Option::Some { value } => { + Some(crate::deps::com_amazonaws_dynamodb::conversions::sse_type::from_dafny(value)) + } + _ => None, + }) + .set_kms_master_key_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KMSMasterKeyArn().clone(), + )) + .set_inaccessible_encryption_date_time( + crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.InaccessibleEncryptionDateTime().clone(), + ), + ) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_specification.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_specification.rs index dfeefcd02..83fc3462f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_specification.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_specification.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::SseSpecification, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSESpecification::SSESpecification { Enabled: crate::standard_library_conversions::obool_to_dafny(&value.enabled), - SSEType: ::std::rc::Rc::new(match &value.sse_type { + SSEType: ::dafny_runtime::Rc::new(match &value.sse_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -16,22 +16,25 @@ pub fn to_dafny( KMSMasterKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_master_key_id), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSESpecification, >, ) -> aws_sdk_dynamodb::types::SseSpecification { aws_sdk_dynamodb::types::SseSpecification::builder() - .set_enabled(crate::standard_library_conversions::obool_from_dafny(dafny_value.Enabled().clone())) - .set_sse_type(match &**dafny_value.SSEType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::sse_type::from_dafny(value) - ), - _ => None, -} -) - .set_kms_master_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KMSMasterKeyId().clone())) - .build() - + .set_enabled(crate::standard_library_conversions::obool_from_dafny( + dafny_value.Enabled().clone(), + )) + .set_sse_type(match &**dafny_value.SSEType() { + crate::r#_Wrappers_Compile::Option::Some { value } => { + Some(crate::deps::com_amazonaws_dynamodb::conversions::sse_type::from_dafny(value)) + } + _ => None, + }) + .set_kms_master_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KMSMasterKeyId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_status.rs index a4f20bf1c..5c5ba65b8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_status.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::SseStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::SseStatus::Enabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEStatus::ENABLING {}, aws_sdk_dynamodb::types::SseStatus::Enabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEStatus::ENABLED {}, aws_sdk_dynamodb::types::SseStatus::Disabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEStatus::DISABLING {}, @@ -15,7 +17,7 @@ aws_sdk_dynamodb::types::SseStatus::Updating => crate::r#software::amazon::crypt _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEStatus, ) -> aws_sdk_dynamodb::types::SseStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_type.rs index 56f69062b..10f2c11dd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/sse_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::SseType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::SseType::Aes256 => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEType::AES256 {}, aws_sdk_dynamodb::types::SseType::Kms => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEType::KMS {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::SSEType, ) -> aws_sdk_dynamodb::types::SseType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_specification.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_specification.rs index 84ff9d829..4b4856c8e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_specification.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_specification.rs @@ -4,32 +4,34 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::StreamSpecification, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamSpecification::StreamSpecification { StreamEnabled: value.stream_enabled.clone(), - StreamViewType: ::std::rc::Rc::new(match &value.stream_view_type { + StreamViewType: ::dafny_runtime::Rc::new(match &value.stream_view_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::stream_view_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamSpecification, >, ) -> aws_sdk_dynamodb::types::StreamSpecification { aws_sdk_dynamodb::types::StreamSpecification::builder() - .set_stream_enabled(Some( dafny_value.StreamEnabled() .clone() )) - .set_stream_view_type(match &**dafny_value.StreamViewType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::stream_view_type::from_dafny(value) - ), - _ => None, -} -) - .build() - .unwrap() + .set_stream_enabled(Some(dafny_value.StreamEnabled().clone())) + .set_stream_view_type(match &**dafny_value.StreamViewType() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::stream_view_type::from_dafny( + value, + ), + ), + _ => None, + }) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_view_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_view_type.rs index 718b38e76..212906019 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_view_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/stream_view_type.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::StreamViewType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::StreamViewType::NewImage => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamViewType::NEW_IMAGE {}, aws_sdk_dynamodb::types::StreamViewType::OldImage => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamViewType::OLD_IMAGE {}, aws_sdk_dynamodb::types::StreamViewType::NewAndOldImages => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamViewType::NEW_AND_OLD_IMAGES {}, @@ -14,7 +14,7 @@ aws_sdk_dynamodb::types::StreamViewType::KeysOnly => crate::r#software::amazon:: _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::StreamViewType, ) -> aws_sdk_dynamodb::types::StreamViewType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_auto_scaling_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_auto_scaling_description.rs index 7f9fb1d81..e92948f41 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_auto_scaling_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_auto_scaling_description.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TableAutoScalingDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableAutoScalingDescription::TableAutoScalingDescription { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), - TableStatus: ::std::rc::Rc::new(match &value.table_status { + TableStatus: ::dafny_runtime::Rc::new(match &value.table_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Replicas: ::std::rc::Rc::new(match &value.replicas { + Replicas: ::dafny_runtime::Rc::new(match &value.replicas { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_description::to_dafny(e) @@ -25,9 +25,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableAutoScalingDescription, >, ) -> aws_sdk_dynamodb::types::TableAutoScalingDescription { @@ -44,7 +45,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_description::from_dafny(e.clone()) , ) ), @@ -52,5 +53,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class.rs index f0a717fc9..94376fc95 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::TableClass, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClass, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::TableClass::Standard => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClass::STANDARD {}, aws_sdk_dynamodb::types::TableClass::StandardInfrequentAccess => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClass::STANDARD_INFREQUENT_ACCESS {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClass, ) -> aws_sdk_dynamodb::types::TableClass { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class_summary.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class_summary.rs index 1476090aa..06579ff89 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class_summary.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_class_summary.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TableClassSummary, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClassSummary::TableClassSummary { - TableClass: ::std::rc::Rc::new(match &value.table_class { + TableClass: ::dafny_runtime::Rc::new(match &value.table_class { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -15,21 +15,22 @@ pub fn to_dafny( LastUpdateDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_update_date_time), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableClassSummary, >, ) -> aws_sdk_dynamodb::types::TableClassSummary { aws_sdk_dynamodb::types::TableClassSummary::builder() - .set_table_class(match &**dafny_value.TableClass() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::table_class::from_dafny(value) - ), - _ => None, -} -) - .set_last_update_date_time(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LastUpdateDateTime().clone())) - .build() - + .set_table_class(match &**dafny_value.TableClass() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_class::from_dafny(value), + ), + _ => None, + }) + .set_last_update_date_time(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.LastUpdateDateTime().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_creation_parameters.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_creation_parameters.rs index 83e098825..930dd80b2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_creation_parameters.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_creation_parameters.rs @@ -4,8 +4,8 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TableCreationParameters, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableCreationParameters::TableCreationParameters { TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), AttributeDefinitions: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.attribute_definitions, @@ -18,27 +18,27 @@ pub fn to_dafny( , ) , - BillingMode: ::std::rc::Rc::new(match &value.billing_mode { + BillingMode: ::dafny_runtime::Rc::new(match &value.billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSESpecification: ::std::rc::Rc::new(match &value.sse_specification { + SSESpecification: ::dafny_runtime::Rc::new(match &value.sse_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::to_dafny(e) @@ -50,21 +50,22 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableCreationParameters, >, ) -> aws_sdk_dynamodb::types::TableCreationParameters { aws_sdk_dynamodb::types::TableCreationParameters::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_attribute_definitions(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.AttributeDefinitions(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) , ) )) .set_key_schema(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.KeySchema(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) )) @@ -97,7 +98,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_description.rs index 96e1eb5e6..a642728ed 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_description.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TableDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableDescription::TableDescription { - AttributeDefinitions: ::std::rc::Rc::new(match &value.attribute_definitions { + AttributeDefinitions: ::dafny_runtime::Rc::new(match &value.attribute_definitions { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::to_dafny(e) @@ -18,7 +18,7 @@ pub fn to_dafny( }) , TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), - KeySchema: ::std::rc::Rc::new(match &value.key_schema { + KeySchema: ::dafny_runtime::Rc::new(match &value.key_schema { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::to_dafny(e) @@ -28,13 +28,13 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - TableStatus: ::std::rc::Rc::new(match &value.table_status { + TableStatus: ::dafny_runtime::Rc::new(match &value.table_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , CreationDateTime: crate::standard_library_conversions::otimestamp_to_dafny(&value.creation_date_time), - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -43,12 +43,12 @@ pub fn to_dafny( ItemCount: crate::standard_library_conversions::olong_to_dafny(&value.item_count), TableArn: crate::standard_library_conversions::ostring_to_dafny(&value.table_arn), TableId: crate::standard_library_conversions::ostring_to_dafny(&value.table_id), - BillingModeSummary: ::std::rc::Rc::new(match &value.billing_mode_summary { + BillingModeSummary: ::dafny_runtime::Rc::new(match &value.billing_mode_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - LocalSecondaryIndexes: ::std::rc::Rc::new(match &value.local_secondary_indexes { + LocalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.local_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_description::to_dafny(e) @@ -58,7 +58,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_description::to_dafny(e) @@ -68,7 +68,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - StreamSpecification: ::std::rc::Rc::new(match &value.stream_specification { + StreamSpecification: ::dafny_runtime::Rc::new(match &value.stream_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::stream_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -76,7 +76,7 @@ pub fn to_dafny( LatestStreamLabel: crate::standard_library_conversions::ostring_to_dafny(&value.latest_stream_label), LatestStreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.latest_stream_arn), GlobalTableVersion: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_version), - Replicas: ::std::rc::Rc::new(match &value.replicas { + Replicas: ::dafny_runtime::Rc::new(match &value.replicas { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::to_dafny(e) @@ -86,37 +86,38 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - RestoreSummary: ::std::rc::Rc::new(match &value.restore_summary { + RestoreSummary: ::dafny_runtime::Rc::new(match &value.restore_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::restore_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSEDescription: ::std::rc::Rc::new(match &value.sse_description { + SSEDescription: ::dafny_runtime::Rc::new(match &value.sse_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ArchivalSummary: ::std::rc::Rc::new(match &value.archival_summary { + ArchivalSummary: ::dafny_runtime::Rc::new(match &value.archival_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::archival_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - TableClassSummary: ::std::rc::Rc::new(match &value.table_class_summary { + TableClassSummary: ::dafny_runtime::Rc::new(match &value.table_class_summary { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class_summary::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , DeletionProtectionEnabled: crate::standard_library_conversions::obool_to_dafny(&value.deletion_protection_enabled), - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableDescription, >, ) -> aws_sdk_dynamodb::types::TableDescription { @@ -125,7 +126,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) , ) ), @@ -137,7 +138,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::key_schema_element::from_dafny(e.clone()) , ) ), @@ -172,7 +173,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::local_secondary_index_description::from_dafny(e.clone()) , ) ), @@ -183,7 +184,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_description::from_dafny(e.clone()) , ) ), @@ -203,7 +204,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_description::from_dafny(e.clone()) , ) ), @@ -242,5 +243,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_status.rs index e996bc880..41181536b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/table_status.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::TableStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableStatus, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::TableStatus::Creating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableStatus::CREATING {}, aws_sdk_dynamodb::types::TableStatus::Updating => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableStatus::UPDATING {}, aws_sdk_dynamodb::types::TableStatus::Deleting => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableStatus::DELETING {}, @@ -17,7 +19,7 @@ aws_sdk_dynamodb::types::TableStatus::Archived => crate::r#software::amazon::cry _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TableStatus, ) -> aws_sdk_dynamodb::types::TableStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag.rs index 0cbbd267a..9a81cc4a0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag.rs @@ -4,22 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Tag, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Tag, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Tag::Tag { Key: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.key), Value: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.value), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Tag, >, ) -> aws_sdk_dynamodb::types::Tag { aws_sdk_dynamodb::types::Tag::builder() - .set_key(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Key()) )) - .set_value(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Value()) )) - .build() - .unwrap() + .set_key(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Key(), + ), + )) + .set_value(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Value(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource.rs index f8ae7eb2f..63ab066d0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::tag_resource::TagResourceError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::tag_resource::TagResourceError::InternalServerError(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _tag_resource_request; +pub mod _tag_resource_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource/_tag_resource_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource/_tag_resource_request.rs index c86bfb7d9..1909564d7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource/_tag_resource_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/tag_resource/_tag_resource_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::tag_resource::TagResourceInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TagResourceInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TagResourceInput::TagResourceInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TagResourceInput::TagResourceInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), Tags: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.tags.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::tag::to_dafny(e) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TagResourceInput, - > + >, ) -> aws_sdk_dynamodb::operation::tag_resource::TagResourceInput { aws_sdk_dynamodb::operation::tag_resource::TagResourceInput::builder() .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) .set_tags(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Tags(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::tag::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_description.rs index adc162858..684eb54e4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_description.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TimeToLiveDescription, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveDescription::TimeToLiveDescription { - TimeToLiveStatus: ::std::rc::Rc::new(match &value.time_to_live_status { + TimeToLiveStatus: ::dafny_runtime::Rc::new(match &value.time_to_live_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -15,21 +15,24 @@ pub fn to_dafny( AttributeName: crate::standard_library_conversions::ostring_to_dafny(&value.attribute_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveDescription, >, ) -> aws_sdk_dynamodb::types::TimeToLiveDescription { aws_sdk_dynamodb::types::TimeToLiveDescription::builder() - .set_time_to_live_status(match &**dafny_value.TimeToLiveStatus() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_status::from_dafny(value) - ), - _ => None, -} -) - .set_attribute_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.AttributeName().clone())) - .build() - + .set_time_to_live_status(match &**dafny_value.TimeToLiveStatus() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_status::from_dafny( + value, + ), + ), + _ => None, + }) + .set_attribute_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.AttributeName().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_specification.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_specification.rs index 65ffe79ce..8a80fd035 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_specification.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_specification.rs @@ -4,22 +4,27 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TimeToLiveSpecification, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveSpecification::TimeToLiveSpecification { Enabled: value.enabled.clone(), AttributeName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.attribute_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveSpecification, >, ) -> aws_sdk_dynamodb::types::TimeToLiveSpecification { aws_sdk_dynamodb::types::TimeToLiveSpecification::builder() - .set_enabled(Some( dafny_value.Enabled() .clone() )) - .set_attribute_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AttributeName()) )) - .build() - .unwrap() + .set_enabled(Some(dafny_value.Enabled().clone())) + .set_attribute_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AttributeName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_status.rs index 349a7fc89..a52f2966a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/time_to_live_status.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_dynamodb::types::TimeToLiveStatus, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_dynamodb::types::TimeToLiveStatus::Enabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveStatus::ENABLING {}, aws_sdk_dynamodb::types::TimeToLiveStatus::Disabling => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveStatus::DISABLING {}, aws_sdk_dynamodb::types::TimeToLiveStatus::Enabled => crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveStatus::ENABLED {}, @@ -14,7 +14,7 @@ aws_sdk_dynamodb::types::TimeToLiveStatus::Disabled => crate::r#software::amazon _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TimeToLiveStatus, ) -> aws_sdk_dynamodb::types::TimeToLiveStatus { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_item.rs index 90e660ec1..058188aaa 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_item.rs @@ -4,22 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TransactGetItem, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItem::TransactGetItem { Get: crate::deps::com_amazonaws_dynamodb::conversions::get::to_dafny(&value.get.clone().unwrap()) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItem, >, ) -> aws_sdk_dynamodb::types::TransactGetItem { aws_sdk_dynamodb::types::TransactGetItem::builder() - .set_get(Some( crate::deps::com_amazonaws_dynamodb::conversions::get::from_dafny(dafny_value.Get().clone()) - )) - .build() - + .set_get(Some( + crate::deps::com_amazonaws_dynamodb::conversions::get::from_dafny( + dafny_value.Get().clone(), + ), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items.rs index d2d27aa54..1d9f916ea 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsError::InternalServerError(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _transact_get_items_request; +pub mod _transact_get_items_request; - pub mod _transact_get_items_response; +pub mod _transact_get_items_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_request.rs index 796f9f66c..a139955bc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_request.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput::TransactGetItemsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput::TransactGetItemsInput { TransactItems: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.transact_items.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::transact_get_item::to_dafny(e) , ) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput, - > + >, ) -> aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsInput { aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsInput::builder() .set_transact_items(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.TransactItems(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::transact_get_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::transact_get_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_response.rs index 4ff3c5704..ac488b057 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_get_items/_transact_get_items_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput::TransactGetItemsOutput { - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput::TransactGetItemsOutput { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -18,7 +18,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Responses: ::std::rc::Rc::new(match &value.responses { + Responses: ::dafny_runtime::Rc::new(match &value.responses { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::item_response::to_dafny(e) @@ -30,18 +30,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsOutput { aws_sdk_dynamodb::operation::transact_get_items::TransactGetItemsOutput::builder() .set_consumed_capacity(match (*dafny_value.ConsumedCapacity()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -52,7 +52,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_response::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_response::from_dafny(e.clone()) , ) ), @@ -60,6 +60,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_item.rs index 9044e38e0..4bb770479 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_item.rs @@ -4,62 +4,64 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::TransactWriteItem, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItem::TransactWriteItem { - ConditionCheck: ::std::rc::Rc::new(match &value.condition_check { + ConditionCheck: ::dafny_runtime::Rc::new(match &value.condition_check { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::condition_check::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Put: ::std::rc::Rc::new(match &value.put { + Put: ::dafny_runtime::Rc::new(match &value.put { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::put::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Delete: ::std::rc::Rc::new(match &value.delete { + Delete: ::dafny_runtime::Rc::new(match &value.delete { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::delete::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Update: ::std::rc::Rc::new(match &value.update { + Update: ::dafny_runtime::Rc::new(match &value.update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItem, >, ) -> aws_sdk_dynamodb::types::TransactWriteItem { aws_sdk_dynamodb::types::TransactWriteItem::builder() - .set_condition_check(match (*dafny_value.ConditionCheck()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::condition_check::from_dafny(value.clone())), - _ => None, -} -) - .set_put(match (*dafny_value.Put()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::put::from_dafny(value.clone())), - _ => None, -} -) - .set_delete(match (*dafny_value.Delete()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::delete::from_dafny(value.clone())), - _ => None, -} -) - .set_update(match (*dafny_value.Update()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::update::from_dafny(value.clone())), - _ => None, -} -) - .build() - + .set_condition_check(match (*dafny_value.ConditionCheck()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::condition_check::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .set_put(match (*dafny_value.Put()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::put::from_dafny(value.clone()), + ), + _ => None, + }) + .set_delete(match (*dafny_value.Delete()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::delete::from_dafny(value.clone()), + ), + _ => None, + }) + .set_update(match (*dafny_value.Update()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::update::from_dafny(value.clone()), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items.rs index 2def39272..0ca641e0c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsError::IdempotentParameterMismatchException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _transact_write_items_request; +pub mod _transact_write_items_request; - pub mod _transact_write_items_response; +pub mod _transact_write_items_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_request.rs index 3bf4f4523..d1c27e7af 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_request.rs @@ -4,21 +4,21 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput::TransactWriteItemsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput::TransactWriteItemsInput { TransactItems: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.transact_items.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::transact_write_item::to_dafny(e) , ) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnItemCollectionMetrics: ::std::rc::Rc::new(match &value.return_item_collection_metrics { + ReturnItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.return_item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_item_collection_metrics::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -26,15 +26,15 @@ pub fn to_dafny( ClientRequestToken: crate::standard_library_conversions::ostring_to_dafny(&value.client_request_token), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput, - > + >, ) -> aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsInput { aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsInput::builder() .set_transact_items(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.TransactItems(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::transact_write_item::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::transact_write_item::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_response.rs index dff1b68fb..2ca0aba27 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/transact_write_items/_transact_write_items_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput::TransactWriteItemsOutput { - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput::TransactWriteItemsOutput { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(e) @@ -19,7 +19,7 @@ pub fn to_dafny( }) , ItemCollectionMetrics: -::std::rc::Rc::new(match &value.item_collection_metrics { +::dafny_runtime::Rc::new(match &value.item_collection_metrics { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -35,18 +35,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsOutput { aws_sdk_dynamodb::operation::transact_write_items::TransactWriteItemsOutput::builder() .set_consumed_capacity(match (*dafny_value.ConsumedCapacity()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::from_dafny(e.clone()) , ) ), @@ -58,8 +58,8 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::std::rc::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::from_dafny(e.clone()) + |v: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::Rc>| ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(v, + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::from_dafny(e.clone()) , ) , @@ -69,6 +69,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource.rs index fccbc5404..8568880f3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::untag_resource::UntagResourceError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::untag_resource::UntagResourceError::InternalServerError(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _untag_resource_request; +pub mod _untag_resource_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource/_untag_resource_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource/_untag_resource_request.rs index 86cc70853..3e42f5685 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource/_untag_resource_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/untag_resource/_untag_resource_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::untag_resource::UntagResourceInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UntagResourceInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UntagResourceInput::UntagResourceInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UntagResourceInput::UntagResourceInput { ResourceArn: crate::standard_library_conversions::ostring_to_dafny(&value.resource_arn) .Extract(), TagKeys: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.tag_keys.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -15,11 +15,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UntagResourceInput, - > + >, ) -> aws_sdk_dynamodb::operation::untag_resource::UntagResourceInput { aws_sdk_dynamodb::operation::untag_resource::UntagResourceInput::builder() .set_resource_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.ResourceArn()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update.rs index aaa712472..ab0bee7f7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::Update, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Update, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Update::Update { Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -17,7 +19,7 @@ pub fn to_dafny( TableName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.table_name), ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -28,7 +30,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -39,23 +41,24 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReturnValuesOnConditionCheckFailure: ::std::rc::Rc::new(match &value.return_values_on_condition_check_failure { + ReturnValuesOnConditionCheckFailure: ::dafny_runtime::Rc::new(match &value.return_values_on_condition_check_failure { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_values_on_condition_check_failure::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Update, >, ) -> aws_sdk_dynamodb::types::Update { aws_sdk_dynamodb::types::Update::builder() .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -78,7 +81,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups.rs index 04367ae61..0088ae279 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsError::ContinuousBackupsUnavailableException(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _update_continuous_backups_request; +pub mod _update_continuous_backups_request; - pub mod _update_continuous_backups_response; +pub mod _update_continuous_backups_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_request.rs index ae112280a..0d7aed76b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_request.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsInput::UpdateContinuousBackupsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsInput::UpdateContinuousBackupsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), PointInTimeRecoverySpecification: crate::deps::com_amazonaws_dynamodb::conversions::point_in_time_recovery_specification::to_dafny(&value.point_in_time_recovery_specification.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsInput { aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_response.rs index 32b3d8ec3..86caec76c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_continuous_backups/_update_continuous_backups_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput { - ContinuousBackupsDescription: ::std::rc::Rc::new(match &value.continuous_backups_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput { + ContinuousBackupsDescription: ::dafny_runtime::Rc::new(match &value.continuous_backups_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::continuous_backups_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContinuousBackupsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsOutput { aws_sdk_dynamodb::operation::update_continuous_backups::UpdateContinuousBackupsOutput::builder() .set_continuous_backups_description(match (*dafny_value.ContinuousBackupsDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights.rs index 830a8f9b1..523ef805e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsError::InternalServerError(e) => @@ -26,6 +28,6 @@ pub fn to_dafny_error( } } - pub mod _update_contributor_insights_request; +pub mod _update_contributor_insights_request; - pub mod _update_contributor_insights_response; +pub mod _update_contributor_insights_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_request.rs index 4e0e737ad..5cb9f3140 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_request.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsInput::UpdateContributorInsightsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsInput::UpdateContributorInsightsInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), ContributorInsightsAction: crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_action::to_dafny(value.contributor_insights_action.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsInput { aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_response.rs index 7dadb9a4a..2a1616b5c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_contributor_insights/_update_contributor_insights_response.rs @@ -4,24 +4,24 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsOutput::UpdateContributorInsightsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsOutput::UpdateContributorInsightsOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), IndexName: crate::standard_library_conversions::ostring_to_dafny(&value.index_name), - ContributorInsightsStatus: ::std::rc::Rc::new(match &value.contributor_insights_status { + ContributorInsightsStatus: ::dafny_runtime::Rc::new(match &value.contributor_insights_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::contributor_insights_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateContributorInsightsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsOutput { aws_sdk_dynamodb::operation::update_contributor_insights::UpdateContributorInsightsOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) @@ -34,6 +34,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_secondary_index_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_secondary_index_action.rs index 4c26d4fba..135972001 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_secondary_index_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_secondary_index_action.rs @@ -4,25 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::UpdateGlobalSecondaryIndexAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction { IndexName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.index_name), - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalSecondaryIndexAction, >, ) -> aws_sdk_dynamodb::types::UpdateGlobalSecondaryIndexAction { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table.rs index 1ebe829d3..8d71af36e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableError::GlobalTableNotFoundException(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _update_global_table_request; +pub mod _update_global_table_request; - pub mod _update_global_table_response; +pub mod _update_global_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_request.rs index ea4c455e4..44130fb78 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableInput::UpdateGlobalTableInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableInput::UpdateGlobalTableInput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name) .Extract(), ReplicaUpdates: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.replica_updates.clone().unwrap(), |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_update::to_dafny(e) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableInput { aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableInput::builder() .set_global_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GlobalTableName()) )) .set_replica_updates(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.ReplicaUpdates(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_update::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_response.rs index f7c30532a..2e460445f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table/_update_global_table_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableOutput::UpdateGlobalTableOutput { - GlobalTableDescription: ::std::rc::Rc::new(match &value.global_table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableOutput::UpdateGlobalTableOutput { + GlobalTableDescription: ::dafny_runtime::Rc::new(match &value.global_table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::global_table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableOutput { aws_sdk_dynamodb::operation::update_global_table::UpdateGlobalTableOutput::builder() .set_global_table_description(match (*dafny_value.GlobalTableDescription()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings.rs index 2e3ee86d7..5ce35156c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsError::GlobalTableNotFoundException(e) => @@ -36,6 +38,6 @@ pub fn to_dafny_error( } } - pub mod _update_global_table_settings_request; +pub mod _update_global_table_settings_request; - pub mod _update_global_table_settings_response; +pub mod _update_global_table_settings_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_request.rs index a488ccbbf..8c69e4ed1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_request.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name) .Extract(), - GlobalTableBillingMode: ::std::rc::Rc::new(match &value.global_table_billing_mode { + GlobalTableBillingMode: ::dafny_runtime::Rc::new(match &value.global_table_billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , GlobalTableProvisionedWriteCapacityUnits: crate::standard_library_conversions::olong_to_dafny(&value.global_table_provisioned_write_capacity_units), - GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: ::std::rc::Rc::new(match &value.global_table_provisioned_write_capacity_auto_scaling_settings_update { + GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: ::dafny_runtime::Rc::new(match &value.global_table_provisioned_write_capacity_auto_scaling_settings_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalTableGlobalSecondaryIndexSettingsUpdate: ::std::rc::Rc::new(match &value.global_table_global_secondary_index_settings_update { + GlobalTableGlobalSecondaryIndexSettingsUpdate: ::dafny_runtime::Rc::new(match &value.global_table_global_secondary_index_settings_update { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_table_global_secondary_index_settings_update::to_dafny(e) @@ -30,7 +30,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ReplicaSettingsUpdate: ::std::rc::Rc::new(match &value.replica_settings_update { + ReplicaSettingsUpdate: ::dafny_runtime::Rc::new(match &value.replica_settings_update { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_update::to_dafny(e) @@ -42,11 +42,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsInput { aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsInput::builder() .set_global_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GlobalTableName()) )) @@ -68,7 +68,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_table_global_secondary_index_settings_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_table_global_secondary_index_settings_update::from_dafny(e.clone()) , ) ), @@ -79,7 +79,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_update::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_response.rs index 70725f767..e5e5127c7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_global_table_settings/_update_global_table_settings_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput { GlobalTableName: crate::standard_library_conversions::ostring_to_dafny(&value.global_table_name), - ReplicaSettings: ::std::rc::Rc::new(match &value.replica_settings { + ReplicaSettings: ::dafny_runtime::Rc::new(match &value.replica_settings { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::to_dafny(e) @@ -21,11 +21,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateGlobalTableSettingsOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsOutput { aws_sdk_dynamodb::operation::update_global_table_settings::UpdateGlobalTableSettingsOutput::builder() .set_global_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GlobalTableName().clone())) @@ -33,7 +33,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_settings_description::from_dafny(e.clone()) , ) ), @@ -41,6 +41,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item.rs index 90d7ebe39..ffb4bb854 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_item::UpdateItemError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_item::UpdateItemError::ConditionalCheckFailedException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _update_item_request; +pub mod _update_item_request; - pub mod _update_item_response; +pub mod _update_item_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_request.rs index ece3e5c66..5596b3cb9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_item::UpdateItemInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput::UpdateItemInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput::UpdateItemInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), Key: ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(&value.key.clone().unwrap(), |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -16,7 +16,7 @@ pub fn to_dafny( ) , AttributeUpdates: -::std::rc::Rc::new(match &value.attribute_updates { +::dafny_runtime::Rc::new(match &value.attribute_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -28,7 +28,7 @@ pub fn to_dafny( }) , Expected: -::std::rc::Rc::new(match &value.expected { +::dafny_runtime::Rc::new(match &value.expected { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -39,22 +39,22 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConditionalOperator: ::std::rc::Rc::new(match &value.conditional_operator { + ConditionalOperator: ::dafny_runtime::Rc::new(match &value.conditional_operator { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::conditional_operator::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnValues: ::std::rc::Rc::new(match &value.return_values { + ReturnValues: ::dafny_runtime::Rc::new(match &value.return_values { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_value::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnConsumedCapacity: ::std::rc::Rc::new(match &value.return_consumed_capacity { + ReturnConsumedCapacity: ::dafny_runtime::Rc::new(match &value.return_consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_consumed_capacity::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReturnItemCollectionMetrics: ::std::rc::Rc::new(match &value.return_item_collection_metrics { + ReturnItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.return_item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::return_item_collection_metrics::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -62,7 +62,7 @@ pub fn to_dafny( UpdateExpression: crate::standard_library_conversions::ostring_to_dafny(&value.update_expression), ConditionExpression: crate::standard_library_conversions::ostring_to_dafny(&value.condition_expression), ExpressionAttributeNames: -::std::rc::Rc::new(match &value.expression_attribute_names { +::dafny_runtime::Rc::new(match &value.expression_attribute_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -73,7 +73,7 @@ pub fn to_dafny( }) , ExpressionAttributeValues: -::std::rc::Rc::new(match &value.expression_attribute_values { +::dafny_runtime::Rc::new(match &value.expression_attribute_values { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -86,17 +86,17 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_item::UpdateItemInput { aws_sdk_dynamodb::operation::update_item::UpdateItemInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_key(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(&dafny_value.Key(), |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) )) @@ -105,7 +105,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value_update::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value_update::from_dafny(v.clone()) , ) ), @@ -117,7 +117,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::expected_attribute_value::from_dafny(v.clone()) , ) ), @@ -170,7 +170,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_response.rs index 45717aad9..681716203 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_item/_update_item_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_item::UpdateItemOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput::UpdateItemOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput::UpdateItemOutput { Attributes: -::std::rc::Rc::new(match &value.attributes { +::dafny_runtime::Rc::new(match &value.attributes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,23 +20,23 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - ConsumedCapacity: ::std::rc::Rc::new(match &value.consumed_capacity { + ConsumedCapacity: ::dafny_runtime::Rc::new(match &value.consumed_capacity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::consumed_capacity::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ItemCollectionMetrics: ::std::rc::Rc::new(match &value.item_collection_metrics { + ItemCollectionMetrics: ::dafny_runtime::Rc::new(match &value.item_collection_metrics { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::item_collection_metrics::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_item::UpdateItemOutput { aws_sdk_dynamodb::operation::update_item::UpdateItemOutput::builder() .set_attributes(match (*dafny_value.Attributes()).as_ref() { @@ -44,7 +44,7 @@ pub fn from_dafny( Some( ::dafny_runtime::dafny_runtime_conversions::dafny_map_to_hashmap(value, |k: &::dafny_runtime::dafny_runtime_conversions::DafnySequence<::dafny_runtime::dafny_runtime_conversions::DafnyCharUTF16>| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(k), - |v: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) + |v: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_value::from_dafny(v.clone()) , ) ), @@ -64,6 +64,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_configuration.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_configuration.rs index 09664b40a..7aa870003 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_configuration.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_configuration.rs @@ -4,19 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::UpdateKinesisStreamingConfiguration, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: ::std::rc::Rc::new(match &value.approximate_creation_date_time_precision { + ApproximateCreationDateTimePrecision: ::dafny_runtime::Rc::new(match &value.approximate_creation_date_time_precision { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::approximate_creation_date_time_precision::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingConfiguration, >, ) -> aws_sdk_dynamodb::types::UpdateKinesisStreamingConfiguration { @@ -29,5 +30,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination.rs index ffcebb92a..352eff395 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _update_kinesis_streaming_destination_request; +pub mod _update_kinesis_streaming_destination_request; - pub mod _update_kinesis_streaming_destination_response; +pub mod _update_kinesis_streaming_destination_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_request.rs index 4c01c31b8..70e1a2931 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_request.rs @@ -4,25 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn) .Extract(), - UpdateKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.update_kinesis_streaming_configuration { + UpdateKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.update_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::update_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationInput, > -) -> aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationInput { +) -> aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationInput{ aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) .set_stream_arn(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.StreamArn()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_response.rs index 74d77fd99..5b7f53acb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_kinesis_streaming_destination/_update_kinesis_streaming_destination_response.rs @@ -4,30 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name), StreamArn: crate::standard_library_conversions::ostring_to_dafny(&value.stream_arn), - DestinationStatus: ::std::rc::Rc::new(match &value.destination_status { + DestinationStatus: ::dafny_runtime::Rc::new(match &value.destination_status { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::destination_status::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - UpdateKinesisStreamingConfiguration: ::std::rc::Rc::new(match &value.update_kinesis_streaming_configuration { + UpdateKinesisStreamingConfiguration: ::dafny_runtime::Rc::new(match &value.update_kinesis_streaming_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::update_kinesis_streaming_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateKinesisStreamingDestinationOutput, > -) -> aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationOutput { +) -> aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationOutput{ aws_sdk_dynamodb::operation::update_kinesis_streaming_destination::UpdateKinesisStreamingDestinationOutput::builder() .set_table_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TableName().clone())) .set_stream_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.StreamArn().clone())) @@ -45,6 +45,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_replication_group_member_action.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_replication_group_member_action.rs index 2dbeafdc9..971eae4ea 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_replication_group_member_action.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_replication_group_member_action.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::UpdateReplicationGroupMemberAction, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction { RegionName: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.region_name), KMSMasterKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.kms_master_key_id), - ProvisionedThroughputOverride: ::std::rc::Rc::new(match &value.provisioned_throughput_override { + ProvisionedThroughputOverride: ::dafny_runtime::Rc::new(match &value.provisioned_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - OnDemandThroughputOverride: ::std::rc::Rc::new(match &value.on_demand_throughput_override { + OnDemandThroughputOverride: ::dafny_runtime::Rc::new(match &value.on_demand_throughput_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput_override::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexes: ::std::rc::Rc::new(match &value.global_secondary_indexes { + GlobalSecondaryIndexes: ::dafny_runtime::Rc::new(match &value.global_secondary_indexes { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::to_dafny(e) @@ -29,16 +29,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - TableClassOverride: ::std::rc::Rc::new(match &value.table_class_override { + TableClassOverride: ::dafny_runtime::Rc::new(match &value.table_class_override { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateReplicationGroupMemberAction, >, ) -> aws_sdk_dynamodb::types::UpdateReplicationGroupMemberAction { @@ -61,7 +62,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_global_secondary_index::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table.rs index 80d226a91..7147fec8c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_table::UpdateTableError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_table::UpdateTableError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _update_table_request; +pub mod _update_table_request; - pub mod _update_table_response; +pub mod _update_table_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_request.rs index fb5293a29..c42406dc9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_request.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_table::UpdateTableInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableInput::UpdateTableInput { - AttributeDefinitions: ::std::rc::Rc::new(match &value.attribute_definitions { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableInput::UpdateTableInput { + AttributeDefinitions: ::dafny_runtime::Rc::new(match &value.attribute_definitions { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::to_dafny(e) @@ -19,17 +19,17 @@ pub fn to_dafny( }) , TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), - BillingMode: ::std::rc::Rc::new(match &value.billing_mode { + BillingMode: ::dafny_runtime::Rc::new(match &value.billing_mode { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::billing_mode::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ProvisionedThroughput: ::std::rc::Rc::new(match &value.provisioned_throughput { + ProvisionedThroughput: ::dafny_runtime::Rc::new(match &value.provisioned_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::provisioned_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GlobalSecondaryIndexUpdates: ::std::rc::Rc::new(match &value.global_secondary_index_updates { + GlobalSecondaryIndexUpdates: ::dafny_runtime::Rc::new(match &value.global_secondary_index_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_update::to_dafny(e) @@ -39,17 +39,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - StreamSpecification: ::std::rc::Rc::new(match &value.stream_specification { + StreamSpecification: ::dafny_runtime::Rc::new(match &value.stream_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::stream_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - SSESpecification: ::std::rc::Rc::new(match &value.sse_specification { + SSESpecification: ::dafny_runtime::Rc::new(match &value.sse_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::sse_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaUpdates: ::std::rc::Rc::new(match &value.replica_updates { + ReplicaUpdates: ::dafny_runtime::Rc::new(match &value.replica_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replication_group_update::to_dafny(e) @@ -59,31 +59,31 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - TableClass: ::std::rc::Rc::new(match &value.table_class { + TableClass: ::dafny_runtime::Rc::new(match &value.table_class { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_class::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , DeletionProtectionEnabled: crate::standard_library_conversions::obool_to_dafny(&value.deletion_protection_enabled), - OnDemandThroughput: ::std::rc::Rc::new(match &value.on_demand_throughput { + OnDemandThroughput: ::dafny_runtime::Rc::new(match &value.on_demand_throughput { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::on_demand_throughput::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_table::UpdateTableInput { aws_sdk_dynamodb::operation::update_table::UpdateTableInput::builder() .set_attribute_definitions(match (*dafny_value.AttributeDefinitions()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::attribute_definition::from_dafny(e.clone()) , ) ), @@ -108,7 +108,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_update::from_dafny(e.clone()) , ) ), @@ -131,7 +131,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replication_group_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replication_group_update::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_response.rs index df7d751bc..7fab1e476 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table/_update_table_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_table::UpdateTableOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableOutput::UpdateTableOutput { - TableDescription: ::std::rc::Rc::new(match &value.table_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableOutput::UpdateTableOutput { + TableDescription: ::dafny_runtime::Rc::new(match &value.table_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_table::UpdateTableOutput { aws_sdk_dynamodb::operation::update_table::UpdateTableOutput::builder() - .set_table_description(match (*dafny_value.TableDescription()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_table_description(match (*dafny_value.TableDescription()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::table_description::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling.rs index 8a9e794ad..6f3e0a663 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingError::InternalServerError(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _update_table_replica_auto_scaling_request; +pub mod _update_table_replica_auto_scaling_request; - pub mod _update_table_replica_auto_scaling_response; +pub mod _update_table_replica_auto_scaling_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_request.rs index 74bce7fdd..049833bab 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_request.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput { - GlobalSecondaryIndexUpdates: ::std::rc::Rc::new(match &value.global_secondary_index_updates { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput { + GlobalSecondaryIndexUpdates: ::dafny_runtime::Rc::new(match &value.global_secondary_index_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_auto_scaling_update::to_dafny(e) @@ -19,12 +19,12 @@ pub fn to_dafny( }) , TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), - ProvisionedWriteCapacityAutoScalingUpdate: ::std::rc::Rc::new(match &value.provisioned_write_capacity_auto_scaling_update { + ProvisionedWriteCapacityAutoScalingUpdate: ::dafny_runtime::Rc::new(match &value.provisioned_write_capacity_auto_scaling_update { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::auto_scaling_settings_update::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaUpdates: ::std::rc::Rc::new(match &value.replica_updates { + ReplicaUpdates: ::dafny_runtime::Rc::new(match &value.replica_updates { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_update::to_dafny(e) @@ -36,18 +36,18 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingInput, > -) -> aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingInput { +) -> aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingInput{ aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingInput::builder() .set_global_secondary_index_updates(match (*dafny_value.GlobalSecondaryIndexUpdates()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_auto_scaling_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::global_secondary_index_auto_scaling_update::from_dafny(e.clone()) , ) ), @@ -65,7 +65,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_update::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_dynamodb::conversions::replica_auto_scaling_update::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_response.rs index b0681b21d..663f29341 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_table_replica_auto_scaling/_update_table_replica_auto_scaling_response.rs @@ -4,23 +4,23 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput { - TableAutoScalingDescription: ::std::rc::Rc::new(match &value.table_auto_scaling_description { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput { + TableAutoScalingDescription: ::dafny_runtime::Rc::new(match &value.table_auto_scaling_description { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::table_auto_scaling_description::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTableReplicaAutoScalingOutput, > -) -> aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingOutput { +) -> aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingOutput{ aws_sdk_dynamodb::operation::update_table_replica_auto_scaling::UpdateTableReplicaAutoScalingOutput::builder() .set_table_auto_scaling_description(match (*dafny_value.TableAutoScalingDescription()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live.rs index 316311e69..0dd22db5a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::Error, +> { match value { aws_sdk_dynamodb::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveError::InternalServerError(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _update_time_to_live_request; +pub mod _update_time_to_live_request; - pub mod _update_time_to_live_response; +pub mod _update_time_to_live_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_request.rs index 508002efd..b326671f4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_request.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveInput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveInput::UpdateTimeToLiveInput { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveInput::UpdateTimeToLiveInput { TableName: crate::standard_library_conversions::ostring_to_dafny(&value.table_name) .Extract(), TimeToLiveSpecification: crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_specification::to_dafny(&value.time_to_live_specification.clone().unwrap()) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveInput, - > + >, ) -> aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveInput { aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveInput::builder() .set_table_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TableName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_response.rs index 2572202c3..4555e06aa 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/update_time_to_live/_update_time_to_live_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveOutput, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveOutput::UpdateTimeToLiveOutput { - TimeToLiveSpecification: ::std::rc::Rc::new(match &value.time_to_live_specification { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveOutput::UpdateTimeToLiveOutput { + TimeToLiveSpecification: ::dafny_runtime::Rc::new(match &value.time_to_live_specification { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::time_to_live_specification::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateTimeToLiveOutput, - > + >, ) -> aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveOutput { aws_sdk_dynamodb::operation::update_time_to_live::UpdateTimeToLiveOutput::builder() .set_time_to_live_specification(match (*dafny_value.TimeToLiveSpecification()).as_ref() { @@ -29,6 +29,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/write_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/write_request.rs index 41e630b69..1713b2db8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/write_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/conversions/write_request.rs @@ -4,40 +4,46 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_dynamodb::types::WriteRequest, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequest, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequest::WriteRequest { - PutRequest: ::std::rc::Rc::new(match &value.put_request { + PutRequest: ::dafny_runtime::Rc::new(match &value.put_request { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::put_request::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - DeleteRequest: ::std::rc::Rc::new(match &value.delete_request { + DeleteRequest: ::dafny_runtime::Rc::new(match &value.delete_request { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_dynamodb::conversions::delete_request::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequest, >, ) -> aws_sdk_dynamodb::types::WriteRequest { aws_sdk_dynamodb::types::WriteRequest::builder() - .set_put_request(match (*dafny_value.PutRequest()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::put_request::from_dafny(value.clone())), - _ => None, -} -) - .set_delete_request(match (*dafny_value.DeleteRequest()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_dynamodb::conversions::delete_request::from_dafny(value.clone())), - _ => None, -} -) - .build() - + .set_put_request(match (*dafny_value.PutRequest()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::put_request::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .set_delete_request(match (*dafny_value.DeleteRequest()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_dynamodb::conversions::delete_request::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/types/error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/types/error.rs index 73499b828..ed211785a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/types/error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_dynamodb/types/error.rs @@ -4,141 +4,141 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { BackupInUseException { - error: aws_sdk_dynamodb::types::error::BackupInUseException, -}, + error: aws_sdk_dynamodb::types::error::BackupInUseException, + }, -BackupNotFoundException { - error: aws_sdk_dynamodb::types::error::BackupNotFoundException, -}, + BackupNotFoundException { + error: aws_sdk_dynamodb::types::error::BackupNotFoundException, + }, -ConditionalCheckFailedException { - error: aws_sdk_dynamodb::types::error::ConditionalCheckFailedException, -}, + ConditionalCheckFailedException { + error: aws_sdk_dynamodb::types::error::ConditionalCheckFailedException, + }, -ContinuousBackupsUnavailableException { - error: aws_sdk_dynamodb::types::error::ContinuousBackupsUnavailableException, -}, + ContinuousBackupsUnavailableException { + error: aws_sdk_dynamodb::types::error::ContinuousBackupsUnavailableException, + }, -DuplicateItemException { - error: aws_sdk_dynamodb::types::error::DuplicateItemException, -}, + DuplicateItemException { + error: aws_sdk_dynamodb::types::error::DuplicateItemException, + }, -ExportConflictException { - error: aws_sdk_dynamodb::types::error::ExportConflictException, -}, + ExportConflictException { + error: aws_sdk_dynamodb::types::error::ExportConflictException, + }, -ExportNotFoundException { - error: aws_sdk_dynamodb::types::error::ExportNotFoundException, -}, + ExportNotFoundException { + error: aws_sdk_dynamodb::types::error::ExportNotFoundException, + }, -GlobalTableAlreadyExistsException { - error: aws_sdk_dynamodb::types::error::GlobalTableAlreadyExistsException, -}, + GlobalTableAlreadyExistsException { + error: aws_sdk_dynamodb::types::error::GlobalTableAlreadyExistsException, + }, -GlobalTableNotFoundException { - error: aws_sdk_dynamodb::types::error::GlobalTableNotFoundException, -}, + GlobalTableNotFoundException { + error: aws_sdk_dynamodb::types::error::GlobalTableNotFoundException, + }, -IdempotentParameterMismatchException { - error: aws_sdk_dynamodb::types::error::IdempotentParameterMismatchException, -}, + IdempotentParameterMismatchException { + error: aws_sdk_dynamodb::types::error::IdempotentParameterMismatchException, + }, -ImportConflictException { - error: aws_sdk_dynamodb::types::error::ImportConflictException, -}, + ImportConflictException { + error: aws_sdk_dynamodb::types::error::ImportConflictException, + }, -ImportNotFoundException { - error: aws_sdk_dynamodb::types::error::ImportNotFoundException, -}, + ImportNotFoundException { + error: aws_sdk_dynamodb::types::error::ImportNotFoundException, + }, -IndexNotFoundException { - error: aws_sdk_dynamodb::types::error::IndexNotFoundException, -}, + IndexNotFoundException { + error: aws_sdk_dynamodb::types::error::IndexNotFoundException, + }, -InternalServerError { - error: aws_sdk_dynamodb::types::error::InternalServerError, -}, + InternalServerError { + error: aws_sdk_dynamodb::types::error::InternalServerError, + }, -InvalidEndpointException { - error: aws_sdk_dynamodb::types::error::InvalidEndpointException, -}, + InvalidEndpointException { + error: aws_sdk_dynamodb::types::error::InvalidEndpointException, + }, -InvalidExportTimeException { - error: aws_sdk_dynamodb::types::error::InvalidExportTimeException, -}, + InvalidExportTimeException { + error: aws_sdk_dynamodb::types::error::InvalidExportTimeException, + }, -InvalidRestoreTimeException { - error: aws_sdk_dynamodb::types::error::InvalidRestoreTimeException, -}, + InvalidRestoreTimeException { + error: aws_sdk_dynamodb::types::error::InvalidRestoreTimeException, + }, -ItemCollectionSizeLimitExceededException { - error: aws_sdk_dynamodb::types::error::ItemCollectionSizeLimitExceededException, -}, + ItemCollectionSizeLimitExceededException { + error: aws_sdk_dynamodb::types::error::ItemCollectionSizeLimitExceededException, + }, -LimitExceededException { - error: aws_sdk_dynamodb::types::error::LimitExceededException, -}, + LimitExceededException { + error: aws_sdk_dynamodb::types::error::LimitExceededException, + }, -PointInTimeRecoveryUnavailableException { - error: aws_sdk_dynamodb::types::error::PointInTimeRecoveryUnavailableException, -}, + PointInTimeRecoveryUnavailableException { + error: aws_sdk_dynamodb::types::error::PointInTimeRecoveryUnavailableException, + }, -PolicyNotFoundException { - error: aws_sdk_dynamodb::types::error::PolicyNotFoundException, -}, + PolicyNotFoundException { + error: aws_sdk_dynamodb::types::error::PolicyNotFoundException, + }, -ProvisionedThroughputExceededException { - error: aws_sdk_dynamodb::types::error::ProvisionedThroughputExceededException, -}, + ProvisionedThroughputExceededException { + error: aws_sdk_dynamodb::types::error::ProvisionedThroughputExceededException, + }, -ReplicaAlreadyExistsException { - error: aws_sdk_dynamodb::types::error::ReplicaAlreadyExistsException, -}, + ReplicaAlreadyExistsException { + error: aws_sdk_dynamodb::types::error::ReplicaAlreadyExistsException, + }, -ReplicaNotFoundException { - error: aws_sdk_dynamodb::types::error::ReplicaNotFoundException, -}, + ReplicaNotFoundException { + error: aws_sdk_dynamodb::types::error::ReplicaNotFoundException, + }, -RequestLimitExceeded { - error: aws_sdk_dynamodb::types::error::RequestLimitExceeded, -}, + RequestLimitExceeded { + error: aws_sdk_dynamodb::types::error::RequestLimitExceeded, + }, -ResourceInUseException { - error: aws_sdk_dynamodb::types::error::ResourceInUseException, -}, + ResourceInUseException { + error: aws_sdk_dynamodb::types::error::ResourceInUseException, + }, -ResourceNotFoundException { - error: aws_sdk_dynamodb::types::error::ResourceNotFoundException, -}, + ResourceNotFoundException { + error: aws_sdk_dynamodb::types::error::ResourceNotFoundException, + }, -TableAlreadyExistsException { - error: aws_sdk_dynamodb::types::error::TableAlreadyExistsException, -}, + TableAlreadyExistsException { + error: aws_sdk_dynamodb::types::error::TableAlreadyExistsException, + }, -TableInUseException { - error: aws_sdk_dynamodb::types::error::TableInUseException, -}, + TableInUseException { + error: aws_sdk_dynamodb::types::error::TableInUseException, + }, -TableNotFoundException { - error: aws_sdk_dynamodb::types::error::TableNotFoundException, -}, + TableNotFoundException { + error: aws_sdk_dynamodb::types::error::TableNotFoundException, + }, -TransactionCanceledException { - error: aws_sdk_dynamodb::types::error::TransactionCanceledException, -}, + TransactionCanceledException { + error: aws_sdk_dynamodb::types::error::TransactionCanceledException, + }, -TransactionConflictException { - error: aws_sdk_dynamodb::types::error::TransactionConflictException, -}, + TransactionConflictException { + error: aws_sdk_dynamodb::types::error::TransactionConflictException, + }, -TransactionInProgressException { - error: aws_sdk_dynamodb::types::error::TransactionInProgressException, -}, + TransactionInProgressException { + error: aws_sdk_dynamodb::types::error::TransactionInProgressException, + }, Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/client.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/client.rs index 76c1384c9..4881f30b2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/client.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/client.rs @@ -1,18 +1,18 @@ // Copyright Amazon.com Inc. or its affiliates. All Rights Reserved. // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. -use std::sync::LazyLock; use crate::deps::com_amazonaws_kms::conversions; +use std::sync::LazyLock; #[derive(::std::clone::Clone, ::std::fmt::Debug)] pub struct Client { - pub inner: aws_sdk_kms::Client + pub inner: aws_sdk_kms::Client, } impl ::std::cmp::PartialEq for Client { - fn eq(&self, other: &Self) -> bool { - false - } + fn eq(&self, other: &Self) -> bool { + false + } } impl ::std::convert::Into for aws_sdk_kms::Client { @@ -25,13 +25,13 @@ impl ::std::convert::Into for aws_sdk_kms::Client { /// Necessary because Dafny only generates synchronous code. static dafny_tokio_runtime: LazyLock = LazyLock::new(|| { tokio::runtime::Builder::new_multi_thread() - .enable_all() - .build() - .unwrap() + .enable_all() + .build() + .unwrap() }); -impl dafny_runtime::UpcastObject for Client { - ::dafny_runtime::UpcastObjectFn!(dyn::std::any::Any); +impl dafny_runtime::UpcastObject<::dafny_runtime::DynAny> for Client { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } impl dafny_runtime::UpcastObject for Client { @@ -39,1139 +39,1344 @@ impl dafny_runtime::UpcastObject) - -> std::rc::Rc, - std::rc::Rc + for Client +{ + fn CancelKeyDeletion(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::cancel_key_deletion::_cancel_key_deletion_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.cancel_key_deletion() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::cancel_key_deletion::_cancel_key_deletion_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .cancel_key_deletion() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::cancel_key_deletion::_cancel_key_deletion_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::cancel_key_deletion::to_dafny_error) -} - fn ConnectCustomKeyStore(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ConnectCustomKeyStore(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::connect_custom_key_store::_connect_custom_key_store_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.connect_custom_key_store() - .set_custom_key_store_id(inner_input.custom_key_store_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::connect_custom_key_store::_connect_custom_key_store_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .connect_custom_key_store() + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::connect_custom_key_store::_connect_custom_key_store_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::connect_custom_key_store::to_dafny_error) -} - fn CreateAlias(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::create_alias::_create_alias_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.create_alias() - .set_alias_name(inner_input.alias_name) -.set_target_key_id(inner_input.target_key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::create_alias::to_dafny_error) -} - fn CreateCustomKeyStore(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn CreateAlias( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::create_alias::_create_alias_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .create_alias() + .set_alias_name(inner_input.r#alias_name) + .set_target_key_id(inner_input.r#target_key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::create_alias::to_dafny_error, + ) + } + fn CreateCustomKeyStore(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::create_custom_key_store::_create_custom_key_store_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.create_custom_key_store() - .set_custom_key_store_name(inner_input.custom_key_store_name) -.set_cloud_hsm_cluster_id(inner_input.cloud_hsm_cluster_id) -.set_trust_anchor_certificate(inner_input.trust_anchor_certificate) -.set_key_store_password(inner_input.key_store_password) -.set_custom_key_store_type(inner_input.custom_key_store_type) -.set_xks_proxy_uri_endpoint(inner_input.xks_proxy_uri_endpoint) -.set_xks_proxy_uri_path(inner_input.xks_proxy_uri_path) -.set_xks_proxy_vpc_endpoint_service_name(inner_input.xks_proxy_vpc_endpoint_service_name) -.set_xks_proxy_authentication_credential(inner_input.xks_proxy_authentication_credential) -.set_xks_proxy_connectivity(inner_input.xks_proxy_connectivity) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::create_custom_key_store::_create_custom_key_store_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .create_custom_key_store() + .set_custom_key_store_name(inner_input.r#custom_key_store_name) + .set_cloud_hsm_cluster_id(inner_input.r#cloud_hsm_cluster_id) + .set_trust_anchor_certificate(inner_input.r#trust_anchor_certificate) + .set_key_store_password(inner_input.r#key_store_password) + .set_custom_key_store_type(inner_input.r#custom_key_store_type) + .set_xks_proxy_uri_endpoint(inner_input.r#xks_proxy_uri_endpoint) + .set_xks_proxy_uri_path(inner_input.r#xks_proxy_uri_path) + .set_xks_proxy_vpc_endpoint_service_name( + inner_input.r#xks_proxy_vpc_endpoint_service_name, + ) + .set_xks_proxy_authentication_credential( + inner_input.r#xks_proxy_authentication_credential, + ) + .set_xks_proxy_connectivity(inner_input.r#xks_proxy_connectivity) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::create_custom_key_store::_create_custom_key_store_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::create_custom_key_store::to_dafny_error) -} - fn CreateGrant(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn CreateGrant(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::create_grant::_create_grant_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.create_grant() - .set_key_id(inner_input.key_id) -.set_grantee_principal(inner_input.grantee_principal) -.set_retiring_principal(inner_input.retiring_principal) -.set_operations(inner_input.operations) -.set_constraints(inner_input.constraints) -.set_grant_tokens(inner_input.grant_tokens) -.set_name(inner_input.name) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::create_grant::_create_grant_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .create_grant() + .set_key_id(inner_input.r#key_id) + .set_grantee_principal(inner_input.r#grantee_principal) + .set_retiring_principal(inner_input.r#retiring_principal) + .set_operations(inner_input.r#operations) + .set_constraints(inner_input.r#constraints) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_name(inner_input.r#name) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::create_grant::_create_grant_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::create_grant::to_dafny_error) -} - fn CreateKey(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::create_key::_create_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.create_key() - .set_policy(inner_input.policy) -.set_description(inner_input.description) -.set_key_usage(inner_input.key_usage) -.set_customer_master_key_spec(inner_input.customer_master_key_spec) -.set_key_spec(inner_input.key_spec) -.set_origin(inner_input.origin) -.set_custom_key_store_id(inner_input.custom_key_store_id) -.set_bypass_policy_lockout_safety_check(inner_input.bypass_policy_lockout_safety_check) -.set_tags(inner_input.tags) -.set_multi_region(inner_input.multi_region) -.set_xks_key_id(inner_input.xks_key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::create_key::_create_key_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::create_key::to_dafny_error) -} - fn Decrypt(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn CreateKey(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::decrypt::_decrypt_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.decrypt() - .set_ciphertext_blob(inner_input.ciphertext_blob) -.set_encryption_context(inner_input.encryption_context) -.set_grant_tokens(inner_input.grant_tokens) -.set_key_id(inner_input.key_id) -.set_encryption_algorithm(inner_input.encryption_algorithm) -.set_recipient(inner_input.recipient) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::decrypt::_decrypt_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::decrypt::to_dafny_error) -} - fn DeleteAlias(&self, input: &std::rc::Rc) - -> std::rc::Rc + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::create_key::_create_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .create_key() + .set_policy(inner_input.r#policy) + .set_description(inner_input.r#description) + .set_key_usage(inner_input.r#key_usage) + .set_customer_master_key_spec(inner_input.r#customer_master_key_spec) + .set_key_spec(inner_input.r#key_spec) + .set_origin(inner_input.r#origin) + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .set_bypass_policy_lockout_safety_check( + inner_input.r#bypass_policy_lockout_safety_check, + ) + .set_tags(inner_input.r#tags) + .set_multi_region(inner_input.r#multi_region) + .set_xks_key_id(inner_input.r#xks_key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::create_key::_create_key_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::create_key::to_dafny_error, + ) + } + fn Decrypt(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_alias::_delete_alias_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.delete_alias() - .set_alias_name(inner_input.alias_name) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::delete_alias::to_dafny_error) -} - fn DeleteCustomKeyStore(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = + crate::deps::com_amazonaws_kms::conversions::decrypt::_decrypt_request::from_dafny( + input.clone(), + ); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .decrypt() + .set_ciphertext_blob(inner_input.r#ciphertext_blob) + .set_encryption_context(inner_input.r#encryption_context) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_key_id(inner_input.r#key_id) + .set_encryption_algorithm(inner_input.r#encryption_algorithm) + .set_recipient(inner_input.r#recipient) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::decrypt::_decrypt_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::decrypt::to_dafny_error, + ) + } + fn DeleteAlias( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_alias::_delete_alias_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .delete_alias() + .set_alias_name(inner_input.r#alias_name) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::delete_alias::to_dafny_error, + ) + } + fn DeleteCustomKeyStore(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_custom_key_store::_delete_custom_key_store_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.delete_custom_key_store() - .set_custom_key_store_id(inner_input.custom_key_store_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_custom_key_store::_delete_custom_key_store_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .delete_custom_key_store() + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::delete_custom_key_store::_delete_custom_key_store_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::delete_custom_key_store::to_dafny_error) -} - fn DeleteImportedKeyMaterial(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_imported_key_material::_delete_imported_key_material_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.delete_imported_key_material() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + } + fn DeleteImportedKeyMaterial( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::delete_imported_key_material::_delete_imported_key_material_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .delete_imported_key_material() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, |x| (), crate::deps::com_amazonaws_kms::conversions::delete_imported_key_material::to_dafny_error) -} - fn DeriveSharedSecret(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn DeriveSharedSecret(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::derive_shared_secret::_derive_shared_secret_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.derive_shared_secret() - .set_key_id(inner_input.key_id) -.set_key_agreement_algorithm(inner_input.key_agreement_algorithm) -.set_public_key(inner_input.public_key) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) -.set_recipient(inner_input.recipient) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::derive_shared_secret::_derive_shared_secret_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .derive_shared_secret() + .set_key_id(inner_input.r#key_id) + .set_key_agreement_algorithm(inner_input.r#key_agreement_algorithm) + .set_public_key(inner_input.r#public_key) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .set_recipient(inner_input.r#recipient) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::derive_shared_secret::_derive_shared_secret_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::derive_shared_secret::to_dafny_error) -} - fn DescribeCustomKeyStores(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn DescribeCustomKeyStores(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::describe_custom_key_stores::_describe_custom_key_stores_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.describe_custom_key_stores() - .set_custom_key_store_id(inner_input.custom_key_store_id) -.set_custom_key_store_name(inner_input.custom_key_store_name) -.set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::describe_custom_key_stores::_describe_custom_key_stores_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .describe_custom_key_stores() + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .set_custom_key_store_name(inner_input.r#custom_key_store_name) + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::describe_custom_key_stores::_describe_custom_key_stores_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::describe_custom_key_stores::to_dafny_error) -} - fn DescribeKey(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn DescribeKey(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::describe_key::_describe_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.describe_key() - .set_key_id(inner_input.key_id) -.set_grant_tokens(inner_input.grant_tokens) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::describe_key::_describe_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .describe_key() + .set_key_id(inner_input.r#key_id) + .set_grant_tokens(inner_input.r#grant_tokens) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::describe_key::_describe_key_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::describe_key::to_dafny_error) -} - fn DisableKey(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::disable_key::_disable_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.disable_key() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::disable_key::to_dafny_error) -} - fn DisableKeyRotation(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::disable_key_rotation::_disable_key_rotation_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.disable_key_rotation() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::disable_key_rotation::to_dafny_error) -} - fn DisconnectCustomKeyStore(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn DisableKey( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::disable_key::_disable_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .disable_key() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::disable_key::to_dafny_error, + ) + } + fn DisableKeyRotation( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::disable_key_rotation::_disable_key_rotation_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .disable_key_rotation() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::disable_key_rotation::to_dafny_error, + ) + } + fn DisconnectCustomKeyStore(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::disconnect_custom_key_store::_disconnect_custom_key_store_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.disconnect_custom_key_store() - .set_custom_key_store_id(inner_input.custom_key_store_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::disconnect_custom_key_store::_disconnect_custom_key_store_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .disconnect_custom_key_store() + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::disconnect_custom_key_store::_disconnect_custom_key_store_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::disconnect_custom_key_store::to_dafny_error) -} - fn EnableKey(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::enable_key::_enable_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.enable_key() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::enable_key::to_dafny_error) -} - fn EnableKeyRotation(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::enable_key_rotation::_enable_key_rotation_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.enable_key_rotation() - .set_key_id(inner_input.key_id) -.set_rotation_period_in_days(inner_input.rotation_period_in_days) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::enable_key_rotation::to_dafny_error) -} - fn Encrypt(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn EnableKey( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::enable_key::_enable_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .enable_key() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::enable_key::to_dafny_error, + ) + } + fn EnableKeyRotation( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::enable_key_rotation::_enable_key_rotation_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .enable_key_rotation() + .set_key_id(inner_input.r#key_id) + .set_rotation_period_in_days(inner_input.r#rotation_period_in_days) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::enable_key_rotation::to_dafny_error, + ) + } + fn Encrypt(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::encrypt::_encrypt_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.encrypt() - .set_key_id(inner_input.key_id) -.set_plaintext(inner_input.plaintext) -.set_encryption_context(inner_input.encryption_context) -.set_grant_tokens(inner_input.grant_tokens) -.set_encryption_algorithm(inner_input.encryption_algorithm) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::encrypt::_encrypt_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::encrypt::to_dafny_error) -} - fn GenerateDataKey(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = + crate::deps::com_amazonaws_kms::conversions::encrypt::_encrypt_request::from_dafny( + input.clone(), + ); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .encrypt() + .set_key_id(inner_input.r#key_id) + .set_plaintext(inner_input.r#plaintext) + .set_encryption_context(inner_input.r#encryption_context) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_encryption_algorithm(inner_input.r#encryption_algorithm) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::encrypt::_encrypt_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::encrypt::to_dafny_error, + ) + } + fn GenerateDataKey(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key::_generate_data_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_data_key() - .set_key_id(inner_input.key_id) -.set_encryption_context(inner_input.encryption_context) -.set_number_of_bytes(inner_input.number_of_bytes) -.set_key_spec(inner_input.key_spec) -.set_grant_tokens(inner_input.grant_tokens) -.set_recipient(inner_input.recipient) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key::_generate_data_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_data_key() + .set_key_id(inner_input.r#key_id) + .set_encryption_context(inner_input.r#encryption_context) + .set_number_of_bytes(inner_input.r#number_of_bytes) + .set_key_spec(inner_input.r#key_spec) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_recipient(inner_input.r#recipient) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_data_key::_generate_data_key_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_data_key::to_dafny_error) -} - fn GenerateDataKeyPair(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GenerateDataKeyPair(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair::_generate_data_key_pair_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_data_key_pair() - .set_encryption_context(inner_input.encryption_context) -.set_key_id(inner_input.key_id) -.set_key_pair_spec(inner_input.key_pair_spec) -.set_grant_tokens(inner_input.grant_tokens) -.set_recipient(inner_input.recipient) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair::_generate_data_key_pair_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_data_key_pair() + .set_encryption_context(inner_input.r#encryption_context) + .set_key_id(inner_input.r#key_id) + .set_key_pair_spec(inner_input.r#key_pair_spec) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_recipient(inner_input.r#recipient) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair::_generate_data_key_pair_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair::to_dafny_error) -} - fn GenerateDataKeyPairWithoutPlaintext(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GenerateDataKeyPairWithoutPlaintext(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair_without_plaintext::_generate_data_key_pair_without_plaintext_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_data_key_pair_without_plaintext() - .set_encryption_context(inner_input.encryption_context) -.set_key_id(inner_input.key_id) -.set_key_pair_spec(inner_input.key_pair_spec) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair_without_plaintext::_generate_data_key_pair_without_plaintext_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_data_key_pair_without_plaintext() + .set_encryption_context(inner_input.r#encryption_context) + .set_key_id(inner_input.r#key_id) + .set_key_pair_spec(inner_input.r#key_pair_spec) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair_without_plaintext::_generate_data_key_pair_without_plaintext_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_data_key_pair_without_plaintext::to_dafny_error) -} - fn GenerateDataKeyWithoutPlaintext(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GenerateDataKeyWithoutPlaintext(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_without_plaintext::_generate_data_key_without_plaintext_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_data_key_without_plaintext() - .set_key_id(inner_input.key_id) -.set_encryption_context(inner_input.encryption_context) -.set_key_spec(inner_input.key_spec) -.set_number_of_bytes(inner_input.number_of_bytes) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_data_key_without_plaintext::_generate_data_key_without_plaintext_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_data_key_without_plaintext() + .set_key_id(inner_input.r#key_id) + .set_encryption_context(inner_input.r#encryption_context) + .set_key_spec(inner_input.r#key_spec) + .set_number_of_bytes(inner_input.r#number_of_bytes) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_data_key_without_plaintext::_generate_data_key_without_plaintext_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_data_key_without_plaintext::to_dafny_error) -} - fn GenerateMac(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GenerateMac(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_mac::_generate_mac_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_mac() - .set_message(inner_input.message) -.set_key_id(inner_input.key_id) -.set_mac_algorithm(inner_input.mac_algorithm) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_mac::_generate_mac_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_mac() + .set_message(inner_input.r#message) + .set_key_id(inner_input.r#key_id) + .set_mac_algorithm(inner_input.r#mac_algorithm) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_mac::_generate_mac_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_mac::to_dafny_error) -} - fn GenerateRandom(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GenerateRandom(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_random::_generate_random_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.generate_random() - .set_number_of_bytes(inner_input.number_of_bytes) -.set_custom_key_store_id(inner_input.custom_key_store_id) -.set_recipient(inner_input.recipient) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::generate_random::_generate_random_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .generate_random() + .set_number_of_bytes(inner_input.r#number_of_bytes) + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .set_recipient(inner_input.r#recipient) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::generate_random::_generate_random_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::generate_random::to_dafny_error) -} - fn GetKeyPolicy(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GetKeyPolicy(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::get_key_policy::_get_key_policy_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.get_key_policy() - .set_key_id(inner_input.key_id) -.set_policy_name(inner_input.policy_name) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::get_key_policy::_get_key_policy_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .get_key_policy() + .set_key_id(inner_input.r#key_id) + .set_policy_name(inner_input.r#policy_name) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::get_key_policy::_get_key_policy_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::get_key_policy::to_dafny_error) -} - fn GetKeyRotationStatus(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GetKeyRotationStatus(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::get_key_rotation_status::_get_key_rotation_status_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.get_key_rotation_status() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::get_key_rotation_status::_get_key_rotation_status_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .get_key_rotation_status() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::get_key_rotation_status::_get_key_rotation_status_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::get_key_rotation_status::to_dafny_error) -} - fn GetParametersForImport(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GetParametersForImport(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::get_parameters_for_import::_get_parameters_for_import_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.get_parameters_for_import() - .set_key_id(inner_input.key_id) -.set_wrapping_algorithm(inner_input.wrapping_algorithm) -.set_wrapping_key_spec(inner_input.wrapping_key_spec) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::get_parameters_for_import::_get_parameters_for_import_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .get_parameters_for_import() + .set_key_id(inner_input.r#key_id) + .set_wrapping_algorithm(inner_input.r#wrapping_algorithm) + .set_wrapping_key_spec(inner_input.r#wrapping_key_spec) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::get_parameters_for_import::_get_parameters_for_import_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::get_parameters_for_import::to_dafny_error) -} - fn GetPublicKey(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn GetPublicKey(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::get_public_key::_get_public_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.get_public_key() - .set_key_id(inner_input.key_id) -.set_grant_tokens(inner_input.grant_tokens) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::get_public_key::_get_public_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .get_public_key() + .set_key_id(inner_input.r#key_id) + .set_grant_tokens(inner_input.r#grant_tokens) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::get_public_key::_get_public_key_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::get_public_key::to_dafny_error) -} - fn ImportKeyMaterial(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ImportKeyMaterial(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::import_key_material::_import_key_material_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.import_key_material() - .set_key_id(inner_input.key_id) -.set_import_token(inner_input.import_token) -.set_encrypted_key_material(inner_input.encrypted_key_material) -.set_valid_to(inner_input.valid_to) -.set_expiration_model(inner_input.expiration_model) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::import_key_material::_import_key_material_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .import_key_material() + .set_key_id(inner_input.r#key_id) + .set_import_token(inner_input.r#import_token) + .set_encrypted_key_material(inner_input.r#encrypted_key_material) + .set_valid_to(inner_input.r#valid_to) + .set_expiration_model(inner_input.r#expiration_model) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::import_key_material::_import_key_material_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::import_key_material::to_dafny_error) -} - fn ListAliases(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ListAliases(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_aliases::_list_aliases_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_aliases() - .set_key_id(inner_input.key_id) -.set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::list_aliases::_list_aliases_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_aliases() + .set_key_id(inner_input.r#key_id) + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::list_aliases::_list_aliases_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::list_aliases::to_dafny_error) -} - fn ListGrants(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ListGrants(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_grants::_list_grants_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_grants() - .set_limit(inner_input.limit) -.set_marker(inner_input.marker) -.set_key_id(inner_input.key_id) -.set_grant_id(inner_input.grant_id) -.set_grantee_principal(inner_input.grantee_principal) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::list_grants::_list_grants_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_grants() + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .set_key_id(inner_input.r#key_id) + .set_grant_id(inner_input.r#grant_id) + .set_grantee_principal(inner_input.r#grantee_principal) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::list_grants::_list_grants_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::list_grants::to_dafny_error) -} - fn ListKeyPolicies(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ListKeyPolicies(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_key_policies::_list_key_policies_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_key_policies() - .set_key_id(inner_input.key_id) -.set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::list_key_policies::_list_key_policies_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_key_policies() + .set_key_id(inner_input.r#key_id) + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::list_key_policies::_list_key_policies_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::list_key_policies::to_dafny_error) -} - fn ListKeyRotations(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ListKeyRotations(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_key_rotations::_list_key_rotations_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_key_rotations() - .set_key_id(inner_input.key_id) -.set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::list_key_rotations::_list_key_rotations_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_key_rotations() + .set_key_id(inner_input.r#key_id) + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::list_key_rotations::_list_key_rotations_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::list_key_rotations::to_dafny_error) -} - fn ListKeys(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ListKeys(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_keys::_list_keys_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_keys() - .set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::list_keys::_list_keys_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::list_keys::to_dafny_error) -} - fn ListResourceTags(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = + crate::deps::com_amazonaws_kms::conversions::list_keys::_list_keys_request::from_dafny( + input.clone(), + ); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_keys() + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::list_keys::_list_keys_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::list_keys::to_dafny_error, + ) + } + fn ListResourceTags(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::list_resource_tags::_list_resource_tags_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.list_resource_tags() - .set_key_id(inner_input.key_id) -.set_limit(inner_input.limit) -.set_marker(inner_input.marker) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::list_resource_tags::_list_resource_tags_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .list_resource_tags() + .set_key_id(inner_input.r#key_id) + .set_limit(inner_input.r#limit) + .set_marker(inner_input.r#marker) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::list_resource_tags::_list_resource_tags_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::list_resource_tags::to_dafny_error) -} - fn PutKeyPolicy(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::put_key_policy::_put_key_policy_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.put_key_policy() - .set_key_id(inner_input.key_id) -.set_policy_name(inner_input.policy_name) -.set_policy(inner_input.policy) -.set_bypass_policy_lockout_safety_check(inner_input.bypass_policy_lockout_safety_check) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::put_key_policy::to_dafny_error) -} - fn ReEncrypt(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn PutKeyPolicy( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::put_key_policy::_put_key_policy_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .put_key_policy() + .set_key_id(inner_input.r#key_id) + .set_policy_name(inner_input.r#policy_name) + .set_policy(inner_input.r#policy) + .set_bypass_policy_lockout_safety_check( + inner_input.r#bypass_policy_lockout_safety_check, + ) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::put_key_policy::to_dafny_error, + ) + } + fn ReEncrypt(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::re_encrypt::_re_encrypt_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.re_encrypt() - .set_ciphertext_blob(inner_input.ciphertext_blob) -.set_source_encryption_context(inner_input.source_encryption_context) -.set_source_key_id(inner_input.source_key_id) -.set_destination_key_id(inner_input.destination_key_id) -.set_destination_encryption_context(inner_input.destination_encryption_context) -.set_source_encryption_algorithm(inner_input.source_encryption_algorithm) -.set_destination_encryption_algorithm(inner_input.destination_encryption_algorithm) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::re_encrypt::_re_encrypt_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::re_encrypt::to_dafny_error) -} - fn ReplicateKey(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::re_encrypt::_re_encrypt_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .re_encrypt() + .set_ciphertext_blob(inner_input.r#ciphertext_blob) + .set_source_encryption_context(inner_input.r#source_encryption_context) + .set_source_key_id(inner_input.r#source_key_id) + .set_destination_key_id(inner_input.r#destination_key_id) + .set_destination_encryption_context( + inner_input.r#destination_encryption_context, + ) + .set_source_encryption_algorithm(inner_input.r#source_encryption_algorithm) + .set_destination_encryption_algorithm( + inner_input.r#destination_encryption_algorithm, + ) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::re_encrypt::_re_encrypt_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::re_encrypt::to_dafny_error, + ) + } + fn ReplicateKey(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::replicate_key::_replicate_key_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.replicate_key() - .set_key_id(inner_input.key_id) -.set_replica_region(inner_input.replica_region) -.set_policy(inner_input.policy) -.set_bypass_policy_lockout_safety_check(inner_input.bypass_policy_lockout_safety_check) -.set_description(inner_input.description) -.set_tags(inner_input.tags) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::replicate_key::_replicate_key_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .replicate_key() + .set_key_id(inner_input.r#key_id) + .set_replica_region(inner_input.r#replica_region) + .set_policy(inner_input.r#policy) + .set_bypass_policy_lockout_safety_check( + inner_input.r#bypass_policy_lockout_safety_check, + ) + .set_description(inner_input.r#description) + .set_tags(inner_input.r#tags) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::replicate_key::_replicate_key_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::replicate_key::to_dafny_error) -} - fn RetireGrant(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::retire_grant::_retire_grant_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.retire_grant() - .set_grant_token(inner_input.grant_token) -.set_key_id(inner_input.key_id) -.set_grant_id(inner_input.grant_id) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::retire_grant::to_dafny_error) -} - fn RevokeGrant(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::revoke_grant::_revoke_grant_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.revoke_grant() - .set_key_id(inner_input.key_id) -.set_grant_id(inner_input.grant_id) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::revoke_grant::to_dafny_error) -} - fn RotateKeyOnDemand(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn RetireGrant( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::retire_grant::_retire_grant_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .retire_grant() + .set_grant_token(inner_input.r#grant_token) + .set_key_id(inner_input.r#key_id) + .set_grant_id(inner_input.r#grant_id) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::retire_grant::to_dafny_error, + ) + } + fn RevokeGrant( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::revoke_grant::_revoke_grant_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .revoke_grant() + .set_key_id(inner_input.r#key_id) + .set_grant_id(inner_input.r#grant_id) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::revoke_grant::to_dafny_error, + ) + } + fn RotateKeyOnDemand(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::rotate_key_on_demand::_rotate_key_on_demand_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.rotate_key_on_demand() - .set_key_id(inner_input.key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::rotate_key_on_demand::_rotate_key_on_demand_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .rotate_key_on_demand() + .set_key_id(inner_input.r#key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::rotate_key_on_demand::_rotate_key_on_demand_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::rotate_key_on_demand::to_dafny_error) -} - fn ScheduleKeyDeletion(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn ScheduleKeyDeletion(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::schedule_key_deletion::_schedule_key_deletion_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.schedule_key_deletion() - .set_key_id(inner_input.key_id) -.set_pending_window_in_days(inner_input.pending_window_in_days) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::schedule_key_deletion::_schedule_key_deletion_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .schedule_key_deletion() + .set_key_id(inner_input.r#key_id) + .set_pending_window_in_days(inner_input.r#pending_window_in_days) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::schedule_key_deletion::_schedule_key_deletion_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::schedule_key_deletion::to_dafny_error) -} - fn Sign(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::sign::_sign_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.sign() - .set_key_id(inner_input.key_id) -.set_message(inner_input.message) -.set_message_type(inner_input.message_type) -.set_grant_tokens(inner_input.grant_tokens) -.set_signing_algorithm(inner_input.signing_algorithm) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::sign::_sign_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::sign::to_dafny_error) -} - fn TagResource(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::tag_resource::_tag_resource_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.tag_resource() - .set_key_id(inner_input.key_id) -.set_tags(inner_input.tags) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::tag_resource::to_dafny_error) -} - fn UntagResource(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::untag_resource::_untag_resource_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.untag_resource() - .set_key_id(inner_input.key_id) -.set_tag_keys(inner_input.tag_keys) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::untag_resource::to_dafny_error) -} - fn UpdateAlias(&self, input: &std::rc::Rc) - -> std::rc::Rc + } + fn Sign(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::update_alias::_update_alias_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.update_alias() - .set_alias_name(inner_input.alias_name) -.set_target_key_id(inner_input.target_key_id) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::update_alias::to_dafny_error) -} - fn UpdateCustomKeyStore(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = + crate::deps::com_amazonaws_kms::conversions::sign::_sign_request::from_dafny( + input.clone(), + ); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .sign() + .set_key_id(inner_input.r#key_id) + .set_message(inner_input.r#message) + .set_message_type(inner_input.r#message_type) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_signing_algorithm(inner_input.r#signing_algorithm) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::sign::_sign_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::sign::to_dafny_error, + ) + } + fn TagResource( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::tag_resource::_tag_resource_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .tag_resource() + .set_key_id(inner_input.r#key_id) + .set_tags(inner_input.r#tags) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::tag_resource::to_dafny_error, + ) + } + fn UntagResource( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::untag_resource::_untag_resource_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .untag_resource() + .set_key_id(inner_input.r#key_id) + .set_tag_keys(inner_input.r#tag_keys) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::untag_resource::to_dafny_error, + ) + } + fn UpdateAlias( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::update_alias::_update_alias_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .update_alias() + .set_alias_name(inner_input.r#alias_name) + .set_target_key_id(inner_input.r#target_key_id) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::update_alias::to_dafny_error, + ) + } + fn UpdateCustomKeyStore(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::update_custom_key_store::_update_custom_key_store_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.update_custom_key_store() - .set_custom_key_store_id(inner_input.custom_key_store_id) -.set_new_custom_key_store_name(inner_input.new_custom_key_store_name) -.set_key_store_password(inner_input.key_store_password) -.set_cloud_hsm_cluster_id(inner_input.cloud_hsm_cluster_id) -.set_xks_proxy_uri_endpoint(inner_input.xks_proxy_uri_endpoint) -.set_xks_proxy_uri_path(inner_input.xks_proxy_uri_path) -.set_xks_proxy_vpc_endpoint_service_name(inner_input.xks_proxy_vpc_endpoint_service_name) -.set_xks_proxy_authentication_credential(inner_input.xks_proxy_authentication_credential) -.set_xks_proxy_connectivity(inner_input.xks_proxy_connectivity) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::update_custom_key_store::_update_custom_key_store_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .update_custom_key_store() + .set_custom_key_store_id(inner_input.r#custom_key_store_id) + .set_new_custom_key_store_name(inner_input.r#new_custom_key_store_name) + .set_key_store_password(inner_input.r#key_store_password) + .set_cloud_hsm_cluster_id(inner_input.r#cloud_hsm_cluster_id) + .set_xks_proxy_uri_endpoint(inner_input.r#xks_proxy_uri_endpoint) + .set_xks_proxy_uri_path(inner_input.r#xks_proxy_uri_path) + .set_xks_proxy_vpc_endpoint_service_name( + inner_input.r#xks_proxy_vpc_endpoint_service_name, + ) + .set_xks_proxy_authentication_credential( + inner_input.r#xks_proxy_authentication_credential, + ) + .set_xks_proxy_connectivity(inner_input.r#xks_proxy_connectivity) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny(&native_result, crate::deps::com_amazonaws_kms::conversions::update_custom_key_store::_update_custom_key_store_response::to_dafny, crate::deps::com_amazonaws_kms::conversions::update_custom_key_store::to_dafny_error) -} - fn UpdateKeyDescription(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::update_key_description::_update_key_description_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.update_key_description() - .set_key_id(inner_input.key_id) -.set_description(inner_input.description) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::update_key_description::to_dafny_error) -} - fn UpdatePrimaryRegion(&self, input: &std::rc::Rc) - -> std::rc::Rc - > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::update_primary_region::_update_primary_region_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.update_primary_region() - .set_key_id(inner_input.key_id) -.set_primary_region(inner_input.primary_region) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - |x| (), - crate::deps::com_amazonaws_kms::conversions::update_primary_region::to_dafny_error) -} - fn Verify(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + } + fn UpdateKeyDescription( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::update_key_description::_update_key_description_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .update_key_description() + .set_key_id(inner_input.r#key_id) + .set_description(inner_input.r#description) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::update_key_description::to_dafny_error, + ) + } + fn UpdatePrimaryRegion( + &self, + input: &dafny_runtime::Rc, + ) -> dafny_runtime::Rc< + crate::r#_Wrappers_Compile::Result< + (), + dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, + > { + let inner_input = crate::deps::com_amazonaws_kms::conversions::update_primary_region::_update_primary_region_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .update_primary_region() + .set_key_id(inner_input.r#key_id) + .set_primary_region(inner_input.r#primary_region) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + |x| (), + crate::deps::com_amazonaws_kms::conversions::update_primary_region::to_dafny_error, + ) + } + fn Verify(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::verify::_verify_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.verify() - .set_key_id(inner_input.key_id) -.set_message(inner_input.message) -.set_message_type(inner_input.message_type) -.set_signature(inner_input.signature) -.set_signing_algorithm(inner_input.signing_algorithm) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::verify::_verify_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::verify::to_dafny_error) -} - fn VerifyMac(&self, input: &std::rc::Rc) - -> std::rc::Rc, - std::rc::Rc + >{ + let inner_input = + crate::deps::com_amazonaws_kms::conversions::verify::_verify_request::from_dafny( + input.clone(), + ); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .verify() + .set_key_id(inner_input.r#key_id) + .set_message(inner_input.r#message) + .set_message_type(inner_input.r#message_type) + .set_signature(inner_input.r#signature) + .set_signing_algorithm(inner_input.r#signing_algorithm) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::verify::_verify_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::verify::to_dafny_error, + ) + } + fn VerifyMac(&self, input: &dafny_runtime::Rc) + -> dafny_runtime::Rc, + dafny_runtime::Rc > -> { - let inner_input = crate::deps::com_amazonaws_kms::conversions::verify_mac::_verify_mac_request::from_dafny(input.clone()); - let native_result = tokio::task::block_in_place(|| { - dafny_tokio_runtime.block_on(async { - self.inner.verify_mac() - .set_message(inner_input.message) -.set_key_id(inner_input.key_id) -.set_mac_algorithm(inner_input.mac_algorithm) -.set_mac(inner_input.mac) -.set_grant_tokens(inner_input.grant_tokens) -.set_dry_run(inner_input.dry_run) - .send() - .await - }) - }); - crate::standard_library_conversions::result_to_dafny(&native_result, - crate::deps::com_amazonaws_kms::conversions::verify_mac::_verify_mac_response::to_dafny, - crate::deps::com_amazonaws_kms::conversions::verify_mac::to_dafny_error) + >{ + let inner_input = crate::deps::com_amazonaws_kms::conversions::verify_mac::_verify_mac_request::from_dafny(input.clone()); + let native_result = tokio::task::block_in_place(|| { + dafny_tokio_runtime.block_on(async { + self.inner + .verify_mac() + .set_message(inner_input.r#message) + .set_key_id(inner_input.r#key_id) + .set_mac_algorithm(inner_input.r#mac_algorithm) + .set_mac(inner_input.r#mac) + .set_grant_tokens(inner_input.r#grant_tokens) + .set_dry_run(inner_input.r#dry_run) + .send() + .await + }) + }); + crate::standard_library_conversions::result_to_dafny( + &native_result, + crate::deps::com_amazonaws_kms::conversions::verify_mac::_verify_mac_response::to_dafny, + crate::deps::com_amazonaws_kms::conversions::verify_mac::to_dafny_error, + ) + } } -} diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions.rs index 5896aa200..e668eaf3c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions.rs @@ -3,184 +3,184 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod algorithm_spec; - pub mod alias_list_entry; +pub mod alias_list_entry; - pub mod cancel_key_deletion; +pub mod cancel_key_deletion; - pub mod client; +pub mod client; - pub mod connect_custom_key_store; +pub mod connect_custom_key_store; - pub mod connection_error_code_type; +pub mod connection_error_code_type; - pub mod connection_state_type; +pub mod connection_state_type; - pub mod create_alias; +pub mod create_alias; - pub mod create_custom_key_store; +pub mod create_custom_key_store; - pub mod create_grant; +pub mod create_grant; - pub mod create_key; +pub mod create_key; - pub mod custom_key_store_type; +pub mod custom_key_store_type; - pub mod custom_key_stores_list_entry; +pub mod custom_key_stores_list_entry; - pub mod customer_master_key_spec; +pub mod customer_master_key_spec; - pub mod data_key_pair_spec; +pub mod data_key_pair_spec; - pub mod data_key_spec; +pub mod data_key_spec; - pub mod decrypt; +pub mod decrypt; - pub mod delete_alias; +pub mod delete_alias; - pub mod delete_custom_key_store; +pub mod delete_custom_key_store; - pub mod delete_imported_key_material; +pub mod delete_imported_key_material; - pub mod derive_shared_secret; +pub mod derive_shared_secret; - pub mod describe_custom_key_stores; +pub mod describe_custom_key_stores; - pub mod describe_key; +pub mod describe_key; - pub mod disable_key; +pub mod disable_key; - pub mod disable_key_rotation; +pub mod disable_key_rotation; - pub mod disconnect_custom_key_store; +pub mod disconnect_custom_key_store; - pub mod enable_key; +pub mod enable_key; - pub mod enable_key_rotation; +pub mod enable_key_rotation; - pub mod encrypt; +pub mod encrypt; - pub mod encryption_algorithm_spec; +pub mod encryption_algorithm_spec; - pub mod error; +pub mod error; - pub mod expiration_model_type; +pub mod expiration_model_type; - pub mod generate_data_key; +pub mod generate_data_key; - pub mod generate_data_key_pair; +pub mod generate_data_key_pair; - pub mod generate_data_key_pair_without_plaintext; +pub mod generate_data_key_pair_without_plaintext; - pub mod generate_data_key_without_plaintext; +pub mod generate_data_key_without_plaintext; - pub mod generate_mac; +pub mod generate_mac; - pub mod generate_random; +pub mod generate_random; - pub mod get_key_policy; +pub mod get_key_policy; - pub mod get_key_rotation_status; +pub mod get_key_rotation_status; - pub mod get_parameters_for_import; +pub mod get_parameters_for_import; - pub mod get_public_key; +pub mod get_public_key; - pub mod grant_constraints; +pub mod grant_constraints; - pub mod grant_list_entry; +pub mod grant_list_entry; - pub mod grant_operation; +pub mod grant_operation; - pub mod import_key_material; +pub mod import_key_material; - pub mod key_agreement_algorithm_spec; +pub mod key_agreement_algorithm_spec; - pub mod key_encryption_mechanism; +pub mod key_encryption_mechanism; - pub mod key_list_entry; +pub mod key_list_entry; - pub mod key_manager_type; +pub mod key_manager_type; - pub mod key_metadata; +pub mod key_metadata; - pub mod key_spec; +pub mod key_spec; - pub mod key_state; +pub mod key_state; - pub mod key_usage_type; +pub mod key_usage_type; - pub mod list_aliases; +pub mod list_aliases; - pub mod list_grants; +pub mod list_grants; - pub mod list_key_policies; +pub mod list_key_policies; - pub mod list_key_rotations; +pub mod list_key_rotations; - pub mod list_keys; +pub mod list_keys; - pub mod list_resource_tags; +pub mod list_resource_tags; - pub mod mac_algorithm_spec; +pub mod mac_algorithm_spec; - pub mod message_type; +pub mod message_type; - pub mod multi_region_configuration; +pub mod multi_region_configuration; - pub mod multi_region_key; +pub mod multi_region_key; - pub mod multi_region_key_type; +pub mod multi_region_key_type; - pub mod origin_type; +pub mod origin_type; - pub mod put_key_policy; +pub mod put_key_policy; - pub mod re_encrypt; +pub mod re_encrypt; - pub mod recipient_info; +pub mod recipient_info; - pub mod replicate_key; +pub mod replicate_key; - pub mod retire_grant; +pub mod retire_grant; - pub mod revoke_grant; +pub mod revoke_grant; - pub mod rotate_key_on_demand; +pub mod rotate_key_on_demand; - pub mod rotation_type; +pub mod rotation_type; - pub mod rotations_list_entry; +pub mod rotations_list_entry; - pub mod schedule_key_deletion; +pub mod schedule_key_deletion; - pub mod sign; +pub mod sign; - pub mod signing_algorithm_spec; +pub mod signing_algorithm_spec; - pub mod tag; +pub mod tag; - pub mod tag_resource; +pub mod tag_resource; - pub mod untag_resource; +pub mod untag_resource; - pub mod update_alias; +pub mod update_alias; - pub mod update_custom_key_store; +pub mod update_custom_key_store; - pub mod update_key_description; +pub mod update_key_description; - pub mod update_primary_region; +pub mod update_primary_region; - pub mod verify; +pub mod verify; - pub mod verify_mac; +pub mod verify_mac; - pub mod wrapping_key_spec; +pub mod wrapping_key_spec; - pub mod xks_key_configuration_type; +pub mod xks_key_configuration_type; - pub mod xks_proxy_authentication_credential_type; +pub mod xks_proxy_authentication_credential_type; - pub mod xks_proxy_configuration_type; +pub mod xks_proxy_configuration_type; - pub mod xks_proxy_connectivity_type; +pub mod xks_proxy_connectivity_type; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/algorithm_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/algorithm_spec.rs index df6f811c7..3f6ec13d6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/algorithm_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/algorithm_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::AlgorithmSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AlgorithmSpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::AlgorithmSpec::RsaesPkcs1V15 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AlgorithmSpec::RSAES_PKCS1_V1_5 {}, aws_sdk_kms::types::AlgorithmSpec::RsaesOaepSha1 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AlgorithmSpec::RSAES_OAEP_SHA_1 {}, aws_sdk_kms::types::AlgorithmSpec::RsaesOaepSha256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AlgorithmSpec::RSAES_OAEP_SHA_256 {}, @@ -16,7 +18,7 @@ aws_sdk_kms::types::AlgorithmSpec::Sm2Pke => crate::r#software::amazon::cryptogr _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AlgorithmSpec, ) -> aws_sdk_kms::types::AlgorithmSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/alias_list_entry.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/alias_list_entry.rs index 9fdd3c218..ba6645b71 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/alias_list_entry.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/alias_list_entry.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::AliasListEntry, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AliasListEntry, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AliasListEntry::AliasListEntry { AliasName: crate::standard_library_conversions::ostring_to_dafny(&value.alias_name), AliasArn: crate::standard_library_conversions::ostring_to_dafny(&value.alias_arn), @@ -14,18 +16,28 @@ pub fn to_dafny( LastUpdatedDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.last_updated_date), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::AliasListEntry, >, ) -> aws_sdk_kms::types::AliasListEntry { aws_sdk_kms::types::AliasListEntry::builder() - .set_alias_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.AliasName().clone())) - .set_alias_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.AliasArn().clone())) - .set_target_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.TargetKeyId().clone())) - .set_creation_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.CreationDate().clone())) - .set_last_updated_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.LastUpdatedDate().clone())) - .build() - + .set_alias_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.AliasName().clone(), + )) + .set_alias_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.AliasArn().clone(), + )) + .set_target_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.TargetKeyId().clone(), + )) + .set_creation_date(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.CreationDate().clone(), + )) + .set_last_updated_date(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.LastUpdatedDate().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion.rs index 9edcbd515..e7c523247 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionError::DependencyTimeoutException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _cancel_key_deletion_request; +pub mod _cancel_key_deletion_request; - pub mod _cancel_key_deletion_response; +pub mod _cancel_key_deletion_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_request.rs index 4ed628ada..be85a7cc6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionRequest::CancelKeyDeletionRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionRequest::CancelKeyDeletionRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionRequest, - > + >, ) -> aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionInput { aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_response.rs index 31de448b4..c80ca816f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/cancel_key_deletion/_cancel_key_deletion_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionResponse::CancelKeyDeletionResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionResponse::CancelKeyDeletionResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CancelKeyDeletionResponse, - > + >, ) -> aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionOutput { aws_sdk_kms::operation::cancel_key_deletion::CancelKeyDeletionOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/client.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/client.rs index 01e4d6c5a..32b5ad2d6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/client.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/client.rs @@ -5,19 +5,17 @@ // SPDX-License-Identifier: Apache-2.0 // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] - use std::any::Any; pub fn to_dafny( value: &crate::deps::com_amazonaws_kms::client::Client, -) -> - ::dafny_runtime::Object -{ - let x: std::rc::Rc = std::rc::Rc::new(value.clone()); - let y = x as std::rc::Rc; - unsafe { - ::dafny_runtime::dafny_runtime_conversions::object::rc_struct_to_dafny_class(y) - } +) -> ::dafny_runtime::Object< + dyn crate::r#software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient, +> { + let x: dafny_runtime::Rc = + dafny_runtime::Rc::new(value.clone()); + let y = x as dafny_runtime::Rc; + unsafe { ::dafny_runtime::dafny_runtime_conversions::object::rc_struct_to_dafny_class(y) } } #[allow(dead_code)] @@ -26,13 +24,19 @@ pub fn from_dafny( dyn crate::r#software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient >, ) -> crate::deps::com_amazonaws_kms::client::Client { - let as_boxed_any = dafny_runtime::cast_any_object!(dafny_value); - if (dafny_runtime::is_object!(as_boxed_any, crate::deps::com_amazonaws_kms::client::Client)) { - let as_boxed_client = ::dafny_runtime::object::downcast::(as_boxed_any); - unsafe { - ::dafny_runtime::dafny_runtime_conversions::object::dafny_class_to_rc_struct(as_boxed_client).as_ref().clone() + let as_boxed_any = dafny_runtime::cast_any_object!(dafny_value); + if (dafny_runtime::is_object!(as_boxed_any, crate::deps::com_amazonaws_kms::client::Client)) { + let as_boxed_client = ::dafny_runtime::object::downcast::< + crate::deps::com_amazonaws_kms::client::Client, + >(as_boxed_any); + unsafe { + ::dafny_runtime::dafny_runtime_conversions::object::dafny_class_to_rc_struct( + as_boxed_client, + ) + .as_ref() + .clone() + } + } else { + panic!("Unexpected implementation of Dafny client interface"); } - } else { - panic!("Unexpected implementation of Dafny client interface"); - } } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store.rs index 0e87350da..dad895f12 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreError::CloudHsmClusterInvalidConfigurationException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _connect_custom_key_store_request; +pub mod _connect_custom_key_store_request; - pub mod _connect_custom_key_store_response; +pub mod _connect_custom_key_store_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_request.rs index 4bd333c06..1053d7488 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreRequest, - > + >, ) -> aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreInput { aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreInput::builder() - .set_custom_key_store_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.CustomKeyStoreId()) )) - .build() - .unwrap() + .set_custom_key_store_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.CustomKeyStoreId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_response.rs index 83df3ebd2..889659fbb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connect_custom_key_store/_connect_custom_key_store_response.rs @@ -4,22 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectCustomKeyStoreResponse, - > + >, ) -> aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreOutput { - aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreOutput::builder() - - .build() - - + aws_sdk_kms::operation::connect_custom_key_store::ConnectCustomKeyStoreOutput::builder().build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_error_code_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_error_code_type.rs index 7b4ff2fb4..9a6ef94ee 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_error_code_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_error_code_type.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_kms::types::ConnectionErrorCodeType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::ConnectionErrorCodeType::InvalidCredentials => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionErrorCodeType::INVALID_CREDENTIALS {}, aws_sdk_kms::types::ConnectionErrorCodeType::ClusterNotFound => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionErrorCodeType::CLUSTER_NOT_FOUND {}, aws_sdk_kms::types::ConnectionErrorCodeType::NetworkErrors => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionErrorCodeType::NETWORK_ERRORS {}, @@ -28,7 +28,7 @@ aws_sdk_kms::types::ConnectionErrorCodeType::XksProxyInvalidTlsConfiguration => _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionErrorCodeType, ) -> aws_sdk_kms::types::ConnectionErrorCodeType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_state_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_state_type.rs index b640f8aa0..7ab9dd096 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_state_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/connection_state_type.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_kms::types::ConnectionStateType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::ConnectionStateType::Connected => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionStateType::CONNECTED {}, aws_sdk_kms::types::ConnectionStateType::Connecting => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionStateType::CONNECTING {}, aws_sdk_kms::types::ConnectionStateType::Failed => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionStateType::FAILED {}, @@ -15,7 +15,7 @@ aws_sdk_kms::types::ConnectionStateType::Disconnecting => crate::r#software::ama _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ConnectionStateType, ) -> aws_sdk_kms::types::ConnectionStateType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias.rs index 01383a4a0..182707176 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::create_alias::CreateAliasError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::create_alias::CreateAliasError::AlreadyExistsException(e) => @@ -36,4 +38,4 @@ pub fn to_dafny_error( } } - pub mod _create_alias_request; +pub mod _create_alias_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias/_create_alias_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias/_create_alias_request.rs index 69caabd71..e9ea3edc9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias/_create_alias_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_alias/_create_alias_request.rs @@ -4,23 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_alias::CreateAliasInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateAliasRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateAliasRequest::CreateAliasRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateAliasRequest::CreateAliasRequest { AliasName: crate::standard_library_conversions::ostring_to_dafny(&value.alias_name) .Extract(), TargetKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.target_key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateAliasRequest, - > + >, ) -> aws_sdk_kms::operation::create_alias::CreateAliasInput { aws_sdk_kms::operation::create_alias::CreateAliasInput::builder() - .set_alias_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AliasName()) )) - .set_target_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TargetKeyId()) )) - .build() - .unwrap() + .set_alias_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AliasName(), + ), + )) + .set_target_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TargetKeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store.rs index 11658fb33..2a9ae8f33 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreError::CloudHsmClusterInUseException(e) => @@ -56,6 +58,6 @@ pub fn to_dafny_error( } } - pub mod _create_custom_key_store_request; +pub mod _create_custom_key_store_request; - pub mod _create_custom_key_store_response; +pub mod _create_custom_key_store_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_request.rs index c8c7c7e31..632d48866 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_request.rs @@ -4,15 +4,15 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest { CustomKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_name) .Extract(), CloudHsmClusterId: crate::standard_library_conversions::ostring_to_dafny(&value.cloud_hsm_cluster_id), TrustAnchorCertificate: crate::standard_library_conversions::ostring_to_dafny(&value.trust_anchor_certificate), KeyStorePassword: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_password), - CustomKeyStoreType: ::std::rc::Rc::new(match &value.custom_key_store_type { + CustomKeyStoreType: ::dafny_runtime::Rc::new(match &value.custom_key_store_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::custom_key_store_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -20,23 +20,23 @@ pub fn to_dafny( XksProxyUriEndpoint: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_uri_endpoint), XksProxyUriPath: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_uri_path), XksProxyVpcEndpointServiceName: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_vpc_endpoint_service_name), - XksProxyAuthenticationCredential: ::std::rc::Rc::new(match &value.xks_proxy_authentication_credential { + XksProxyAuthenticationCredential: ::dafny_runtime::Rc::new(match &value.xks_proxy_authentication_credential { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_authentication_credential_type::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - XksProxyConnectivity: ::std::rc::Rc::new(match &value.xks_proxy_connectivity { + XksProxyConnectivity: ::dafny_runtime::Rc::new(match &value.xks_proxy_connectivity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_connectivity_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreRequest, - > + >, ) -> aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreInput { aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreInput::builder() .set_custom_key_store_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.CustomKeyStoreName()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_response.rs index 947049ab3..f2864c562 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_custom_key_store/_create_custom_key_store_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateCustomKeyStoreResponse, - > + >, ) -> aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreOutput { aws_sdk_kms::operation::create_custom_key_store::CreateCustomKeyStoreOutput::builder() - .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.CustomKeyStoreId().clone())) - .build() - - + .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.CustomKeyStoreId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant.rs index ef1feffc0..1525a6c6f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::create_grant::CreateGrantError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::create_grant::CreateGrantError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _create_grant_request; +pub mod _create_grant_request; - pub mod _create_grant_response; +pub mod _create_grant_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_request.rs index 044df902d..5c8df5610 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_grant::CreateGrantInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantRequest::CreateGrantRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantRequest::CreateGrantRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), GranteePrincipal: crate::standard_library_conversions::ostring_to_dafny(&value.grantee_principal) .Extract(), RetiringPrincipal: crate::standard_library_conversions::ostring_to_dafny(&value.retiring_principal), @@ -15,12 +15,12 @@ pub fn to_dafny( |e| crate::deps::com_amazonaws_kms::conversions::grant_operation::to_dafny(e.clone()), ) , - Constraints: ::std::rc::Rc::new(match &value.constraints { + Constraints: ::dafny_runtime::Rc::new(match &value.constraints { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::grant_constraints::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,18 +33,18 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantRequest, - > + >, ) -> aws_sdk_kms::operation::create_grant::CreateGrantInput { aws_sdk_kms::operation::create_grant::CreateGrantInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) .set_grantee_principal(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GranteePrincipal()) )) .set_retiring_principal(crate::standard_library_conversions::ostring_from_dafny(dafny_value.RetiringPrincipal().clone())) .set_operations(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Operations(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::grant_operation::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::grant_operation::from_dafny(e), ) )) .set_constraints(match (*dafny_value.Constraints()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_response.rs index 9f288b05f..55742739d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_grant/_create_grant_response.rs @@ -4,24 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_grant::CreateGrantOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantResponse::CreateGrantResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantResponse::CreateGrantResponse { GrantToken: crate::standard_library_conversions::ostring_to_dafny(&value.grant_token), GrantId: crate::standard_library_conversions::ostring_to_dafny(&value.grant_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateGrantResponse, - > + >, ) -> aws_sdk_kms::operation::create_grant::CreateGrantOutput { aws_sdk_kms::operation::create_grant::CreateGrantOutput::builder() - .set_grant_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GrantToken().clone())) - .set_grant_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GrantId().clone())) - .build() - - + .set_grant_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GrantToken().clone(), + )) + .set_grant_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GrantId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key.rs index d1b6476dd..a911ccd03 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::create_key::CreateKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::create_key::CreateKeyError::CloudHsmClusterInvalidConfigurationException(e) => @@ -48,6 +50,6 @@ pub fn to_dafny_error( } } - pub mod _create_key_request; +pub mod _create_key_request; - pub mod _create_key_response; +pub mod _create_key_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_request.rs index 250c90e84..1bfa52c14 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_request.rs @@ -4,35 +4,35 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::create_key::CreateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyRequest::CreateKeyRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyRequest::CreateKeyRequest { Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy), Description: crate::standard_library_conversions::ostring_to_dafny(&value.description), - KeyUsage: ::std::rc::Rc::new(match &value.key_usage { + KeyUsage: ::dafny_runtime::Rc::new(match &value.key_usage { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_usage_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - CustomerMasterKeySpec: ::std::rc::Rc::new(match &value.customer_master_key_spec { + CustomerMasterKeySpec: ::dafny_runtime::Rc::new(match &value.customer_master_key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::customer_master_key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeySpec: ::std::rc::Rc::new(match &value.key_spec { + KeySpec: ::dafny_runtime::Rc::new(match &value.key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Origin: ::std::rc::Rc::new(match &value.origin { + Origin: ::dafny_runtime::Rc::new(match &value.origin { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::origin_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), BypassPolicyLockoutSafetyCheck: crate::standard_library_conversions::obool_to_dafny(&value.bypass_policy_lockout_safety_check), - Tags: ::std::rc::Rc::new(match &value.tags { + Tags: ::dafny_runtime::Rc::new(match &value.tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::tag::to_dafny(e) @@ -46,11 +46,11 @@ pub fn to_dafny( XksKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.xks_key_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyRequest, - > + >, ) -> aws_sdk_kms::operation::create_key::CreateKeyInput { aws_sdk_kms::operation::create_key::CreateKeyInput::builder() .set_policy(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Policy().clone())) @@ -89,7 +89,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_response.rs index 7c03614f6..fb2385c9c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/create_key/_create_key_response.rs @@ -3,32 +3,32 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::create_key::CreateKeyOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::create_key::CreateKeyOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyResponse::CreateKeyResponse { - KeyMetadata: ::std::rc::Rc::new(match &value.key_metadata { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyResponse::CreateKeyResponse { + KeyMetadata: ::dafny_runtime::Rc::new(match &value.key_metadata { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_metadata::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CreateKeyResponse, - > + >, ) -> aws_sdk_kms::operation::create_key::CreateKeyOutput { aws_sdk_kms::operation::create_key::CreateKeyOutput::builder() - .set_key_metadata(match (*dafny_value.KeyMetadata()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_kms::conversions::key_metadata::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_key_metadata(match (*dafny_value.KeyMetadata()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::key_metadata::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_store_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_store_type.rs index 3d5196b56..9c4fe45c8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_store_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_store_type.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_kms::types::CustomKeyStoreType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::CustomKeyStoreType::AwsCloudhsm => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomKeyStoreType::AWS_CLOUDHSM {}, aws_sdk_kms::types::CustomKeyStoreType::ExternalKeyStore => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomKeyStoreType::EXTERNAL_KEY_STORE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomKeyStoreType, ) -> aws_sdk_kms::types::CustomKeyStoreType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_stores_list_entry.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_stores_list_entry.rs index 120c98f55..0bd8dc553 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_stores_list_entry.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/custom_key_stores_list_entry.rs @@ -4,39 +4,40 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::CustomKeyStoresListEntry, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomKeyStoresListEntry::CustomKeyStoresListEntry { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), CustomKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_name), CloudHsmClusterId: crate::standard_library_conversions::ostring_to_dafny(&value.cloud_hsm_cluster_id), TrustAnchorCertificate: crate::standard_library_conversions::ostring_to_dafny(&value.trust_anchor_certificate), - ConnectionState: ::std::rc::Rc::new(match &value.connection_state { + ConnectionState: ::dafny_runtime::Rc::new(match &value.connection_state { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::connection_state_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ConnectionErrorCode: ::std::rc::Rc::new(match &value.connection_error_code { + ConnectionErrorCode: ::dafny_runtime::Rc::new(match &value.connection_error_code { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::connection_error_code_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , CreationDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.creation_date), - CustomKeyStoreType: ::std::rc::Rc::new(match &value.custom_key_store_type { + CustomKeyStoreType: ::dafny_runtime::Rc::new(match &value.custom_key_store_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::custom_key_store_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - XksProxyConfiguration: ::std::rc::Rc::new(match &value.xks_proxy_configuration { + XksProxyConfiguration: ::dafny_runtime::Rc::new(match &value.xks_proxy_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_configuration_type::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomKeyStoresListEntry, >, ) -> aws_sdk_kms::types::CustomKeyStoresListEntry { @@ -74,5 +75,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/customer_master_key_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/customer_master_key_spec.rs index d00e07390..728eff162 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/customer_master_key_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/customer_master_key_spec.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_kms::types::CustomerMasterKeySpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::CustomerMasterKeySpec::Rsa2048 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomerMasterKeySpec::RSA_2048 {}, aws_sdk_kms::types::CustomerMasterKeySpec::Rsa3072 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomerMasterKeySpec::RSA_3072 {}, aws_sdk_kms::types::CustomerMasterKeySpec::Rsa4096 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomerMasterKeySpec::RSA_4096 {}, @@ -23,7 +23,7 @@ aws_sdk_kms::types::CustomerMasterKeySpec::Sm2 => crate::r#software::amazon::cry _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::CustomerMasterKeySpec, ) -> aws_sdk_kms::types::CustomerMasterKeySpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_pair_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_pair_spec.rs index cd2726064..0aefb86f6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_pair_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_pair_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::DataKeyPairSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeyPairSpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::DataKeyPairSpec::Rsa2048 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeyPairSpec::RSA_2048 {}, aws_sdk_kms::types::DataKeyPairSpec::Rsa3072 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeyPairSpec::RSA_3072 {}, aws_sdk_kms::types::DataKeyPairSpec::Rsa4096 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeyPairSpec::RSA_4096 {}, @@ -18,7 +20,7 @@ aws_sdk_kms::types::DataKeyPairSpec::Sm2 => crate::r#software::amazon::cryptogra _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeyPairSpec, ) -> aws_sdk_kms::types::DataKeyPairSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_spec.rs index f26b83c13..aba0fb4d9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/data_key_spec.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_kms::types::DataKeySpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeySpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::DataKeySpec::Aes256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeySpec::AES_256 {}, aws_sdk_kms::types::DataKeySpec::Aes128 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeySpec::AES_128 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DataKeySpec, ) -> aws_sdk_kms::types::DataKeySpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt.rs index a295de458..2007bda72 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::decrypt::DecryptError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::decrypt::DecryptError::DependencyTimeoutException(e) => @@ -44,6 +46,6 @@ pub fn to_dafny_error( } } - pub mod _decrypt_request; +pub mod _decrypt_request; - pub mod _decrypt_response; +pub mod _decrypt_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_request.rs index fc1d3d213..725a7cfb2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_request.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::decrypt::DecryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptRequest::DecryptRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptRequest::DecryptRequest { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob).Extract(), EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,7 +20,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -30,12 +30,12 @@ pub fn to_dafny( }) , KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), - EncryptionAlgorithm: ::std::rc::Rc::new(match &value.encryption_algorithm { + EncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - Recipient: ::std::rc::Rc::new(match &value.recipient { + Recipient: ::dafny_runtime::Rc::new(match &value.recipient { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::recipient_info::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -43,11 +43,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptRequest, - > + >, ) -> aws_sdk_kms::operation::decrypt::DecryptInput { aws_sdk_kms::operation::decrypt::DecryptInput::builder() .set_ciphertext_blob(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.CiphertextBlob().clone()))) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_response.rs index 81f4f92eb..30558772a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/decrypt/_decrypt_response.rs @@ -3,14 +3,14 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::decrypt::DecryptOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::decrypt::DecryptOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptResponse::DecryptResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptResponse::DecryptResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), Plaintext: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext), - EncryptionAlgorithm: ::std::rc::Rc::new(match &value.encryption_algorithm { + EncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -18,24 +18,29 @@ pub fn to_dafny( CiphertextForRecipient: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_for_recipient), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DecryptResponse, - > + >, ) -> aws_sdk_kms::operation::decrypt::DecryptOutput { aws_sdk_kms::operation::decrypt::DecryptOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_plaintext(crate::standard_library_conversions::oblob_from_dafny(dafny_value.Plaintext().clone())) - .set_encryption_algorithm(match &**dafny_value.EncryptionAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextForRecipient().clone())) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_plaintext(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.Plaintext().clone(), + )) + .set_encryption_algorithm(match &**dafny_value.EncryptionAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny( + value, + ), + ), + _ => None, + }) + .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextForRecipient().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias.rs index f2b71aa78..0e1f62812 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::delete_alias::DeleteAliasError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::delete_alias::DeleteAliasError::DependencyTimeoutException(e) => @@ -30,4 +32,4 @@ pub fn to_dafny_error( } } - pub mod _delete_alias_request; +pub mod _delete_alias_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias/_delete_alias_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias/_delete_alias_request.rs index 6e98e0dad..f8e63c1ae 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias/_delete_alias_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_alias/_delete_alias_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::delete_alias::DeleteAliasInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteAliasRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteAliasRequest::DeleteAliasRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteAliasRequest::DeleteAliasRequest { AliasName: crate::standard_library_conversions::ostring_to_dafny(&value.alias_name) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteAliasRequest, - > + >, ) -> aws_sdk_kms::operation::delete_alias::DeleteAliasInput { aws_sdk_kms::operation::delete_alias::DeleteAliasInput::builder() - .set_alias_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AliasName()) )) - .build() - .unwrap() + .set_alias_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AliasName(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store.rs index 5f51f2a04..9efe38ea1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreError::CustomKeyStoreHasCmKsException(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _delete_custom_key_store_request; +pub mod _delete_custom_key_store_request; - pub mod _delete_custom_key_store_response; +pub mod _delete_custom_key_store_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_request.rs index fa0969464..d5b38c4a0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreRequest, - > + >, ) -> aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreInput { aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreInput::builder() - .set_custom_key_store_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.CustomKeyStoreId()) )) - .build() - .unwrap() + .set_custom_key_store_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.CustomKeyStoreId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_response.rs index 304d46ab3..e41b88c6d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_custom_key_store/_delete_custom_key_store_response.rs @@ -4,22 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteCustomKeyStoreResponse, - > + >, ) -> aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreOutput { - aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreOutput::builder() - - .build() - - + aws_sdk_kms::operation::delete_custom_key_store::DeleteCustomKeyStoreOutput::builder().build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material.rs index 37241b0e3..362a7e126 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::delete_imported_key_material::DeleteImportedKeyMaterialError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::delete_imported_key_material::DeleteImportedKeyMaterialError::DependencyTimeoutException(e) => @@ -34,4 +36,4 @@ pub fn to_dafny_error( } } - pub mod _delete_imported_key_material_request; +pub mod _delete_imported_key_material_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material/_delete_imported_key_material_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material/_delete_imported_key_material_request.rs index 30fe636ca..c9016e87b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material/_delete_imported_key_material_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/delete_imported_key_material/_delete_imported_key_material_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::delete_imported_key_material::DeleteImportedKeyMaterialInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteImportedKeyMaterialRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeleteImportedKeyMaterialRequest, - > + >, ) -> aws_sdk_kms::operation::delete_imported_key_material::DeleteImportedKeyMaterialInput { aws_sdk_kms::operation::delete_imported_key_material::DeleteImportedKeyMaterialInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret.rs index ad4386c24..b4c87ca43 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _derive_shared_secret_request; +pub mod _derive_shared_secret_request; - pub mod _derive_shared_secret_response; +pub mod _derive_shared_secret_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_request.rs index a5ac3ad0f..6c8430900 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_request.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretRequest::DeriveSharedSecretRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretRequest::DeriveSharedSecretRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), KeyAgreementAlgorithm: crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::to_dafny(value.key_agreement_algorithm.clone().unwrap()), PublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key).Extract(), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -21,18 +21,18 @@ pub fn to_dafny( }) , DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), - Recipient: ::std::rc::Rc::new(match &value.recipient { + Recipient: ::dafny_runtime::Rc::new(match &value.recipient { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::recipient_info::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretRequest, - > + >, ) -> aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretInput { aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_response.rs index fefe2c8a6..32e8585f8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/derive_shared_secret/_derive_shared_secret_response.rs @@ -4,30 +4,30 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretResponse::DeriveSharedSecretResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretResponse::DeriveSharedSecretResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), SharedSecret: crate::standard_library_conversions::oblob_to_dafny(&value.shared_secret), CiphertextForRecipient: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_for_recipient), - KeyAgreementAlgorithm: ::std::rc::Rc::new(match &value.key_agreement_algorithm { + KeyAgreementAlgorithm: ::dafny_runtime::Rc::new(match &value.key_agreement_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeyOrigin: ::std::rc::Rc::new(match &value.key_origin { + KeyOrigin: ::dafny_runtime::Rc::new(match &value.key_origin { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::origin_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DeriveSharedSecretResponse, - > + >, ) -> aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretOutput { aws_sdk_kms::operation::derive_shared_secret::DeriveSharedSecretOutput::builder() .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) @@ -48,6 +48,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores.rs index 8fd4a74f4..c31261849 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresError::CustomKeyStoreNotFoundException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _describe_custom_key_stores_request; +pub mod _describe_custom_key_stores_request; - pub mod _describe_custom_key_stores_response; +pub mod _describe_custom_key_stores_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_request.rs index 2887b3f31..112fd9921 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_request.rs @@ -4,27 +4,35 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), CustomKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_name), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresRequest, - > + >, ) -> aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresInput { aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresInput::builder() - .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.CustomKeyStoreId().clone())) - .set_custom_key_store_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.CustomKeyStoreName().clone())) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.CustomKeyStoreId().clone(), + )) + .set_custom_key_store_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.CustomKeyStoreName().clone(), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_response.rs index c57246fe7..4059c397a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_custom_key_stores/_describe_custom_key_stores_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse { - CustomKeyStores: ::std::rc::Rc::new(match &value.custom_key_stores { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse { + CustomKeyStores: ::dafny_runtime::Rc::new(match &value.custom_key_stores { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::custom_key_stores_list_entry::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeCustomKeyStoresResponse, - > + >, ) -> aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresOutput { aws_sdk_kms::operation::describe_custom_key_stores::DescribeCustomKeyStoresOutput::builder() .set_custom_key_stores(match (*dafny_value.CustomKeyStores()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::custom_key_stores_list_entry::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::custom_key_stores_list_entry::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key.rs index 394ffa83a..72f28c0ff 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::describe_key::DescribeKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::describe_key::DescribeKeyError::DependencyTimeoutException(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _describe_key_request; +pub mod _describe_key_request; - pub mod _describe_key_response; +pub mod _describe_key_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_request.rs index 2a2a67234..f0526e611 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_request.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::describe_key::DescribeKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyRequest::DescribeKeyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyRequest::DescribeKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -20,11 +20,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyRequest, - > + >, ) -> aws_sdk_kms::operation::describe_key::DescribeKeyInput { aws_sdk_kms::operation::describe_key::DescribeKeyInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_response.rs index 6d15c7ce0..2fd01ce16 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/describe_key/_describe_key_response.rs @@ -4,31 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::describe_key::DescribeKeyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyResponse::DescribeKeyResponse { - KeyMetadata: ::std::rc::Rc::new(match &value.key_metadata { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyResponse::DescribeKeyResponse { + KeyMetadata: ::dafny_runtime::Rc::new(match &value.key_metadata { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_metadata::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DescribeKeyResponse, - > + >, ) -> aws_sdk_kms::operation::describe_key::DescribeKeyOutput { aws_sdk_kms::operation::describe_key::DescribeKeyOutput::builder() - .set_key_metadata(match (*dafny_value.KeyMetadata()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_kms::conversions::key_metadata::from_dafny(value.clone())), - _ => None, -} -) - .build() - - + .set_key_metadata(match (*dafny_value.KeyMetadata()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::key_metadata::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key.rs index aed6d1341..97910f863 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::disable_key::DisableKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::disable_key::DisableKeyError::DependencyTimeoutException(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _disable_key_request; +pub mod _disable_key_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key/_disable_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key/_disable_key_request.rs index 4bdb30c6d..995db5eac 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key/_disable_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key/_disable_key_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::disable_key::DisableKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRequest::DisableKeyRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRequest::DisableKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRequest, - > + >, ) -> aws_sdk_kms::operation::disable_key::DisableKeyInput { aws_sdk_kms::operation::disable_key::DisableKeyInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation.rs index bd188a1a0..016a3a831 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::disable_key_rotation::DisableKeyRotationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::disable_key_rotation::DisableKeyRotationError::DependencyTimeoutException(e) => @@ -36,4 +38,4 @@ pub fn to_dafny_error( } } - pub mod _disable_key_rotation_request; +pub mod _disable_key_rotation_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation/_disable_key_rotation_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation/_disable_key_rotation_request.rs index c1f650a91..260b32b28 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation/_disable_key_rotation_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disable_key_rotation/_disable_key_rotation_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::disable_key_rotation::DisableKeyRotationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRotationRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRotationRequest::DisableKeyRotationRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRotationRequest::DisableKeyRotationRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisableKeyRotationRequest, - > + >, ) -> aws_sdk_kms::operation::disable_key_rotation::DisableKeyRotationInput { aws_sdk_kms::operation::disable_key_rotation::DisableKeyRotationInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store.rs index b94fd563e..e9863b347 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreError::CustomKeyStoreInvalidStateException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _disconnect_custom_key_store_request; +pub mod _disconnect_custom_key_store_request; - pub mod _disconnect_custom_key_store_response; +pub mod _disconnect_custom_key_store_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_request.rs index 61cf1da42..ba8109622 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreRequest, - > + >, ) -> aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreInput { aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreInput::builder() - .set_custom_key_store_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.CustomKeyStoreId()) )) - .build() - .unwrap() + .set_custom_key_store_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.CustomKeyStoreId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_response.rs index 4db22e22b..6a9898947 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/disconnect_custom_key_store/_disconnect_custom_key_store_response.rs @@ -4,22 +4,19 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::DisconnectCustomKeyStoreResponse, - > + >, ) -> aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreOutput { aws_sdk_kms::operation::disconnect_custom_key_store::DisconnectCustomKeyStoreOutput::builder() - - .build() - - + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key.rs index d01651ac1..9541b1c6e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::enable_key::EnableKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::enable_key::EnableKeyError::DependencyTimeoutException(e) => @@ -34,4 +36,4 @@ pub fn to_dafny_error( } } - pub mod _enable_key_request; +pub mod _enable_key_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key/_enable_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key/_enable_key_request.rs index ddb49eaa4..c24c0fb2c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key/_enable_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key/_enable_key_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::enable_key::EnableKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRequest::EnableKeyRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRequest::EnableKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRequest, - > + >, ) -> aws_sdk_kms::operation::enable_key::EnableKeyInput { aws_sdk_kms::operation::enable_key::EnableKeyInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation.rs index 7a94b52ba..adf8431db 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::enable_key_rotation::EnableKeyRotationError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::enable_key_rotation::EnableKeyRotationError::DependencyTimeoutException(e) => @@ -36,4 +38,4 @@ pub fn to_dafny_error( } } - pub mod _enable_key_rotation_request; +pub mod _enable_key_rotation_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation/_enable_key_rotation_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation/_enable_key_rotation_request.rs index 3ee6106b8..192698a6b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation/_enable_key_rotation_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/enable_key_rotation/_enable_key_rotation_request.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::enable_key_rotation::EnableKeyRotationInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRotationRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRotationRequest::EnableKeyRotationRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRotationRequest::EnableKeyRotationRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), RotationPeriodInDays: crate::standard_library_conversions::oint_to_dafny(value.rotation_period_in_days), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EnableKeyRotationRequest, - > + >, ) -> aws_sdk_kms::operation::enable_key_rotation::EnableKeyRotationInput { aws_sdk_kms::operation::enable_key_rotation::EnableKeyRotationInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_rotation_period_in_days(crate::standard_library_conversions::oint_from_dafny(dafny_value.RotationPeriodInDays().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_rotation_period_in_days(crate::standard_library_conversions::oint_from_dafny( + dafny_value.RotationPeriodInDays().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt.rs index a199794ee..da8413741 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::encrypt::EncryptError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::encrypt::EncryptError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _encrypt_request; +pub mod _encrypt_request; - pub mod _encrypt_response; +pub mod _encrypt_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_request.rs index 8bb7ea79f..b75605063 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_request.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::encrypt::EncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptRequest::EncryptRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptRequest::EncryptRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Plaintext: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext).Extract(), EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,7 +21,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -30,7 +30,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - EncryptionAlgorithm: ::std::rc::Rc::new(match &value.encryption_algorithm { + EncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -38,11 +38,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptRequest, - > + >, ) -> aws_sdk_kms::operation::encrypt::EncryptInput { aws_sdk_kms::operation::encrypt::EncryptInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_response.rs index 88dd60282..3e386bcf6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encrypt/_encrypt_response.rs @@ -3,37 +3,40 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::encrypt::EncryptOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::encrypt::EncryptOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptResponse::EncryptResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptResponse::EncryptResponse { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), - EncryptionAlgorithm: ::std::rc::Rc::new(match &value.encryption_algorithm { + EncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptResponse, - > + >, ) -> aws_sdk_kms::operation::encrypt::EncryptOutput { aws_sdk_kms::operation::encrypt::EncryptOutput::builder() - .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextBlob().clone())) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_encryption_algorithm(match &**dafny_value.EncryptionAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .build() - - + .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextBlob().clone(), + )) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_encryption_algorithm(match &**dafny_value.EncryptionAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny( + value, + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encryption_algorithm_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encryption_algorithm_spec.rs index af802a8f4..d7dec8e22 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encryption_algorithm_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/encryption_algorithm_spec.rs @@ -5,15 +5,15 @@ pub fn to_dafny( value: aws_sdk_kms::types::EncryptionAlgorithmSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::EncryptionAlgorithmSpec::SymmetricDefault => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT {}, aws_sdk_kms::types::EncryptionAlgorithmSpec::RsaesOaepSha1 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1 {}, aws_sdk_kms::types::EncryptionAlgorithmSpec::RsaesOaepSha256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec, ) -> aws_sdk_kms::types::EncryptionAlgorithmSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error.rs index df206938d..fff40cb9f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error.rs @@ -3,109 +3,115 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. pub mod already_exists_exception; - pub mod cloud_hsm_cluster_in_use_exception; +pub mod cloud_hsm_cluster_in_use_exception; - pub mod cloud_hsm_cluster_invalid_configuration_exception; +pub mod cloud_hsm_cluster_invalid_configuration_exception; - pub mod cloud_hsm_cluster_not_active_exception; +pub mod cloud_hsm_cluster_not_active_exception; - pub mod cloud_hsm_cluster_not_found_exception; +pub mod cloud_hsm_cluster_not_found_exception; - pub mod cloud_hsm_cluster_not_related_exception; +pub mod cloud_hsm_cluster_not_related_exception; - pub mod conflict_exception; +pub mod conflict_exception; - pub mod custom_key_store_has_cmks_exception; +pub mod custom_key_store_has_cmks_exception; - pub mod custom_key_store_invalid_state_exception; +pub mod custom_key_store_invalid_state_exception; - pub mod custom_key_store_name_in_use_exception; +pub mod custom_key_store_name_in_use_exception; - pub mod custom_key_store_not_found_exception; +pub mod custom_key_store_not_found_exception; - pub mod dependency_timeout_exception; +pub mod dependency_timeout_exception; - pub mod disabled_exception; +pub mod disabled_exception; - pub mod dry_run_operation_exception; +pub mod dry_run_operation_exception; - pub mod expired_import_token_exception; +pub mod expired_import_token_exception; - pub mod incorrect_key_exception; +pub mod incorrect_key_exception; - pub mod incorrect_key_material_exception; +pub mod incorrect_key_material_exception; - pub mod incorrect_trust_anchor_exception; +pub mod incorrect_trust_anchor_exception; - pub mod invalid_alias_name_exception; +pub mod invalid_alias_name_exception; - pub mod invalid_arn_exception; +pub mod invalid_arn_exception; - pub mod invalid_ciphertext_exception; +pub mod invalid_ciphertext_exception; - pub mod invalid_grant_id_exception; +pub mod invalid_grant_id_exception; - pub mod invalid_grant_token_exception; +pub mod invalid_grant_token_exception; - pub mod invalid_import_token_exception; +pub mod invalid_import_token_exception; - pub mod invalid_key_usage_exception; +pub mod invalid_key_usage_exception; - pub mod invalid_marker_exception; +pub mod invalid_marker_exception; - pub mod key_unavailable_exception; +pub mod key_unavailable_exception; - pub mod kms_internal_exception; +pub mod kms_internal_exception; - pub mod kms_invalid_mac_exception; +pub mod kms_invalid_mac_exception; - pub mod kms_invalid_signature_exception; +pub mod kms_invalid_signature_exception; - pub mod kms_invalid_state_exception; +pub mod kms_invalid_state_exception; - pub mod limit_exceeded_exception; +pub mod limit_exceeded_exception; - pub mod malformed_policy_document_exception; +pub mod malformed_policy_document_exception; - pub mod not_found_exception; +pub mod not_found_exception; - pub mod tag_exception; +pub mod tag_exception; - pub mod unsupported_operation_exception; +pub mod unsupported_operation_exception; - pub mod xks_key_already_in_use_exception; +pub mod xks_key_already_in_use_exception; - pub mod xks_key_invalid_configuration_exception; +pub mod xks_key_invalid_configuration_exception; - pub mod xks_key_not_found_exception; +pub mod xks_key_not_found_exception; - pub mod xks_proxy_incorrect_authentication_credential_exception; +pub mod xks_proxy_incorrect_authentication_credential_exception; - pub mod xks_proxy_invalid_configuration_exception; +pub mod xks_proxy_invalid_configuration_exception; - pub mod xks_proxy_invalid_response_exception; +pub mod xks_proxy_invalid_response_exception; - pub mod xks_proxy_uri_endpoint_in_use_exception; +pub mod xks_proxy_uri_endpoint_in_use_exception; - pub mod xks_proxy_uri_in_use_exception; +pub mod xks_proxy_uri_in_use_exception; - pub mod xks_proxy_uri_unreachable_exception; +pub mod xks_proxy_uri_unreachable_exception; - pub mod xks_proxy_vpc_endpoint_service_in_use_exception; +pub mod xks_proxy_vpc_endpoint_service_in_use_exception; - pub mod xks_proxy_vpc_endpoint_service_invalid_configuration_exception; +pub mod xks_proxy_vpc_endpoint_service_invalid_configuration_exception; - pub mod xks_proxy_vpc_endpoint_service_not_found_exception; - /// Wraps up an arbitrary Rust Error value as a Dafny Error -pub fn to_opaque_error(value: String) -> - ::std::rc::Rc -{ +pub mod xks_proxy_vpc_endpoint_service_not_found_exception; +/// Wraps up an arbitrary Rust Error value as a Dafny Error +pub fn to_opaque_error( + value: String, +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { let error_msg = value.clone(); - let error_msg = ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&error_msg); - let error_obj: ::dafny_runtime::Object = ::dafny_runtime::Object(Some( - ::std::rc::Rc::new(::std::cell::UnsafeCell::new(value)), - )); - ::std::rc::Rc::new( + let error_msg = + ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string( + &error_msg, + ); + let error_obj: ::dafny_runtime::Object<::dafny_runtime::DynAny> = + ::dafny_runtime::Object(Some(::dafny_runtime::Rc::new( + ::dafny_runtime::UnsafeCell::new(value), + ))); + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::OpaqueWithText { obj: error_obj, objMessage: error_msg @@ -114,21 +120,25 @@ pub fn to_opaque_error(value: String) -> } /// Wraps up an arbitrary Rust Error value as a Dafny Result.Failure -pub fn to_opaque_error_result(value: String) -> - ::std::rc::Rc< - crate::_Wrappers_Compile::Result< - T, - ::std::rc::Rc - > - > -{ - ::std::rc::Rc::new(crate::_Wrappers_Compile::Result::Failure { +pub fn to_opaque_error_result( + value: String, +) -> ::dafny_runtime::Rc< + crate::_Wrappers_Compile::Result< + T, + ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, + >, + >, +> { + ::dafny_runtime::Rc::new(crate::_Wrappers_Compile::Result::Failure { error: to_opaque_error(value), }) } pub fn to_dafny( value: crate::deps::com_amazonaws_kms::types::error::Error, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { crate::deps::com_amazonaws_kms::types::error::Error::AlreadyExistsException { error } => crate::deps::com_amazonaws_kms::conversions::error::already_exists_exception::to_dafny(error), @@ -227,11 +237,11 @@ crate::deps::com_amazonaws_kms::types::error::Error::XksProxyVpcEndpointServiceI crate::deps::com_amazonaws_kms::types::error::Error::XksProxyVpcEndpointServiceNotFoundException { error } => crate::deps::com_amazonaws_kms::conversions::error::xks_proxy_vpc_endpoint_service_not_found_exception::to_dafny(error), crate::deps::com_amazonaws_kms::types::error::Error::Opaque { obj } => - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::Opaque { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::Opaque { obj: ::dafny_runtime::Object(obj.0) }), crate::deps::com_amazonaws_kms::types::error::Error::OpaqueWithText { obj, objMessage } => - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::OpaqueWithText { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::OpaqueWithText { obj: ::dafny_runtime::Object(obj.0), objMessage: ::dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&objMessage), }), @@ -240,7 +250,7 @@ crate::deps::com_amazonaws_kms::types::error::Error::XksProxyVpcEndpointServiceN #[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, >, ) -> crate::deps::com_amazonaws_kms::types::error::Error { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/already_exists_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/already_exists_exception.rs index 321291f5e..bd8ecef11 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/already_exists_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/already_exists_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::AlreadyExistsException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::AlreadyExistsException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_in_use_exception.rs index 94b40d900..7d16ad4ad 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CloudHsmClusterInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CloudHsmClusterInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_invalid_configuration_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_invalid_configuration_exception.rs index de5b12b77..acf1506f3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_invalid_configuration_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_invalid_configuration_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CloudHsmClusterInvalidConfigurationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CloudHsmClusterInvalidConfigurationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_active_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_active_exception.rs index c77eeb82f..b0715b2df 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_active_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_active_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CloudHsmClusterNotActiveException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CloudHsmClusterNotActiveException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_found_exception.rs index 216016e47..c82621e96 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CloudHsmClusterNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CloudHsmClusterNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_related_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_related_exception.rs index b7c15d711..3a4750ac9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_related_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/cloud_hsm_cluster_not_related_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CloudHsmClusterNotRelatedException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CloudHsmClusterNotRelatedException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/conflict_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/conflict_exception.rs index ccabd8933..53aca7b5e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/conflict_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/conflict_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::ConflictException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::ConflictException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_has_cmks_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_has_cmks_exception.rs index bac4c159e..3fddd3014 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_has_cmks_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_has_cmks_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CustomKeyStoreHasCmKsException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CustomKeyStoreHasCMKsException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_invalid_state_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_invalid_state_exception.rs index 5a115e220..666b53b57 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_invalid_state_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_invalid_state_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CustomKeyStoreInvalidStateException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CustomKeyStoreInvalidStateException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_name_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_name_in_use_exception.rs index 4b9e27bb7..57ded198f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_name_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_name_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CustomKeyStoreNameInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CustomKeyStoreNameInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_not_found_exception.rs index a0c3c24cc..f6ae49fbe 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/custom_key_store_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::CustomKeyStoreNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::CustomKeyStoreNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dependency_timeout_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dependency_timeout_exception.rs index cdf27efe1..1892ddb14 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dependency_timeout_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dependency_timeout_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::DependencyTimeoutException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::DependencyTimeoutException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/disabled_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/disabled_exception.rs index e0349cce5..8bfc8d30d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/disabled_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/disabled_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::DisabledException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::DisabledException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dry_run_operation_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dry_run_operation_exception.rs index ead5d5f28..5cc5fb3f3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dry_run_operation_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/dry_run_operation_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::DryRunOperationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::DryRunOperationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/expired_import_token_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/expired_import_token_exception.rs index e31562d2c..3ac5989cb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/expired_import_token_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/expired_import_token_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::ExpiredImportTokenException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::ExpiredImportTokenException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_exception.rs index 081c111ee..4c4e81181 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::IncorrectKeyException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::IncorrectKeyException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_material_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_material_exception.rs index b19eebab9..2059b806d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_material_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_key_material_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::IncorrectKeyMaterialException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::IncorrectKeyMaterialException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_trust_anchor_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_trust_anchor_exception.rs index 689e86c8f..5c795f1ba 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_trust_anchor_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/incorrect_trust_anchor_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::IncorrectTrustAnchorException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::IncorrectTrustAnchorException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_alias_name_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_alias_name_exception.rs index 00f3e0ab7..606879357 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_alias_name_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_alias_name_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidAliasNameException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidAliasNameException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_arn_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_arn_exception.rs index ff03c1b2b..018417ab9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_arn_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_arn_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidArnException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidArnException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_ciphertext_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_ciphertext_exception.rs index af0615254..c000c12a2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_ciphertext_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_ciphertext_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidCiphertextException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidCiphertextException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_id_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_id_exception.rs index c3b4d75bf..eaf521ecc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_id_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_id_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidGrantIdException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidGrantIdException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_token_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_token_exception.rs index 65e592592..0e6877fac 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_token_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_grant_token_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidGrantTokenException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidGrantTokenException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_import_token_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_import_token_exception.rs index a62176399..6555f45a3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_import_token_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_import_token_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidImportTokenException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidImportTokenException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_key_usage_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_key_usage_exception.rs index c992973d1..2da6cda20 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_key_usage_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_key_usage_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidKeyUsageException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidKeyUsageException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_marker_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_marker_exception.rs index 3283970aa..11364d7f4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_marker_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/invalid_marker_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::InvalidMarkerException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::InvalidMarkerException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/key_unavailable_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/key_unavailable_exception.rs index 5b9d52a4f..e0df3df5e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/key_unavailable_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/key_unavailable_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::KeyUnavailableException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::KeyUnavailableException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_internal_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_internal_exception.rs index fae7573f9..9ac82d709 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_internal_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_internal_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::KmsInternalException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::KMSInternalException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_mac_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_mac_exception.rs index 11677fe1e..0dd5a9a0d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_mac_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_mac_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::KmsInvalidMacException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::KMSInvalidMacException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_signature_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_signature_exception.rs index 2be4dbf16..9c877209b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_signature_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_signature_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::KmsInvalidSignatureException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::KMSInvalidSignatureException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_state_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_state_exception.rs index 5e63d1f6e..325da9da5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_state_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/kms_invalid_state_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::KmsInvalidStateException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::KMSInvalidStateException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/limit_exceeded_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/limit_exceeded_exception.rs index 570989ad5..7edad7aa8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/limit_exceeded_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/limit_exceeded_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::LimitExceededException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::LimitExceededException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/malformed_policy_document_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/malformed_policy_document_exception.rs index 4bcae6cf9..ffdc509bb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/malformed_policy_document_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/malformed_policy_document_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::MalformedPolicyDocumentException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::MalformedPolicyDocumentException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/not_found_exception.rs index d5cf1dfc3..072407eba 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::NotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::NotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/tag_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/tag_exception.rs index 7ca252883..48fc1ca72 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/tag_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/tag_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::TagException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::TagException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/unsupported_operation_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/unsupported_operation_exception.rs index 32ebc9435..f350f64ca 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/unsupported_operation_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/unsupported_operation_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::UnsupportedOperationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::UnsupportedOperationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_already_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_already_in_use_exception.rs index b7cf88f13..437f86a95 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_already_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_already_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksKeyAlreadyInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksKeyAlreadyInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_invalid_configuration_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_invalid_configuration_exception.rs index 53626b251..00a063f7e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_invalid_configuration_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_invalid_configuration_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksKeyInvalidConfigurationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksKeyInvalidConfigurationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_not_found_exception.rs index bdccc18ff..a920e8166 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_key_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksKeyNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksKeyNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_incorrect_authentication_credential_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_incorrect_authentication_credential_exception.rs index dc7f8612b..e03dc7f67 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_incorrect_authentication_credential_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_incorrect_authentication_credential_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyIncorrectAuthenticationCredentialException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyIncorrectAuthenticationCredentialException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_configuration_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_configuration_exception.rs index ae78cdda6..ac434219c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_configuration_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_configuration_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyInvalidConfigurationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyInvalidConfigurationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_response_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_response_exception.rs index 952fa4a69..95722cde2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_response_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_invalid_response_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyInvalidResponseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyInvalidResponseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_endpoint_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_endpoint_in_use_exception.rs index de7296d8a..4216de5f4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_endpoint_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_endpoint_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyUriEndpointInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyUriEndpointInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_in_use_exception.rs index 28f8c5ab5..ab0452f63 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyUriInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyUriInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_unreachable_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_unreachable_exception.rs index feeb64d57..3e33015d6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_unreachable_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_uri_unreachable_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyUriUnreachableException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyUriUnreachableException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_in_use_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_in_use_exception.rs index 0991ac9a1..0d0b90074 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_in_use_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_in_use_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInUseException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyVpcEndpointServiceInUseException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_invalid_configuration_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_invalid_configuration_exception.rs index 814f4cb76..652202f22 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_invalid_configuration_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_invalid_configuration_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInvalidConfigurationException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyVpcEndpointServiceInvalidConfigurationException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_not_found_exception.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_not_found_exception.rs index 40b598ff4..8e80a7d5e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_not_found_exception.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/error/xks_proxy_vpc_endpoint_service_not_found_exception.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceNotFoundException, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error::XksProxyVpcEndpointServiceNotFoundException { message: crate::standard_library_conversions::ostring_to_dafny(&value.message), } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/expiration_model_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/expiration_model_type.rs index 5e671bac6..692adc0d4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/expiration_model_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/expiration_model_type.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_kms::types::ExpirationModelType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::ExpirationModelType::KeyMaterialExpires => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ExpirationModelType::KEY_MATERIAL_EXPIRES {}, aws_sdk_kms::types::ExpirationModelType::KeyMaterialDoesNotExpire => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ExpirationModelType, ) -> aws_sdk_kms::types::ExpirationModelType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key.rs index c46078506..0faa8af3b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_data_key::GenerateDataKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_data_key::GenerateDataKeyError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _generate_data_key_request; +pub mod _generate_data_key_request; - pub mod _generate_data_key_response; +pub mod _generate_data_key_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_request.rs index d7f232aaf..6a947cc7f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_request.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key::GenerateDataKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyRequest::GenerateDataKeyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyRequest::GenerateDataKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,12 +21,12 @@ pub fn to_dafny( }) , NumberOfBytes: crate::standard_library_conversions::oint_to_dafny(value.number_of_bytes), - KeySpec: ::std::rc::Rc::new(match &value.key_spec { + KeySpec: ::dafny_runtime::Rc::new(match &value.key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::data_key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -35,7 +35,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Recipient: ::std::rc::Rc::new(match &value.recipient { + Recipient: ::dafny_runtime::Rc::new(match &value.recipient { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::recipient_info::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -43,11 +43,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyRequest, - > + >, ) -> aws_sdk_kms::operation::generate_data_key::GenerateDataKeyInput { aws_sdk_kms::operation::generate_data_key::GenerateDataKeyInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_response.rs index bdd632322..4e0f8b662 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key/_generate_data_key_response.rs @@ -4,28 +4,34 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key::GenerateDataKeyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyResponse::GenerateDataKeyResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyResponse::GenerateDataKeyResponse { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob), Plaintext: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), CiphertextForRecipient: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_for_recipient), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyResponse, - > + >, ) -> aws_sdk_kms::operation::generate_data_key::GenerateDataKeyOutput { aws_sdk_kms::operation::generate_data_key::GenerateDataKeyOutput::builder() - .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextBlob().clone())) - .set_plaintext(crate::standard_library_conversions::oblob_from_dafny(dafny_value.Plaintext().clone())) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextForRecipient().clone())) - .build() - - + .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextBlob().clone(), + )) + .set_plaintext(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.Plaintext().clone(), + )) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextForRecipient().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair.rs index 426c42178..5f855d7c0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairError::DependencyTimeoutException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _generate_data_key_pair_request; +pub mod _generate_data_key_pair_request; - pub mod _generate_data_key_pair_response; +pub mod _generate_data_key_pair_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_request.rs index 977ff78ab..4699ec894 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_request.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairRequest::GenerateDataKeyPairRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairRequest::GenerateDataKeyPairRequest { EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,7 +21,7 @@ pub fn to_dafny( , KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), KeyPairSpec: crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::to_dafny(value.key_pair_spec.clone().unwrap()), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -30,7 +30,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Recipient: ::std::rc::Rc::new(match &value.recipient { + Recipient: ::dafny_runtime::Rc::new(match &value.recipient { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::recipient_info::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -38,11 +38,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairRequest, - > + >, ) -> aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairInput { aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairInput::builder() .set_encryption_context(match (*dafny_value.EncryptionContext()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_response.rs index f6ccb08a8..73543b64f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair/_generate_data_key_pair_response.rs @@ -4,15 +4,15 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairResponse::GenerateDataKeyPairResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairResponse::GenerateDataKeyPairResponse { PrivateKeyCiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.private_key_ciphertext_blob), PrivateKeyPlaintext: crate::standard_library_conversions::oblob_to_dafny(&value.private_key_plaintext), PublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), - KeyPairSpec: ::std::rc::Rc::new(match &value.key_pair_spec { + KeyPairSpec: ::dafny_runtime::Rc::new(match &value.key_pair_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -20,26 +20,33 @@ pub fn to_dafny( CiphertextForRecipient: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_for_recipient), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairResponse, - > + >, ) -> aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairOutput { aws_sdk_kms::operation::generate_data_key_pair::GenerateDataKeyPairOutput::builder() - .set_private_key_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PrivateKeyCiphertextBlob().clone())) - .set_private_key_plaintext(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PrivateKeyPlaintext().clone())) - .set_public_key(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PublicKey().clone())) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_key_pair_spec(match &**dafny_value.KeyPairSpec() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::from_dafny(value) - ), - _ => None, -} -) - .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextForRecipient().clone())) - .build() - - + .set_private_key_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.PrivateKeyCiphertextBlob().clone(), + )) + .set_private_key_plaintext(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.PrivateKeyPlaintext().clone(), + )) + .set_public_key(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.PublicKey().clone(), + )) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_key_pair_spec(match &**dafny_value.KeyPairSpec() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::from_dafny(value), + ), + _ => None, + }) + .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextForRecipient().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext.rs index afec62790..940600372 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextError::DependencyTimeoutException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _generate_data_key_pair_without_plaintext_request; +pub mod _generate_data_key_pair_without_plaintext_request; - pub mod _generate_data_key_pair_without_plaintext_response; +pub mod _generate_data_key_pair_without_plaintext_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_request.rs index f2932bd59..9f583166d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_request.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest { EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -21,7 +21,7 @@ pub fn to_dafny( , KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), KeyPairSpec: crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::to_dafny(value.key_pair_spec.clone().unwrap()), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -33,12 +33,12 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextRequest, > -) -> aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextInput { +) -> aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextInput{ aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextInput::builder() .set_encryption_context(match (*dafny_value.EncryptionContext()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_response.rs index a2b6c21ad..991e40881 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_pair_without_plaintext/_generate_data_key_pair_without_plaintext_response.rs @@ -4,26 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse { PrivateKeyCiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.private_key_ciphertext_blob), PublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), - KeyPairSpec: ::std::rc::Rc::new(match &value.key_pair_spec { + KeyPairSpec: ::dafny_runtime::Rc::new(match &value.key_pair_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::data_key_pair_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyPairWithoutPlaintextResponse, > -) -> aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextOutput { +) -> aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextOutput{ aws_sdk_kms::operation::generate_data_key_pair_without_plaintext::GenerateDataKeyPairWithoutPlaintextOutput::builder() .set_private_key_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PrivateKeyCiphertextBlob().clone())) .set_public_key(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PublicKey().clone())) @@ -36,6 +36,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext.rs index 967606c4c..88eb79fc9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _generate_data_key_without_plaintext_request; +pub mod _generate_data_key_without_plaintext_request; - pub mod _generate_data_key_without_plaintext_response; +pub mod _generate_data_key_without_plaintext_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_request.rs index 6439e8349..5a38c9c2e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_request.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), EncryptionContext: -::std::rc::Rc::new(match &value.encryption_context { +::dafny_runtime::Rc::new(match &value.encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -20,13 +20,13 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - KeySpec: ::std::rc::Rc::new(match &value.key_spec { + KeySpec: ::dafny_runtime::Rc::new(match &value.key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::data_key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , NumberOfBytes: crate::standard_library_conversions::oint_to_dafny(value.number_of_bytes), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -38,12 +38,13 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextRequest, - > -) -> aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextInput { + >, +) -> aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextInput +{ aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) .set_encryption_context(match (*dafny_value.EncryptionContext()).as_ref() { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_response.rs index 821f0b031..22f4be5ed 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_data_key_without_plaintext/_generate_data_key_without_plaintext_response.rs @@ -4,24 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateDataKeyWithoutPlaintextResponse, > -) -> aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextOutput { +) -> aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextOutput{ aws_sdk_kms::operation::generate_data_key_without_plaintext::GenerateDataKeyWithoutPlaintextOutput::builder() .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextBlob().clone())) .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac.rs index 286db3f8b..eeecc92e6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_mac::GenerateMacError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_mac::GenerateMacError::DisabledException(e) => @@ -38,6 +40,6 @@ pub fn to_dafny_error( } } - pub mod _generate_mac_request; +pub mod _generate_mac_request; - pub mod _generate_mac_response; +pub mod _generate_mac_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_request.rs index f5dda65b6..5cbce5592 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_request.rs @@ -4,14 +4,14 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_mac::GenerateMacInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacRequest::GenerateMacRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacRequest::GenerateMacRequest { Message: crate::standard_library_conversions::oblob_to_dafny(&value.message).Extract(), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), MacAlgorithm: crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::to_dafny(value.mac_algorithm.clone().unwrap()), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -23,11 +23,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacRequest, - > + >, ) -> aws_sdk_kms::operation::generate_mac::GenerateMacInput { aws_sdk_kms::operation::generate_mac::GenerateMacInput::builder() .set_message(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.Message().clone()))) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_response.rs index cc3a9f474..35e8e6b52 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_mac/_generate_mac_response.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_mac::GenerateMacOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacResponse::GenerateMacResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacResponse::GenerateMacResponse { Mac: crate::standard_library_conversions::oblob_to_dafny(&value.mac), - MacAlgorithm: ::std::rc::Rc::new(match &value.mac_algorithm { + MacAlgorithm: ::dafny_runtime::Rc::new(match &value.mac_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -17,23 +17,24 @@ pub fn to_dafny( KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateMacResponse, - > + >, ) -> aws_sdk_kms::operation::generate_mac::GenerateMacOutput { aws_sdk_kms::operation::generate_mac::GenerateMacOutput::builder() - .set_mac(crate::standard_library_conversions::oblob_from_dafny(dafny_value.Mac().clone())) - .set_mac_algorithm(match &**dafny_value.MacAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .build() - - + .set_mac(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.Mac().clone(), + )) + .set_mac_algorithm(match &**dafny_value.MacAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(value), + ), + _ => None, + }) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random.rs index 4dc3e6b58..e61bc960f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::generate_random::GenerateRandomError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::generate_random::GenerateRandomError::CustomKeyStoreInvalidStateException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _generate_random_request; +pub mod _generate_random_request; - pub mod _generate_random_response; +pub mod _generate_random_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_request.rs index 376c49c8e..0ce524428 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_request.rs @@ -4,34 +4,40 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_random::GenerateRandomInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomRequest::GenerateRandomRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomRequest::GenerateRandomRequest { NumberOfBytes: crate::standard_library_conversions::oint_to_dafny(value.number_of_bytes), CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), - Recipient: ::std::rc::Rc::new(match &value.recipient { + Recipient: ::dafny_runtime::Rc::new(match &value.recipient { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::recipient_info::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomRequest, - > + >, ) -> aws_sdk_kms::operation::generate_random::GenerateRandomInput { aws_sdk_kms::operation::generate_random::GenerateRandomInput::builder() - .set_number_of_bytes(crate::standard_library_conversions::oint_from_dafny(dafny_value.NumberOfBytes().clone())) - .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.CustomKeyStoreId().clone())) - .set_recipient(match (*dafny_value.Recipient()).as_ref() { - crate::r#_Wrappers_Compile::Option::Some { value } => - Some(crate::deps::com_amazonaws_kms::conversions::recipient_info::from_dafny(value.clone())), - _ => None, -} -) - .build() - .unwrap() + .set_number_of_bytes(crate::standard_library_conversions::oint_from_dafny( + dafny_value.NumberOfBytes().clone(), + )) + .set_custom_key_store_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.CustomKeyStoreId().clone(), + )) + .set_recipient(match (*dafny_value.Recipient()).as_ref() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::recipient_info::from_dafny( + value.clone(), + ), + ), + _ => None, + }) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_response.rs index 8f175516b..9760d30a4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/generate_random/_generate_random_response.rs @@ -4,24 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::generate_random::GenerateRandomOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomResponse::GenerateRandomResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomResponse::GenerateRandomResponse { Plaintext: crate::standard_library_conversions::oblob_to_dafny(&value.plaintext), CiphertextForRecipient: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_for_recipient), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GenerateRandomResponse, - > + >, ) -> aws_sdk_kms::operation::generate_random::GenerateRandomOutput { aws_sdk_kms::operation::generate_random::GenerateRandomOutput::builder() - .set_plaintext(crate::standard_library_conversions::oblob_from_dafny(dafny_value.Plaintext().clone())) - .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextForRecipient().clone())) - .build() - - + .set_plaintext(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.Plaintext().clone(), + )) + .set_ciphertext_for_recipient(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.CiphertextForRecipient().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy.rs index 5f0eaa606..a9599710d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::get_key_policy::GetKeyPolicyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::get_key_policy::GetKeyPolicyError::DependencyTimeoutException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _get_key_policy_request; +pub mod _get_key_policy_request; - pub mod _get_key_policy_response; +pub mod _get_key_policy_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_request.rs index 0daa77faf..62510d5b5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_request.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_key_policy::GetKeyPolicyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyRequest::GetKeyPolicyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyRequest::GetKeyPolicyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), PolicyName: crate::standard_library_conversions::ostring_to_dafny(&value.policy_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyRequest, - > + >, ) -> aws_sdk_kms::operation::get_key_policy::GetKeyPolicyInput { aws_sdk_kms::operation::get_key_policy::GetKeyPolicyInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_policy_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.PolicyName().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_policy_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.PolicyName().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_response.rs index 924fb2c96..4cdf09765 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_policy/_get_key_policy_response.rs @@ -4,24 +4,26 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_key_policy::GetKeyPolicyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyResponse::GetKeyPolicyResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyResponse::GetKeyPolicyResponse { Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy), PolicyName: crate::standard_library_conversions::ostring_to_dafny(&value.policy_name), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyPolicyResponse, - > + >, ) -> aws_sdk_kms::operation::get_key_policy::GetKeyPolicyOutput { aws_sdk_kms::operation::get_key_policy::GetKeyPolicyOutput::builder() - .set_policy(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Policy().clone())) - .set_policy_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.PolicyName().clone())) - .build() - - + .set_policy(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Policy().clone(), + )) + .set_policy_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.PolicyName().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status.rs index 212961635..1d93136f7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusError::DependencyTimeoutException(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _get_key_rotation_status_request; +pub mod _get_key_rotation_status_request; - pub mod _get_key_rotation_status_response; +pub mod _get_key_rotation_status_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_request.rs index 277e16fdc..8937cee5f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusRequest::GetKeyRotationStatusRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusRequest::GetKeyRotationStatusRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusRequest, - > + >, ) -> aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusInput { aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_response.rs index 626ea7c26..dcf656f77 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_key_rotation_status/_get_key_rotation_status_response.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusResponse::GetKeyRotationStatusResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusResponse::GetKeyRotationStatusResponse { KeyRotationEnabled: crate::standard_library_conversions::obool_to_dafny(&Some(value.key_rotation_enabled)), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), RotationPeriodInDays: crate::standard_library_conversions::oint_to_dafny(value.rotation_period_in_days), @@ -15,19 +15,29 @@ pub fn to_dafny( OnDemandRotationStartDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.on_demand_rotation_start_date), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetKeyRotationStatusResponse, - > + >, ) -> aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusOutput { aws_sdk_kms::operation::get_key_rotation_status::GetKeyRotationStatusOutput::builder() - .set_key_rotation_enabled(crate::standard_library_conversions::obool_from_dafny(dafny_value.KeyRotationEnabled().clone())) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_rotation_period_in_days(crate::standard_library_conversions::oint_from_dafny(dafny_value.RotationPeriodInDays().clone())) - .set_next_rotation_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.NextRotationDate().clone())) - .set_on_demand_rotation_start_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.OnDemandRotationStartDate().clone())) - .build() - - + .set_key_rotation_enabled(crate::standard_library_conversions::obool_from_dafny( + dafny_value.KeyRotationEnabled().clone(), + )) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_rotation_period_in_days(crate::standard_library_conversions::oint_from_dafny( + dafny_value.RotationPeriodInDays().clone(), + )) + .set_next_rotation_date(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.NextRotationDate().clone(), + )) + .set_on_demand_rotation_start_date( + crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.OnDemandRotationStartDate().clone(), + ), + ) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import.rs index 6d8912dde..b86f99f64 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportError::DependencyTimeoutException(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _get_parameters_for_import_request; +pub mod _get_parameters_for_import_request; - pub mod _get_parameters_for_import_response; +pub mod _get_parameters_for_import_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_request.rs index fd84608b2..f0ed7304b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_request.rs @@ -4,25 +4,37 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportRequest::GetParametersForImportRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportRequest::GetParametersForImportRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), WrappingAlgorithm: crate::deps::com_amazonaws_kms::conversions::algorithm_spec::to_dafny(value.wrapping_algorithm.clone().unwrap()), WrappingKeySpec: crate::deps::com_amazonaws_kms::conversions::wrapping_key_spec::to_dafny(value.wrapping_key_spec.clone().unwrap()), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportRequest, - > + >, ) -> aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportInput { aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_wrapping_algorithm(Some( crate::deps::com_amazonaws_kms::conversions::algorithm_spec::from_dafny(dafny_value.WrappingAlgorithm()) )) - .set_wrapping_key_spec(Some( crate::deps::com_amazonaws_kms::conversions::wrapping_key_spec::from_dafny(dafny_value.WrappingKeySpec()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_wrapping_algorithm(Some( + crate::deps::com_amazonaws_kms::conversions::algorithm_spec::from_dafny( + dafny_value.WrappingAlgorithm(), + ), + )) + .set_wrapping_key_spec(Some( + crate::deps::com_amazonaws_kms::conversions::wrapping_key_spec::from_dafny( + dafny_value.WrappingKeySpec(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_response.rs index 871ef4534..01412ed04 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_parameters_for_import/_get_parameters_for_import_response.rs @@ -4,28 +4,34 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportResponse::GetParametersForImportResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportResponse::GetParametersForImportResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), ImportToken: crate::standard_library_conversions::oblob_to_dafny(&value.import_token), PublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), ParametersValidTo: crate::standard_library_conversions::otimestamp_to_dafny(&value.parameters_valid_to), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetParametersForImportResponse, - > + >, ) -> aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportOutput { aws_sdk_kms::operation::get_parameters_for_import::GetParametersForImportOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_import_token(crate::standard_library_conversions::oblob_from_dafny(dafny_value.ImportToken().clone())) - .set_public_key(crate::standard_library_conversions::oblob_from_dafny(dafny_value.PublicKey().clone())) - .set_parameters_valid_to(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.ParametersValidTo().clone())) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_import_token(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.ImportToken().clone(), + )) + .set_public_key(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.PublicKey().clone(), + )) + .set_parameters_valid_to(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.ParametersValidTo().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key.rs index d67348c1e..502f2e285 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::get_public_key::GetPublicKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::get_public_key::GetPublicKeyError::DependencyTimeoutException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _get_public_key_request; +pub mod _get_public_key_request; - pub mod _get_public_key_response; +pub mod _get_public_key_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_request.rs index b81021170..0708dfd2f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_request.rs @@ -4,12 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_public_key::GetPublicKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyRequest::GetPublicKeyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyRequest::GetPublicKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -20,11 +20,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyRequest, - > + >, ) -> aws_sdk_kms::operation::get_public_key::GetPublicKeyInput { aws_sdk_kms::operation::get_public_key::GetPublicKeyInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_response.rs index 2953dacbd..fb26e0ee0 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/get_public_key/_get_public_key_response.rs @@ -4,28 +4,28 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::get_public_key::GetPublicKeyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyResponse::GetPublicKeyResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyResponse::GetPublicKeyResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), PublicKey: crate::standard_library_conversions::oblob_to_dafny(&value.public_key), - CustomerMasterKeySpec: ::std::rc::Rc::new(match &value.customer_master_key_spec { + CustomerMasterKeySpec: ::dafny_runtime::Rc::new(match &value.customer_master_key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::customer_master_key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeySpec: ::std::rc::Rc::new(match &value.key_spec { + KeySpec: ::dafny_runtime::Rc::new(match &value.key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeyUsage: ::std::rc::Rc::new(match &value.key_usage { + KeyUsage: ::dafny_runtime::Rc::new(match &value.key_usage { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_usage_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - EncryptionAlgorithms: ::std::rc::Rc::new(match &value.encryption_algorithms { + EncryptionAlgorithms: ::dafny_runtime::Rc::new(match &value.encryption_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(e.clone()), @@ -34,7 +34,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - SigningAlgorithms: ::std::rc::Rc::new(match &value.signing_algorithms { + SigningAlgorithms: ::dafny_runtime::Rc::new(match &value.signing_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::to_dafny(e.clone()), @@ -43,7 +43,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - KeyAgreementAlgorithms: ::std::rc::Rc::new(match &value.key_agreement_algorithms { + KeyAgreementAlgorithms: ::dafny_runtime::Rc::new(match &value.key_agreement_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::to_dafny(e.clone()), @@ -54,11 +54,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GetPublicKeyResponse, - > + >, ) -> aws_sdk_kms::operation::get_public_key::GetPublicKeyOutput { aws_sdk_kms::operation::get_public_key::GetPublicKeyOutput::builder() .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) @@ -88,7 +88,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(e), ) ), _ => None @@ -98,7 +98,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(e), ) ), _ => None @@ -108,13 +108,11 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::from_dafny(e), ) ), _ => None } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_constraints.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_constraints.rs index 035eefa8a..441a1ca30 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_constraints.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_constraints.rs @@ -4,11 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::GrantConstraints, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantConstraints, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantConstraints::GrantConstraints { EncryptionContextSubset: -::std::rc::Rc::new(match &value.encryption_context_subset { +::dafny_runtime::Rc::new(match &value.encryption_context_subset { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -19,7 +21,7 @@ pub fn to_dafny( }) , EncryptionContextEquals: -::std::rc::Rc::new(match &value.encryption_context_equals { +::dafny_runtime::Rc::new(match &value.encryption_context_equals { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -31,9 +33,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantConstraints, >, ) -> aws_sdk_kms::types::GrantConstraints { @@ -61,5 +64,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_list_entry.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_list_entry.rs index 03a67a18a..48ae248e5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_list_entry.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_list_entry.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::GrantListEntry, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantListEntry, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantListEntry::GrantListEntry { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), GrantId: crate::standard_library_conversions::ostring_to_dafny(&value.grant_id), @@ -14,7 +16,7 @@ pub fn to_dafny( GranteePrincipal: crate::standard_library_conversions::ostring_to_dafny(&value.grantee_principal), RetiringPrincipal: crate::standard_library_conversions::ostring_to_dafny(&value.retiring_principal), IssuingAccount: crate::standard_library_conversions::ostring_to_dafny(&value.issuing_account), - Operations: ::std::rc::Rc::new(match &value.operations { + Operations: ::dafny_runtime::Rc::new(match &value.operations { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::grant_operation::to_dafny(e.clone()), @@ -23,16 +25,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - Constraints: ::std::rc::Rc::new(match &value.constraints { + Constraints: ::dafny_runtime::Rc::new(match &value.constraints { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::grant_constraints::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantListEntry, >, ) -> aws_sdk_kms::types::GrantListEntry { @@ -48,7 +51,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::grant_operation::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::grant_operation::from_dafny(e), ) ), _ => None @@ -61,5 +64,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_operation.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_operation.rs index 4ea909ccf..ee1cdd4eb 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_operation.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/grant_operation.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::GrantOperation, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantOperation, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::GrantOperation::Decrypt => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantOperation::Decrypt {}, aws_sdk_kms::types::GrantOperation::Encrypt => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantOperation::Encrypt {}, aws_sdk_kms::types::GrantOperation::GenerateDataKey => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantOperation::GenerateDataKey {}, @@ -27,7 +29,7 @@ aws_sdk_kms::types::GrantOperation::DeriveSharedSecret => crate::r#software::ama _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::GrantOperation, ) -> aws_sdk_kms::types::GrantOperation { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material.rs index a1296a4ca..45210ea3b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::import_key_material::ImportKeyMaterialError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::import_key_material::ImportKeyMaterialError::DependencyTimeoutException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _import_key_material_request; +pub mod _import_key_material_request; - pub mod _import_key_material_response; +pub mod _import_key_material_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_request.rs index f3bb06096..99912dfe9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_request.rs @@ -4,39 +4,50 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::import_key_material::ImportKeyMaterialInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialRequest::ImportKeyMaterialRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialRequest::ImportKeyMaterialRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), ImportToken: crate::standard_library_conversions::oblob_to_dafny(&value.import_token).Extract(), EncryptedKeyMaterial: crate::standard_library_conversions::oblob_to_dafny(&value.encrypted_key_material).Extract(), ValidTo: crate::standard_library_conversions::otimestamp_to_dafny(&value.valid_to), - ExpirationModel: ::std::rc::Rc::new(match &value.expiration_model { + ExpirationModel: ::dafny_runtime::Rc::new(match &value.expiration_model { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::expiration_model_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialRequest, - > + >, ) -> aws_sdk_kms::operation::import_key_material::ImportKeyMaterialInput { aws_sdk_kms::operation::import_key_material::ImportKeyMaterialInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_import_token(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.ImportToken().clone()))) - .set_encrypted_key_material(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.EncryptedKeyMaterial().clone()))) - .set_valid_to(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.ValidTo().clone())) - .set_expiration_model(match &**dafny_value.ExpirationModel() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::expiration_model_type::from_dafny(value) - ), - _ => None, -} -) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_import_token(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.ImportToken().clone(), + ))) + .set_encrypted_key_material(Some(crate::standard_library_conversions::blob_from_dafny( + dafny_value.EncryptedKeyMaterial().clone(), + ))) + .set_valid_to(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.ValidTo().clone(), + )) + .set_expiration_model(match &**dafny_value.ExpirationModel() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::expiration_model_type::from_dafny( + value, + ), + ), + _ => None, + }) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_response.rs index 24608dae1..a8bcbe3e5 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/import_key_material/_import_key_material_response.rs @@ -4,22 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::import_key_material::ImportKeyMaterialOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialResponse::ImportKeyMaterialResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialResponse::ImportKeyMaterialResponse { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ImportKeyMaterialResponse, - > + >, ) -> aws_sdk_kms::operation::import_key_material::ImportKeyMaterialOutput { - aws_sdk_kms::operation::import_key_material::ImportKeyMaterialOutput::builder() - - .build() - - + aws_sdk_kms::operation::import_key_material::ImportKeyMaterialOutput::builder().build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_agreement_algorithm_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_agreement_algorithm_spec.rs index 1693266ff..e7e38261e 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_agreement_algorithm_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_agreement_algorithm_spec.rs @@ -5,13 +5,13 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeyAgreementAlgorithmSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeyAgreementAlgorithmSpec::Ecdh => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyAgreementAlgorithmSpec::ECDH {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyAgreementAlgorithmSpec, ) -> aws_sdk_kms::types::KeyAgreementAlgorithmSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_encryption_mechanism.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_encryption_mechanism.rs index 80c4b4d9b..da833b52b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_encryption_mechanism.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_encryption_mechanism.rs @@ -5,13 +5,13 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeyEncryptionMechanism, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeyEncryptionMechanism::RsaesOaepSha256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyEncryptionMechanism::RSAES_OAEP_SHA_256 {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyEncryptionMechanism, ) -> aws_sdk_kms::types::KeyEncryptionMechanism { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_list_entry.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_list_entry.rs index 3cf21af3d..a3983c6ab 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_list_entry.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_list_entry.rs @@ -4,22 +4,28 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::KeyListEntry, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyListEntry, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyListEntry::KeyListEntry { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), KeyArn: crate::standard_library_conversions::ostring_to_dafny(&value.key_arn), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyListEntry, >, ) -> aws_sdk_kms::types::KeyListEntry { aws_sdk_kms::types::KeyListEntry::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_key_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyArn().clone())) - .build() - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_key_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyArn().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_manager_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_manager_type.rs index 59667f764..8db70a015 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_manager_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_manager_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeyManagerType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyManagerType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeyManagerType::Aws => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyManagerType::AWS {}, aws_sdk_kms::types::KeyManagerType::Customer => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyManagerType::CUSTOMER {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyManagerType, ) -> aws_sdk_kms::types::KeyManagerType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_metadata.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_metadata.rs index ce5ae5107..6180cb87a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_metadata.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_metadata.rs @@ -4,8 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::KeyMetadata, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyMetadata, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyMetadata::KeyMetadata { AWSAccountId: crate::standard_library_conversions::ostring_to_dafny(&value.aws_account_id), KeyId: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.key_id), @@ -13,46 +15,46 @@ pub fn to_dafny( CreationDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.creation_date), Enabled: crate::standard_library_conversions::obool_to_dafny(&Some(value.enabled)), Description: crate::standard_library_conversions::ostring_to_dafny(&value.description), - KeyUsage: ::std::rc::Rc::new(match &value.key_usage { + KeyUsage: ::dafny_runtime::Rc::new(match &value.key_usage { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_usage_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeyState: ::std::rc::Rc::new(match &value.key_state { + KeyState: ::dafny_runtime::Rc::new(match &value.key_state { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_state::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , DeletionDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.deletion_date), ValidTo: crate::standard_library_conversions::otimestamp_to_dafny(&value.valid_to), - Origin: ::std::rc::Rc::new(match &value.origin { + Origin: ::dafny_runtime::Rc::new(match &value.origin { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::origin_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id), CloudHsmClusterId: crate::standard_library_conversions::ostring_to_dafny(&value.cloud_hsm_cluster_id), - ExpirationModel: ::std::rc::Rc::new(match &value.expiration_model { + ExpirationModel: ::dafny_runtime::Rc::new(match &value.expiration_model { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::expiration_model_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeyManager: ::std::rc::Rc::new(match &value.key_manager { + KeyManager: ::dafny_runtime::Rc::new(match &value.key_manager { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_manager_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - CustomerMasterKeySpec: ::std::rc::Rc::new(match &value.customer_master_key_spec { + CustomerMasterKeySpec: ::dafny_runtime::Rc::new(match &value.customer_master_key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::customer_master_key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - KeySpec: ::std::rc::Rc::new(match &value.key_spec { + KeySpec: ::dafny_runtime::Rc::new(match &value.key_spec { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - EncryptionAlgorithms: ::std::rc::Rc::new(match &value.encryption_algorithms { + EncryptionAlgorithms: ::dafny_runtime::Rc::new(match &value.encryption_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(e.clone()), @@ -61,7 +63,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - SigningAlgorithms: ::std::rc::Rc::new(match &value.signing_algorithms { + SigningAlgorithms: ::dafny_runtime::Rc::new(match &value.signing_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::to_dafny(e.clone()), @@ -70,7 +72,7 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - KeyAgreementAlgorithms: ::std::rc::Rc::new(match &value.key_agreement_algorithms { + KeyAgreementAlgorithms: ::dafny_runtime::Rc::new(match &value.key_agreement_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::to_dafny(e.clone()), @@ -80,13 +82,13 @@ pub fn to_dafny( }) , MultiRegion: crate::standard_library_conversions::obool_to_dafny(&value.multi_region), - MultiRegionConfiguration: ::std::rc::Rc::new(match &value.multi_region_configuration { + MultiRegionConfiguration: ::dafny_runtime::Rc::new(match &value.multi_region_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::multi_region_configuration::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , PendingDeletionWindowInDays: crate::standard_library_conversions::oint_to_dafny(value.pending_deletion_window_in_days), - MacAlgorithms: ::std::rc::Rc::new(match &value.mac_algorithms { + MacAlgorithms: ::dafny_runtime::Rc::new(match &value.mac_algorithms { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::to_dafny(e.clone()), @@ -95,16 +97,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - XksKeyConfiguration: ::std::rc::Rc::new(match &value.xks_key_configuration { + XksKeyConfiguration: ::dafny_runtime::Rc::new(match &value.xks_key_configuration { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_key_configuration_type::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyMetadata, >, ) -> aws_sdk_kms::types::KeyMetadata { @@ -172,7 +175,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::from_dafny(e), ) ), _ => None @@ -182,7 +185,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(e), ) ), _ => None @@ -192,7 +195,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::key_agreement_algorithm_spec::from_dafny(e), ) ), _ => None @@ -210,7 +213,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(e), + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(e), ) ), _ => None diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_spec.rs index 14c6136fc..71d6d6ef1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeySpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeySpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeySpec::Rsa2048 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeySpec::RSA_2048 {}, aws_sdk_kms::types::KeySpec::Rsa3072 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeySpec::RSA_3072 {}, aws_sdk_kms::types::KeySpec::Rsa4096 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeySpec::RSA_4096 {}, @@ -23,7 +25,7 @@ aws_sdk_kms::types::KeySpec::Sm2 => crate::r#software::amazon::cryptography::ser _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeySpec, ) -> aws_sdk_kms::types::KeySpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_state.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_state.rs index d76b30c18..62c19c5b8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_state.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_state.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeyState, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyState, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeyState::Creating => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyState::Creating {}, aws_sdk_kms::types::KeyState::Enabled => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyState::Enabled {}, aws_sdk_kms::types::KeyState::Disabled => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyState::Disabled {}, @@ -18,7 +20,7 @@ aws_sdk_kms::types::KeyState::Updating => crate::r#software::amazon::cryptograph _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyState, ) -> aws_sdk_kms::types::KeyState { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_usage_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_usage_type.rs index 8d2db6b3c..06392f412 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_usage_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/key_usage_type.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::KeyUsageType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyUsageType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::KeyUsageType::SignVerify => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyUsageType::SIGN_VERIFY {}, aws_sdk_kms::types::KeyUsageType::EncryptDecrypt => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyUsageType::ENCRYPT_DECRYPT {}, aws_sdk_kms::types::KeyUsageType::GenerateVerifyMac => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyUsageType::GENERATE_VERIFY_MAC {}, @@ -14,7 +16,7 @@ aws_sdk_kms::types::KeyUsageType::KeyAgreement => crate::r#software::amazon::cry _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::KeyUsageType, ) -> aws_sdk_kms::types::KeyUsageType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases.rs index b36008dce..f6cff0037 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_aliases::ListAliasesError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_aliases::ListAliasesError::DependencyTimeoutException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _list_aliases_request; +pub mod _list_aliases_request; - pub mod _list_aliases_response; +pub mod _list_aliases_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_request.rs index bc0bcd265..3f1f31ebf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_request.rs @@ -4,25 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_aliases::ListAliasesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesRequest::ListAliasesRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesRequest::ListAliasesRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesRequest, - > + >, ) -> aws_sdk_kms::operation::list_aliases::ListAliasesInput { aws_sdk_kms::operation::list_aliases::ListAliasesInput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_response.rs index 600e333e6..fb807be38 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_aliases/_list_aliases_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_aliases::ListAliasesOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesResponse::ListAliasesResponse { - Aliases: ::std::rc::Rc::new(match &value.aliases { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesResponse::ListAliasesResponse { + Aliases: ::dafny_runtime::Rc::new(match &value.aliases { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::alias_list_entry::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListAliasesResponse, - > + >, ) -> aws_sdk_kms::operation::list_aliases::ListAliasesOutput { aws_sdk_kms::operation::list_aliases::ListAliasesOutput::builder() .set_aliases(match (*dafny_value.Aliases()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::alias_list_entry::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::alias_list_entry::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants.rs index 58e520b07..0ce7eeced 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_grants::ListGrantsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_grants::ListGrantsError::DependencyTimeoutException(e) => @@ -36,6 +38,6 @@ pub fn to_dafny_error( } } - pub mod _list_grants_request; +pub mod _list_grants_request; - pub mod _list_grants_response; +pub mod _list_grants_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_request.rs index fb277464b..e56da7116 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_grants::ListGrantsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsRequest::ListGrantsRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsRequest::ListGrantsRequest { Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), @@ -15,18 +15,30 @@ pub fn to_dafny( GranteePrincipal: crate::standard_library_conversions::ostring_to_dafny(&value.grantee_principal), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsRequest, - > + >, ) -> aws_sdk_kms::operation::list_grants::ListGrantsInput { aws_sdk_kms::operation::list_grants::ListGrantsInput::builder() - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_grant_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GrantId().clone())) - .set_grantee_principal(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GranteePrincipal().clone())) - .build() - .unwrap() + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_grant_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GrantId().clone(), + )) + .set_grantee_principal(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GranteePrincipal().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_response.rs index f62bb8607..6e4b080e2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_grants/_list_grants_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_grants::ListGrantsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsResponse::ListGrantsResponse { - Grants: ::std::rc::Rc::new(match &value.grants { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsResponse::ListGrantsResponse { + Grants: ::dafny_runtime::Rc::new(match &value.grants { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::grant_list_entry::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListGrantsResponse, - > + >, ) -> aws_sdk_kms::operation::list_grants::ListGrantsOutput { aws_sdk_kms::operation::list_grants::ListGrantsOutput::builder() .set_grants(match (*dafny_value.Grants()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::grant_list_entry::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::grant_list_entry::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies.rs index 6957fd658..d8564ec7c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesError::DependencyTimeoutException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _list_key_policies_request; +pub mod _list_key_policies_request; - pub mod _list_key_policies_response; +pub mod _list_key_policies_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_request.rs index 728ebcbd7..e8f131a83 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_request.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesRequest::ListKeyPoliciesRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesRequest::ListKeyPoliciesRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesRequest, - > + >, ) -> aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesInput { aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_response.rs index 9bf99a961..aa4d7e423 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_policies/_list_key_policies_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesResponse::ListKeyPoliciesResponse { - PolicyNames: ::std::rc::Rc::new(match &value.policy_names { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesResponse::ListKeyPoliciesResponse { + PolicyNames: ::dafny_runtime::Rc::new(match &value.policy_names { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -21,11 +21,11 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyPoliciesResponse, - > + >, ) -> aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesOutput { aws_sdk_kms::operation::list_key_policies::ListKeyPoliciesOutput::builder() .set_policy_names(match (*dafny_value.PolicyNames()).as_ref() { @@ -41,6 +41,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations.rs index 8af250c9f..2aeae8f28 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsError::InvalidArnException(e) => @@ -34,6 +36,6 @@ pub fn to_dafny_error( } } - pub mod _list_key_rotations_request; +pub mod _list_key_rotations_request; - pub mod _list_key_rotations_response; +pub mod _list_key_rotations_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_request.rs index b9f3fc0d5..93043a9bf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_request.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsRequest::ListKeyRotationsRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsRequest::ListKeyRotationsRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsRequest, - > + >, ) -> aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsInput { aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_response.rs index 1f43156fa..d3bf56999 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_key_rotations/_list_key_rotations_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsResponse::ListKeyRotationsResponse { - Rotations: ::std::rc::Rc::new(match &value.rotations { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsResponse::ListKeyRotationsResponse { + Rotations: ::dafny_runtime::Rc::new(match &value.rotations { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::rotations_list_entry::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeyRotationsResponse, - > + >, ) -> aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsOutput { aws_sdk_kms::operation::list_key_rotations::ListKeyRotationsOutput::builder() .set_rotations(match (*dafny_value.Rotations()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::rotations_list_entry::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::rotations_list_entry::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys.rs index 30d118f9a..ce710d648 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_keys::ListKeysError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_keys::ListKeysError::DependencyTimeoutException(e) => @@ -28,6 +30,6 @@ pub fn to_dafny_error( } } - pub mod _list_keys_request; +pub mod _list_keys_request; - pub mod _list_keys_response; +pub mod _list_keys_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_request.rs index ade1ca35a..fba55ce13 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_request.rs @@ -4,23 +4,27 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_keys::ListKeysInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysRequest::ListKeysRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysRequest::ListKeysRequest { Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysRequest, - > + >, ) -> aws_sdk_kms::operation::list_keys::ListKeysInput { aws_sdk_kms::operation::list_keys::ListKeysInput::builder() - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_response.rs index 853b5a3a0..7796117a7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_keys/_list_keys_response.rs @@ -3,12 +3,12 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::list_keys::ListKeysOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::list_keys::ListKeysOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysResponse::ListKeysResponse { - Keys: ::std::rc::Rc::new(match &value.keys { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysResponse::ListKeysResponse { + Keys: ::dafny_runtime::Rc::new(match &value.keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::key_list_entry::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListKeysResponse, - > + >, ) -> aws_sdk_kms::operation::list_keys::ListKeysOutput { aws_sdk_kms::operation::list_keys::ListKeysOutput::builder() .set_keys(match (*dafny_value.Keys()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::key_list_entry::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::key_list_entry::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags.rs index a12ce1099..2f9a86c4a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::list_resource_tags::ListResourceTagsError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::list_resource_tags::ListResourceTagsError::InvalidArnException(e) => @@ -30,6 +32,6 @@ pub fn to_dafny_error( } } - pub mod _list_resource_tags_request; +pub mod _list_resource_tags_request; - pub mod _list_resource_tags_response; +pub mod _list_resource_tags_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_request.rs index f81edd4ea..a66e1628d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_request.rs @@ -4,25 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_resource_tags::ListResourceTagsInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsRequest::ListResourceTagsRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsRequest::ListResourceTagsRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Limit: crate::standard_library_conversions::oint_to_dafny(value.limit), Marker: crate::standard_library_conversions::ostring_to_dafny(&value.marker), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsRequest, - > + >, ) -> aws_sdk_kms::operation::list_resource_tags::ListResourceTagsInput { aws_sdk_kms::operation::list_resource_tags::ListResourceTagsInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_limit(crate::standard_library_conversions::oint_from_dafny(dafny_value.Limit().clone())) - .set_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Marker().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_limit(crate::standard_library_conversions::oint_from_dafny( + dafny_value.Limit().clone(), + )) + .set_marker(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Marker().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_response.rs index 7b11d2494..9bf16740b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/list_resource_tags/_list_resource_tags_response.rs @@ -4,11 +4,11 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::list_resource_tags::ListResourceTagsOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsResponse::ListResourceTagsResponse { - Tags: ::std::rc::Rc::new(match &value.tags { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsResponse::ListResourceTagsResponse { + Tags: ::dafny_runtime::Rc::new(match &value.tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::tag::to_dafny(e) @@ -22,18 +22,18 @@ pub fn to_dafny( Truncated: crate::standard_library_conversions::obool_to_dafny(&Some(value.truncated)), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ListResourceTagsResponse, - > + >, ) -> aws_sdk_kms::operation::list_resource_tags::ListResourceTagsOutput { aws_sdk_kms::operation::list_resource_tags::ListResourceTagsOutput::builder() .set_tags(match (*dafny_value.Tags()).as_ref() { crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) , ) ), @@ -43,6 +43,4 @@ pub fn from_dafny( .set_next_marker(crate::standard_library_conversions::ostring_from_dafny(dafny_value.NextMarker().clone())) .set_truncated(crate::standard_library_conversions::obool_from_dafny(dafny_value.Truncated().clone())) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/mac_algorithm_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/mac_algorithm_spec.rs index 78db597bb..36ed359e7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/mac_algorithm_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/mac_algorithm_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::MacAlgorithmSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MacAlgorithmSpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::MacAlgorithmSpec::HmacSha224 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MacAlgorithmSpec::HMAC_SHA_224 {}, aws_sdk_kms::types::MacAlgorithmSpec::HmacSha256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MacAlgorithmSpec::HMAC_SHA_256 {}, aws_sdk_kms::types::MacAlgorithmSpec::HmacSha384 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MacAlgorithmSpec::HMAC_SHA_384 {}, @@ -14,7 +16,7 @@ aws_sdk_kms::types::MacAlgorithmSpec::HmacSha512 => crate::r#software::amazon::c _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MacAlgorithmSpec, ) -> aws_sdk_kms::types::MacAlgorithmSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/message_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/message_type.rs index adbdbf236..6048e8c5f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/message_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/message_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_kms::types::MessageType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MessageType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::MessageType::Raw => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MessageType::RAW {}, aws_sdk_kms::types::MessageType::Digest => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MessageType::DIGEST {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MessageType, ) -> aws_sdk_kms::types::MessageType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_configuration.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_configuration.rs index da6dcc87d..ea382b1a8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_configuration.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_configuration.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::MultiRegionConfiguration, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionConfiguration::MultiRegionConfiguration { - MultiRegionKeyType: ::std::rc::Rc::new(match &value.multi_region_key_type { + MultiRegionKeyType: ::dafny_runtime::Rc::new(match &value.multi_region_key_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::multi_region_key_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - PrimaryKey: ::std::rc::Rc::new(match &value.primary_key { + PrimaryKey: ::dafny_runtime::Rc::new(match &value.primary_key { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::multi_region_key::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - ReplicaKeys: ::std::rc::Rc::new(match &value.replica_keys { + ReplicaKeys: ::dafny_runtime::Rc::new(match &value.replica_keys { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::multi_region_key::to_dafny(e) @@ -29,9 +29,10 @@ pub fn to_dafny( , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionConfiguration, >, ) -> aws_sdk_kms::types::MultiRegionConfiguration { @@ -53,7 +54,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::multi_region_key::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::multi_region_key::from_dafny(e.clone()) , ) ), @@ -61,5 +62,4 @@ pub fn from_dafny( } ) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key.rs index 28033f3be..05d815e9d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key.rs @@ -4,22 +4,28 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::MultiRegionKey, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKey, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKey::MultiRegionKey { Arn: crate::standard_library_conversions::ostring_to_dafny(&value.arn), Region: crate::standard_library_conversions::ostring_to_dafny(&value.region), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKey, >, ) -> aws_sdk_kms::types::MultiRegionKey { aws_sdk_kms::types::MultiRegionKey::builder() - .set_arn(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Arn().clone())) - .set_region(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Region().clone())) - .build() - + .set_arn(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Arn().clone(), + )) + .set_region(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Region().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key_type.rs index e35f0d68a..947b4d99d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/multi_region_key_type.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_kms::types::MultiRegionKeyType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::MultiRegionKeyType::Primary => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKeyType::PRIMARY {}, aws_sdk_kms::types::MultiRegionKeyType::Replica => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKeyType::REPLICA {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::MultiRegionKeyType, ) -> aws_sdk_kms::types::MultiRegionKeyType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/origin_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/origin_type.rs index 8878e10fa..3076a3597 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/origin_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/origin_type.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::OriginType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::OriginType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::OriginType::AwsKms => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::OriginType::AWS_KMS {}, aws_sdk_kms::types::OriginType::External => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::OriginType::EXTERNAL {}, aws_sdk_kms::types::OriginType::AwsCloudhsm => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::OriginType::AWS_CLOUDHSM {}, @@ -14,7 +16,7 @@ aws_sdk_kms::types::OriginType::ExternalKeyStore => crate::r#software::amazon::c _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::OriginType, ) -> aws_sdk_kms::types::OriginType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy.rs index 3814d7976..902ba6e28 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::put_key_policy::PutKeyPolicyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::put_key_policy::PutKeyPolicyError::DependencyTimeoutException(e) => @@ -38,4 +40,4 @@ pub fn to_dafny_error( } } - pub mod _put_key_policy_request; +pub mod _put_key_policy_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy/_put_key_policy_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy/_put_key_policy_request.rs index fc5f9117e..ba568ce4d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy/_put_key_policy_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/put_key_policy/_put_key_policy_request.rs @@ -4,27 +4,41 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::put_key_policy::PutKeyPolicyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::PutKeyPolicyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::PutKeyPolicyRequest::PutKeyPolicyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::PutKeyPolicyRequest::PutKeyPolicyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), PolicyName: crate::standard_library_conversions::ostring_to_dafny(&value.policy_name), Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy) .Extract(), BypassPolicyLockoutSafetyCheck: crate::standard_library_conversions::obool_to_dafny(&value.bypass_policy_lockout_safety_check), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::PutKeyPolicyRequest, - > + >, ) -> aws_sdk_kms::operation::put_key_policy::PutKeyPolicyInput { aws_sdk_kms::operation::put_key_policy::PutKeyPolicyInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_policy_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.PolicyName().clone())) - .set_policy(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Policy()) )) - .set_bypass_policy_lockout_safety_check(crate::standard_library_conversions::obool_from_dafny(dafny_value.BypassPolicyLockoutSafetyCheck().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_policy_name(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.PolicyName().clone(), + )) + .set_policy(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Policy(), + ), + )) + .set_bypass_policy_lockout_safety_check( + crate::standard_library_conversions::obool_from_dafny( + dafny_value.BypassPolicyLockoutSafetyCheck().clone(), + ), + ) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt.rs index ca76e917c..59a1e4ad4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::re_encrypt::ReEncryptError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::re_encrypt::ReEncryptError::DependencyTimeoutException(e) => @@ -44,6 +46,6 @@ pub fn to_dafny_error( } } - pub mod _re_encrypt_request; +pub mod _re_encrypt_request; - pub mod _re_encrypt_response; +pub mod _re_encrypt_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_request.rs index 36c616653..b872e466d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_request.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::re_encrypt::ReEncryptInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptRequest::ReEncryptRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptRequest::ReEncryptRequest { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob).Extract(), SourceEncryptionContext: -::std::rc::Rc::new(match &value.source_encryption_context { +::dafny_runtime::Rc::new(match &value.source_encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -23,7 +23,7 @@ pub fn to_dafny( SourceKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.source_key_id), DestinationKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.destination_key_id) .Extract(), DestinationEncryptionContext: -::std::rc::Rc::new(match &value.destination_encryption_context { +::dafny_runtime::Rc::new(match &value.destination_encryption_context { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::hashmap_to_dafny_map(x, |k| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&k), @@ -33,17 +33,17 @@ pub fn to_dafny( None => crate::r#_Wrappers_Compile::Option::None {} }) , - SourceEncryptionAlgorithm: ::std::rc::Rc::new(match &value.source_encryption_algorithm { + SourceEncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.source_encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - DestinationEncryptionAlgorithm: ::std::rc::Rc::new(match &value.destination_encryption_algorithm { + DestinationEncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.destination_encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -55,11 +55,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptRequest, - > + >, ) -> aws_sdk_kms::operation::re_encrypt::ReEncryptInput { aws_sdk_kms::operation::re_encrypt::ReEncryptInput::builder() .set_ciphertext_blob(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.CiphertextBlob().clone()))) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_response.rs index 08b5edd44..2a442ed6d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/re_encrypt/_re_encrypt_response.rs @@ -3,31 +3,31 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::re_encrypt::ReEncryptOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::re_encrypt::ReEncryptOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptResponse::ReEncryptResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptResponse::ReEncryptResponse { CiphertextBlob: crate::standard_library_conversions::oblob_to_dafny(&value.ciphertext_blob), SourceKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.source_key_id), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), - SourceEncryptionAlgorithm: ::std::rc::Rc::new(match &value.source_encryption_algorithm { + SourceEncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.source_encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - DestinationEncryptionAlgorithm: ::std::rc::Rc::new(match &value.destination_encryption_algorithm { + DestinationEncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.destination_encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::encryption_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReEncryptResponse, - > + >, ) -> aws_sdk_kms::operation::re_encrypt::ReEncryptOutput { aws_sdk_kms::operation::re_encrypt::ReEncryptOutput::builder() .set_ciphertext_blob(crate::standard_library_conversions::oblob_from_dafny(dafny_value.CiphertextBlob().clone())) @@ -48,6 +48,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/recipient_info.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/recipient_info.rs index 32a25c9dd..7069f02d3 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/recipient_info.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/recipient_info.rs @@ -4,10 +4,12 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::RecipientInfo, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RecipientInfo, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RecipientInfo::RecipientInfo { - KeyEncryptionAlgorithm: ::std::rc::Rc::new(match &value.key_encryption_algorithm { + KeyEncryptionAlgorithm: ::dafny_runtime::Rc::new(match &value.key_encryption_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_encryption_mechanism::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -15,21 +17,24 @@ pub fn to_dafny( AttestationDocument: crate::standard_library_conversions::oblob_to_dafny(&value.attestation_document), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RecipientInfo, >, ) -> aws_sdk_kms::types::RecipientInfo { aws_sdk_kms::types::RecipientInfo::builder() - .set_key_encryption_algorithm(match &**dafny_value.KeyEncryptionAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::key_encryption_mechanism::from_dafny(value) - ), - _ => None, -} -) - .set_attestation_document(crate::standard_library_conversions::oblob_from_dafny(dafny_value.AttestationDocument().clone())) - .build() - + .set_key_encryption_algorithm(match &**dafny_value.KeyEncryptionAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::key_encryption_mechanism::from_dafny( + value, + ), + ), + _ => None, + }) + .set_attestation_document(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.AttestationDocument().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key.rs index 7ed2cb089..fe1d53a06 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::replicate_key::ReplicateKeyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::replicate_key::ReplicateKeyError::AlreadyExistsException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _replicate_key_request; +pub mod _replicate_key_request; - pub mod _replicate_key_response; +pub mod _replicate_key_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_request.rs index 70f0ff6c9..c938a8cda 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_request.rs @@ -4,16 +4,16 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::replicate_key::ReplicateKeyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyRequest::ReplicateKeyRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyRequest::ReplicateKeyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), ReplicaRegion: crate::standard_library_conversions::ostring_to_dafny(&value.replica_region) .Extract(), Policy: crate::standard_library_conversions::ostring_to_dafny(&value.policy), BypassPolicyLockoutSafetyCheck: crate::standard_library_conversions::obool_to_dafny(&value.bypass_policy_lockout_safety_check), Description: crate::standard_library_conversions::ostring_to_dafny(&value.description), - Tags: ::std::rc::Rc::new(match &value.tags { + Tags: ::dafny_runtime::Rc::new(match &value.tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::tag::to_dafny(e) @@ -25,11 +25,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyRequest, - > + >, ) -> aws_sdk_kms::operation::replicate_key::ReplicateKeyInput { aws_sdk_kms::operation::replicate_key::ReplicateKeyInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) @@ -41,7 +41,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) , ) ), diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_response.rs index 6e3c4e14d..91758f9d2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/replicate_key/_replicate_key_response.rs @@ -4,17 +4,17 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::replicate_key::ReplicateKeyOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyResponse::ReplicateKeyResponse { - ReplicaKeyMetadata: ::std::rc::Rc::new(match &value.replica_key_metadata { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyResponse::ReplicateKeyResponse { + ReplicaKeyMetadata: ::dafny_runtime::Rc::new(match &value.replica_key_metadata { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_metadata::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , ReplicaPolicy: crate::standard_library_conversions::ostring_to_dafny(&value.replica_policy), - ReplicaTags: ::std::rc::Rc::new(match &value.replica_tags { + ReplicaTags: ::dafny_runtime::Rc::new(match &value.replica_tags { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| crate::deps::com_amazonaws_kms::conversions::tag::to_dafny(e) @@ -26,11 +26,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ReplicateKeyResponse, - > + >, ) -> aws_sdk_kms::operation::replicate_key::ReplicateKeyOutput { aws_sdk_kms::operation::replicate_key::ReplicateKeyOutput::builder() .set_replica_key_metadata(match (*dafny_value.ReplicaKeyMetadata()).as_ref() { @@ -44,7 +44,7 @@ pub fn from_dafny( crate::r#_Wrappers_Compile::Option::Some { value } => Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(value, - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) , ) ), @@ -52,6 +52,4 @@ pub fn from_dafny( } ) .build() - - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant.rs index 155d9e305..c0ccfa23d 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::retire_grant::RetireGrantError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::retire_grant::RetireGrantError::DependencyTimeoutException(e) => @@ -38,4 +40,4 @@ pub fn to_dafny_error( } } - pub mod _retire_grant_request; +pub mod _retire_grant_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant/_retire_grant_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant/_retire_grant_request.rs index 8a82e2e18..7ba1ad2ae 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant/_retire_grant_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/retire_grant/_retire_grant_request.rs @@ -4,27 +4,35 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::retire_grant::RetireGrantInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RetireGrantRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RetireGrantRequest::RetireGrantRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RetireGrantRequest::RetireGrantRequest { GrantToken: crate::standard_library_conversions::ostring_to_dafny(&value.grant_token), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), GrantId: crate::standard_library_conversions::ostring_to_dafny(&value.grant_id), DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RetireGrantRequest, - > + >, ) -> aws_sdk_kms::operation::retire_grant::RetireGrantInput { aws_sdk_kms::operation::retire_grant::RetireGrantInput::builder() - .set_grant_token(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GrantToken().clone())) - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_grant_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.GrantId().clone())) - .set_dry_run(crate::standard_library_conversions::obool_from_dafny(dafny_value.DryRun().clone())) - .build() - .unwrap() + .set_grant_token(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GrantToken().clone(), + )) + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_grant_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.GrantId().clone(), + )) + .set_dry_run(crate::standard_library_conversions::obool_from_dafny( + dafny_value.DryRun().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant.rs index 1b0299a09..caca673fc 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::revoke_grant::RevokeGrantError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::revoke_grant::RevokeGrantError::DependencyTimeoutException(e) => @@ -36,4 +38,4 @@ pub fn to_dafny_error( } } - pub mod _revoke_grant_request; +pub mod _revoke_grant_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant/_revoke_grant_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant/_revoke_grant_request.rs index 2e415c719..dc50be22f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant/_revoke_grant_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/revoke_grant/_revoke_grant_request.rs @@ -4,25 +4,35 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::revoke_grant::RevokeGrantInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RevokeGrantRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RevokeGrantRequest::RevokeGrantRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RevokeGrantRequest::RevokeGrantRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), GrantId: crate::standard_library_conversions::ostring_to_dafny(&value.grant_id) .Extract(), DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RevokeGrantRequest, - > + >, ) -> aws_sdk_kms::operation::revoke_grant::RevokeGrantInput { aws_sdk_kms::operation::revoke_grant::RevokeGrantInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_grant_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.GrantId()) )) - .set_dry_run(crate::standard_library_conversions::obool_from_dafny(dafny_value.DryRun().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_grant_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.GrantId(), + ), + )) + .set_dry_run(crate::standard_library_conversions::obool_from_dafny( + dafny_value.DryRun().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand.rs index 719c723cd..f4612f262 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandError::ConflictException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _rotate_key_on_demand_request; +pub mod _rotate_key_on_demand_request; - pub mod _rotate_key_on_demand_response; +pub mod _rotate_key_on_demand_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_request.rs index f19281c48..b032432d7 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_request.rs @@ -4,21 +4,25 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandRequest::RotateKeyOnDemandRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandRequest::RotateKeyOnDemandRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandRequest, - > + >, ) -> aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandInput { aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_response.rs index 84f433b4f..f9ca828bd 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotate_key_on_demand/_rotate_key_on_demand_response.rs @@ -4,22 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandResponse::RotateKeyOnDemandResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandResponse::RotateKeyOnDemandResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotateKeyOnDemandResponse, - > + >, ) -> aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandOutput { aws_sdk_kms::operation::rotate_key_on_demand::RotateKeyOnDemandOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotation_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotation_type.rs index 3e4bf8059..c3a7f9970 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotation_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotation_type.rs @@ -5,14 +5,16 @@ pub fn to_dafny( value: aws_sdk_kms::types::RotationType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationType, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::RotationType::Automatic => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationType::AUTOMATIC {}, aws_sdk_kms::types::RotationType::OnDemand => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationType::ON_DEMAND {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationType, ) -> aws_sdk_kms::types::RotationType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotations_list_entry.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotations_list_entry.rs index 07b7981fc..4692b2bf6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotations_list_entry.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/rotations_list_entry.rs @@ -4,34 +4,37 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::RotationsListEntry, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationsListEntry::RotationsListEntry { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), RotationDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.rotation_date), - RotationType: ::std::rc::Rc::new(match &value.rotation_type { + RotationType: ::dafny_runtime::Rc::new(match &value.rotation_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::rotation_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::RotationsListEntry, >, ) -> aws_sdk_kms::types::RotationsListEntry { aws_sdk_kms::types::RotationsListEntry::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_rotation_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.RotationDate().clone())) - .set_rotation_type(match &**dafny_value.RotationType() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::rotation_type::from_dafny(value) - ), - _ => None, -} -) - .build() - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_rotation_date(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.RotationDate().clone(), + )) + .set_rotation_type(match &**dafny_value.RotationType() { + crate::r#_Wrappers_Compile::Option::Some { value } => { + Some(crate::deps::com_amazonaws_kms::conversions::rotation_type::from_dafny(value)) + } + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion.rs index cd4724748..9dabf37d8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionError::DependencyTimeoutException(e) => @@ -32,6 +34,6 @@ pub fn to_dafny_error( } } - pub mod _schedule_key_deletion_request; +pub mod _schedule_key_deletion_request; - pub mod _schedule_key_deletion_response; +pub mod _schedule_key_deletion_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_request.rs index 66c5b844a..dada029af 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_request.rs @@ -4,23 +4,29 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), PendingWindowInDays: crate::standard_library_conversions::oint_to_dafny(value.pending_window_in_days), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionRequest, - > + >, ) -> aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionInput { aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_pending_window_in_days(crate::standard_library_conversions::oint_from_dafny(dafny_value.PendingWindowInDays().clone())) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_pending_window_in_days(crate::standard_library_conversions::oint_from_dafny( + dafny_value.PendingWindowInDays().clone(), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_response.rs index e236de381..6d759d043 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/schedule_key_deletion/_schedule_key_deletion_response.rs @@ -4,13 +4,13 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), DeletionDate: crate::standard_library_conversions::otimestamp_to_dafny(&value.deletion_date), - KeyState: ::std::rc::Rc::new(match &value.key_state { + KeyState: ::dafny_runtime::Rc::new(match &value.key_state { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::key_state::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -18,24 +18,27 @@ pub fn to_dafny( PendingWindowInDays: crate::standard_library_conversions::oint_to_dafny(value.pending_window_in_days), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::ScheduleKeyDeletionResponse, - > + >, ) -> aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionOutput { aws_sdk_kms::operation::schedule_key_deletion::ScheduleKeyDeletionOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_deletion_date(crate::standard_library_conversions::otimestamp_from_dafny(dafny_value.DeletionDate().clone())) - .set_key_state(match &**dafny_value.KeyState() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::key_state::from_dafny(value) - ), - _ => None, -} -) - .set_pending_window_in_days(crate::standard_library_conversions::oint_from_dafny(dafny_value.PendingWindowInDays().clone())) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_deletion_date(crate::standard_library_conversions::otimestamp_from_dafny( + dafny_value.DeletionDate().clone(), + )) + .set_key_state(match &**dafny_value.KeyState() { + crate::r#_Wrappers_Compile::Option::Some { value } => { + Some(crate::deps::com_amazonaws_kms::conversions::key_state::from_dafny(value)) + } + _ => None, + }) + .set_pending_window_in_days(crate::standard_library_conversions::oint_from_dafny( + dafny_value.PendingWindowInDays().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign.rs index 25f961568..b3bee356a 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::sign::SignError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::sign::SignError::DependencyTimeoutException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _sign_request; +pub mod _sign_request; - pub mod _sign_response; +pub mod _sign_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_request.rs index 9e27f1110..1f0b4bf7f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_request.rs @@ -4,18 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::sign::SignInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignRequest::SignRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignRequest::SignRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Message: crate::standard_library_conversions::oblob_to_dafny(&value.message).Extract(), - MessageType: ::std::rc::Rc::new(match &value.message_type { + MessageType: ::dafny_runtime::Rc::new(match &value.message_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::message_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -28,11 +28,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignRequest, - > + >, ) -> aws_sdk_kms::operation::sign::SignInput { aws_sdk_kms::operation::sign::SignInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_response.rs index 704c80309..6e60c3a0c 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/sign/_sign_response.rs @@ -3,37 +3,40 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::sign::SignOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::sign::SignOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignResponse::SignResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignResponse::SignResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), Signature: crate::standard_library_conversions::oblob_to_dafny(&value.signature), - SigningAlgorithm: ::std::rc::Rc::new(match &value.signing_algorithm { + SigningAlgorithm: ::dafny_runtime::Rc::new(match &value.signing_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SignResponse, - > + >, ) -> aws_sdk_kms::operation::sign::SignOutput { aws_sdk_kms::operation::sign::SignOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_signature(crate::standard_library_conversions::oblob_from_dafny(dafny_value.Signature().clone())) - .set_signing_algorithm(match &**dafny_value.SigningAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_signature(crate::standard_library_conversions::oblob_from_dafny( + dafny_value.Signature().clone(), + )) + .set_signing_algorithm(match &**dafny_value.SigningAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny( + value, + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/signing_algorithm_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/signing_algorithm_spec.rs index 4fcc04f84..a1d5c0420 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/signing_algorithm_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/signing_algorithm_spec.rs @@ -5,8 +5,8 @@ pub fn to_dafny( value: aws_sdk_kms::types::SigningAlgorithmSpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::SigningAlgorithmSpec::RsassaPssSha256 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SigningAlgorithmSpec::RSASSA_PSS_SHA_256 {}, aws_sdk_kms::types::SigningAlgorithmSpec::RsassaPssSha384 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SigningAlgorithmSpec::RSASSA_PSS_SHA_384 {}, aws_sdk_kms::types::SigningAlgorithmSpec::RsassaPssSha512 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SigningAlgorithmSpec::RSASSA_PSS_SHA_512 {}, @@ -20,7 +20,7 @@ aws_sdk_kms::types::SigningAlgorithmSpec::Sm2Dsa => crate::r#software::amazon::c _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::SigningAlgorithmSpec, ) -> aws_sdk_kms::types::SigningAlgorithmSpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag.rs index a953e1f86..e11f97ba9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag.rs @@ -4,22 +4,33 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::Tag, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Tag, +> { + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Tag::Tag { TagKey: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.tag_key), TagValue: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.tag_value), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Tag, >, ) -> aws_sdk_kms::types::Tag { aws_sdk_kms::types::Tag::builder() - .set_tag_key(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TagKey()) )) - .set_tag_value(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TagValue()) )) - .build() - .unwrap() + .set_tag_key(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TagKey(), + ), + )) + .set_tag_value(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TagValue(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource.rs index 18d2d3026..98b3d62af 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::tag_resource::TagResourceError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::tag_resource::TagResourceError::InvalidArnException(e) => @@ -34,4 +36,4 @@ pub fn to_dafny_error( } } - pub mod _tag_resource_request; +pub mod _tag_resource_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource/_tag_resource_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource/_tag_resource_request.rs index a16b2cd4e..9fac1bf93 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource/_tag_resource_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/tag_resource/_tag_resource_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::tag_resource::TagResourceInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::TagResourceRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::TagResourceRequest::TagResourceRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::TagResourceRequest::TagResourceRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Tags: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.tags.clone().unwrap(), |e| crate::deps::com_amazonaws_kms::conversions::tag::to_dafny(e) @@ -16,16 +16,16 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::TagResourceRequest, - > + >, ) -> aws_sdk_kms::operation::tag_resource::TagResourceInput { aws_sdk_kms::operation::tag_resource::TagResourceInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) .set_tags(Some( ::dafny_runtime::dafny_runtime_conversions::dafny_sequence_to_vec(dafny_value.Tags(), - |e: &::std::rc::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) + |e: &::dafny_runtime::Rc| crate::deps::com_amazonaws_kms::conversions::tag::from_dafny(e.clone()) , ) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource.rs index 144986093..95e056ee1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::untag_resource::UntagResourceError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::untag_resource::UntagResourceError::InvalidArnException(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _untag_resource_request; +pub mod _untag_resource_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource/_untag_resource_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource/_untag_resource_request.rs index 9ff8af079..90caacbb9 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource/_untag_resource_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/untag_resource/_untag_resource_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::untag_resource::UntagResourceInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UntagResourceRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UntagResourceRequest::UntagResourceRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UntagResourceRequest::UntagResourceRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), TagKeys: ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(&value.tag_keys.clone().unwrap(), |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -15,11 +15,11 @@ pub fn to_dafny( , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UntagResourceRequest, - > + >, ) -> aws_sdk_kms::operation::untag_resource::UntagResourceInput { aws_sdk_kms::operation::untag_resource::UntagResourceInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias.rs index 3b5a2fad6..7f1b1e4f6 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::update_alias::UpdateAliasError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::update_alias::UpdateAliasError::DependencyTimeoutException(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _update_alias_request; +pub mod _update_alias_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias/_update_alias_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias/_update_alias_request.rs index 116d1eecc..118922df8 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias/_update_alias_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_alias/_update_alias_request.rs @@ -4,23 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::update_alias::UpdateAliasInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateAliasRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateAliasRequest::UpdateAliasRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateAliasRequest::UpdateAliasRequest { AliasName: crate::standard_library_conversions::ostring_to_dafny(&value.alias_name) .Extract(), TargetKeyId: crate::standard_library_conversions::ostring_to_dafny(&value.target_key_id) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateAliasRequest, - > + >, ) -> aws_sdk_kms::operation::update_alias::UpdateAliasInput { aws_sdk_kms::operation::update_alias::UpdateAliasInput::builder() - .set_alias_name(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AliasName()) )) - .set_target_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.TargetKeyId()) )) - .build() - .unwrap() + .set_alias_name(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AliasName(), + ), + )) + .set_target_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.TargetKeyId(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store.rs index def367548..fb4256fd4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreError::CloudHsmClusterInvalidConfigurationException(e) => @@ -56,6 +58,6 @@ pub fn to_dafny_error( } } - pub mod _update_custom_key_store_request; +pub mod _update_custom_key_store_request; - pub mod _update_custom_key_store_response; +pub mod _update_custom_key_store_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_request.rs index 241902386..f4c022db4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_request.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest { CustomKeyStoreId: crate::standard_library_conversions::ostring_to_dafny(&value.custom_key_store_id) .Extract(), NewCustomKeyStoreName: crate::standard_library_conversions::ostring_to_dafny(&value.new_custom_key_store_name), KeyStorePassword: crate::standard_library_conversions::ostring_to_dafny(&value.key_store_password), @@ -15,23 +15,23 @@ pub fn to_dafny( XksProxyUriEndpoint: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_uri_endpoint), XksProxyUriPath: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_uri_path), XksProxyVpcEndpointServiceName: crate::standard_library_conversions::ostring_to_dafny(&value.xks_proxy_vpc_endpoint_service_name), - XksProxyAuthenticationCredential: ::std::rc::Rc::new(match &value.xks_proxy_authentication_credential { + XksProxyAuthenticationCredential: ::dafny_runtime::Rc::new(match &value.xks_proxy_authentication_credential { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_authentication_credential_type::to_dafny(x) }, None => crate::_Wrappers_Compile::Option::None { } }) , - XksProxyConnectivity: ::std::rc::Rc::new(match &value.xks_proxy_connectivity { + XksProxyConnectivity: ::dafny_runtime::Rc::new(match &value.xks_proxy_connectivity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_connectivity_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreRequest, - > + >, ) -> aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreInput { aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreInput::builder() .set_custom_key_store_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.CustomKeyStoreId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_response.rs index 7e2784715..b12cda4bf 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_custom_key_store/_update_custom_key_store_response.rs @@ -4,22 +4,18 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreOutput -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreResponse, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse { }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateCustomKeyStoreResponse, - > + >, ) -> aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreOutput { - aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreOutput::builder() - - .build() - - + aws_sdk_kms::operation::update_custom_key_store::UpdateCustomKeyStoreOutput::builder().build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description.rs index aec00f41d..58b9e4b9f 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::update_key_description::UpdateKeyDescriptionError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::update_key_description::UpdateKeyDescriptionError::DependencyTimeoutException(e) => @@ -32,4 +34,4 @@ pub fn to_dafny_error( } } - pub mod _update_key_description_request; +pub mod _update_key_description_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description/_update_key_description_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description/_update_key_description_request.rs index c35164e95..235e25e87 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description/_update_key_description_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_key_description/_update_key_description_request.rs @@ -4,23 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::update_key_description::UpdateKeyDescriptionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateKeyDescriptionRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Description: crate::standard_library_conversions::ostring_to_dafny(&value.description) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdateKeyDescriptionRequest, - > + >, ) -> aws_sdk_kms::operation::update_key_description::UpdateKeyDescriptionInput { aws_sdk_kms::operation::update_key_description::UpdateKeyDescriptionInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_description(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.Description()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_description(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.Description(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region.rs index 69d1dda0e..d02332d17 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::update_primary_region::UpdatePrimaryRegionError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::update_primary_region::UpdatePrimaryRegionError::DisabledException(e) => @@ -34,4 +36,4 @@ pub fn to_dafny_error( } } - pub mod _update_primary_region_request; +pub mod _update_primary_region_request; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region/_update_primary_region_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region/_update_primary_region_request.rs index aa5707f2f..6d9737656 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region/_update_primary_region_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/update_primary_region/_update_primary_region_request.rs @@ -4,23 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::update_primary_region::UpdatePrimaryRegionInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdatePrimaryRegionRequest, >{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), PrimaryRegion: crate::standard_library_conversions::ostring_to_dafny(&value.primary_region) .Extract(), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::UpdatePrimaryRegionRequest, - > + >, ) -> aws_sdk_kms::operation::update_primary_region::UpdatePrimaryRegionInput { aws_sdk_kms::operation::update_primary_region::UpdatePrimaryRegionInput::builder() - .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) - .set_primary_region(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.PrimaryRegion()) )) - .build() - .unwrap() + .set_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.KeyId(), + ), + )) + .set_primary_region(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.PrimaryRegion(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify.rs index 94be57576..032c18c01 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::verify::VerifyError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::verify::VerifyError::DependencyTimeoutException(e) => @@ -42,6 +44,6 @@ pub fn to_dafny_error( } } - pub mod _verify_request; +pub mod _verify_request; - pub mod _verify_response; +pub mod _verify_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_request.rs index ec4d3d576..dcf751b0b 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_request.rs @@ -4,20 +4,20 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::verify::VerifyInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyRequest::VerifyRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyRequest::VerifyRequest { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), Message: crate::standard_library_conversions::oblob_to_dafny(&value.message).Extract(), - MessageType: ::std::rc::Rc::new(match &value.message_type { + MessageType: ::dafny_runtime::Rc::new(match &value.message_type { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::message_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , Signature: crate::standard_library_conversions::oblob_to_dafny(&value.signature).Extract(), SigningAlgorithm: crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::to_dafny(value.signing_algorithm.clone().unwrap()), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -29,11 +29,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyRequest, - > + >, ) -> aws_sdk_kms::operation::verify::VerifyInput { aws_sdk_kms::operation::verify::VerifyInput::builder() .set_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.KeyId()) )) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_response.rs index 35a5e0398..89129da08 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify/_verify_response.rs @@ -3,37 +3,40 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::verify::VerifyOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::verify::VerifyOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyResponse::VerifyResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyResponse::VerifyResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), SignatureValid: crate::standard_library_conversions::obool_to_dafny(&Some(value.signature_valid)), - SigningAlgorithm: ::std::rc::Rc::new(match &value.signing_algorithm { + SigningAlgorithm: ::dafny_runtime::Rc::new(match &value.signing_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyResponse, - > + >, ) -> aws_sdk_kms::operation::verify::VerifyOutput { aws_sdk_kms::operation::verify::VerifyOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_signature_valid(crate::standard_library_conversions::obool_from_dafny(dafny_value.SignatureValid().clone())) - .set_signing_algorithm(match &**dafny_value.SigningAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_signature_valid(crate::standard_library_conversions::obool_from_dafny( + dafny_value.SignatureValid().clone(), + )) + .set_signing_algorithm(match &**dafny_value.SigningAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::signing_algorithm_spec::from_dafny( + value, + ), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac.rs index 465c0eebe..60f66af32 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac.rs @@ -7,7 +7,9 @@ pub fn to_dafny_error( aws_sdk_kms::operation::verify_mac::VerifyMacError, ::aws_smithy_runtime_api::client::orchestrator::HttpResponse, >, -) -> ::std::rc::Rc { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::Error, +> { match value { aws_sdk_kms::error::SdkError::ServiceError(service_error) => match service_error.err() { aws_sdk_kms::operation::verify_mac::VerifyMacError::DisabledException(e) => @@ -40,6 +42,6 @@ pub fn to_dafny_error( } } - pub mod _verify_mac_request; +pub mod _verify_mac_request; - pub mod _verify_mac_response; +pub mod _verify_mac_response; diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_request.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_request.rs index 76068c7f5..48aef8281 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_request.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_request.rs @@ -4,15 +4,15 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::operation::verify_mac::VerifyMacInput, -) -> ::std::rc::Rc< +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacRequest, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacRequest::VerifyMacRequest { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacRequest::VerifyMacRequest { Message: crate::standard_library_conversions::oblob_to_dafny(&value.message).Extract(), KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id) .Extract(), MacAlgorithm: crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::to_dafny(value.mac_algorithm.clone().unwrap()), Mac: crate::standard_library_conversions::oblob_to_dafny(&value.mac).Extract(), - GrantTokens: ::std::rc::Rc::new(match &value.grant_tokens { + GrantTokens: ::dafny_runtime::Rc::new(match &value.grant_tokens { Some(x) => crate::r#_Wrappers_Compile::Option::Some { value : ::dafny_runtime::dafny_runtime_conversions::vec_to_dafny_sequence(x, |e| dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&e), @@ -24,11 +24,11 @@ pub fn to_dafny( DryRun: crate::standard_library_conversions::obool_to_dafny(&value.dry_run), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacRequest, - > + >, ) -> aws_sdk_kms::operation::verify_mac::VerifyMacInput { aws_sdk_kms::operation::verify_mac::VerifyMacInput::builder() .set_message(Some(crate::standard_library_conversions::blob_from_dafny(dafny_value.Message().clone()))) diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_response.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_response.rs index 5aa7abbf4..baefdfe68 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_response.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/verify_mac/_verify_mac_response.rs @@ -3,37 +3,38 @@ // Do not modify this file. This file is machine generated, and any changes to it will be overwritten. #[allow(dead_code)] pub fn to_dafny( - value: &aws_sdk_kms::operation::verify_mac::VerifyMacOutput -) -> ::std::rc::Rc< + value: &aws_sdk_kms::operation::verify_mac::VerifyMacOutput, +) -> ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacResponse, ->{ - ::std::rc::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacResponse::VerifyMacResponse { +> { + ::dafny_runtime::Rc::new(crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacResponse::VerifyMacResponse { KeyId: crate::standard_library_conversions::ostring_to_dafny(&value.key_id), MacValid: crate::standard_library_conversions::obool_to_dafny(&Some(value.mac_valid)), - MacAlgorithm: ::std::rc::Rc::new(match &value.mac_algorithm { + MacAlgorithm: ::dafny_runtime::Rc::new(match &value.mac_algorithm { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) , }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::VerifyMacResponse, - > + >, ) -> aws_sdk_kms::operation::verify_mac::VerifyMacOutput { aws_sdk_kms::operation::verify_mac::VerifyMacOutput::builder() - .set_key_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.KeyId().clone())) - .set_mac_valid(crate::standard_library_conversions::obool_from_dafny(dafny_value.MacValid().clone())) - .set_mac_algorithm(match &**dafny_value.MacAlgorithm() { - crate::r#_Wrappers_Compile::Option::Some { value } => Some( - crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(value) - ), - _ => None, -} -) - .build() - - + .set_key_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.KeyId().clone(), + )) + .set_mac_valid(crate::standard_library_conversions::obool_from_dafny( + dafny_value.MacValid().clone(), + )) + .set_mac_algorithm(match &**dafny_value.MacAlgorithm() { + crate::r#_Wrappers_Compile::Option::Some { value } => Some( + crate::deps::com_amazonaws_kms::conversions::mac_algorithm_spec::from_dafny(value), + ), + _ => None, + }) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/wrapping_key_spec.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/wrapping_key_spec.rs index a805e0bd0..03437d0c2 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/wrapping_key_spec.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/wrapping_key_spec.rs @@ -5,8 +5,10 @@ pub fn to_dafny( value: aws_sdk_kms::types::WrappingKeySpec, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc< + crate::r#software::amazon::cryptography::services::kms::internaldafny::types::WrappingKeySpec, +> { + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::WrappingKeySpec::Rsa2048 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::WrappingKeySpec::RSA_2048 {}, aws_sdk_kms::types::WrappingKeySpec::Rsa3072 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::WrappingKeySpec::RSA_3072 {}, aws_sdk_kms::types::WrappingKeySpec::Rsa4096 => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::WrappingKeySpec::RSA_4096 {}, @@ -14,7 +16,7 @@ aws_sdk_kms::types::WrappingKeySpec::Sm2 => crate::r#software::amazon::cryptogra _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::WrappingKeySpec, ) -> aws_sdk_kms::types::WrappingKeySpec { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_key_configuration_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_key_configuration_type.rs index f367c4b9a..449f65600 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_key_configuration_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_key_configuration_type.rs @@ -4,20 +4,22 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::XksKeyConfigurationType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksKeyConfigurationType::XksKeyConfigurationType { Id: crate::standard_library_conversions::ostring_to_dafny(&value.id), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksKeyConfigurationType, >, ) -> aws_sdk_kms::types::XksKeyConfigurationType { aws_sdk_kms::types::XksKeyConfigurationType::builder() - .set_id(crate::standard_library_conversions::ostring_from_dafny(dafny_value.Id().clone())) - .build() - + .set_id(crate::standard_library_conversions::ostring_from_dafny( + dafny_value.Id().clone(), + )) + .build() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_authentication_credential_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_authentication_credential_type.rs index 92e7821cf..5e7448ace 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_authentication_credential_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_authentication_credential_type.rs @@ -4,22 +4,31 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::XksProxyAuthenticationCredentialType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType { AccessKeyId: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.access_key_id), RawSecretAccessKey: dafny_runtime::dafny_runtime_conversions::unicode_chars_false::string_to_dafny_string(&value.raw_secret_access_key), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyAuthenticationCredentialType, >, ) -> aws_sdk_kms::types::XksProxyAuthenticationCredentialType { aws_sdk_kms::types::XksProxyAuthenticationCredentialType::builder() - .set_access_key_id(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.AccessKeyId()) )) - .set_raw_secret_access_key(Some( dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string(dafny_value.RawSecretAccessKey()) )) - .build() - .unwrap() + .set_access_key_id(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.AccessKeyId(), + ), + )) + .set_raw_secret_access_key(Some( + dafny_runtime::dafny_runtime_conversions::unicode_chars_false::dafny_string_to_string( + dafny_value.RawSecretAccessKey(), + ), + )) + .build() + .unwrap() } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_configuration_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_configuration_type.rs index 14932c103..9a3742201 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_configuration_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_configuration_type.rs @@ -4,10 +4,10 @@ #[allow(dead_code)] pub fn to_dafny( value: &aws_sdk_kms::types::XksProxyConfigurationType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new( +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new( crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyConfigurationType::XksProxyConfigurationType { - Connectivity: ::std::rc::Rc::new(match &value.connectivity { + Connectivity: ::dafny_runtime::Rc::new(match &value.connectivity { Some(x) => crate::_Wrappers_Compile::Option::Some { value: crate::deps::com_amazonaws_kms::conversions::xks_proxy_connectivity_type::to_dafny(x.clone()) }, None => crate::_Wrappers_Compile::Option::None { } }) @@ -18,9 +18,10 @@ pub fn to_dafny( VpcEndpointServiceName: crate::standard_library_conversions::ostring_to_dafny(&value.vpc_endpoint_service_name), } ) -} #[allow(dead_code)] +} +#[allow(dead_code)] pub fn from_dafny( - dafny_value: ::std::rc::Rc< + dafny_value: ::dafny_runtime::Rc< crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyConfigurationType, >, ) -> aws_sdk_kms::types::XksProxyConfigurationType { @@ -37,5 +38,4 @@ pub fn from_dafny( .set_uri_path(crate::standard_library_conversions::ostring_from_dafny(dafny_value.UriPath().clone())) .set_vpc_endpoint_service_name(crate::standard_library_conversions::ostring_from_dafny(dafny_value.VpcEndpointServiceName().clone())) .build() - } diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_connectivity_type.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_connectivity_type.rs index effc597e0..2a49b25d4 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_connectivity_type.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/conversions/xks_proxy_connectivity_type.rs @@ -5,14 +5,14 @@ pub fn to_dafny( value: aws_sdk_kms::types::XksProxyConnectivityType, -) -> ::std::rc::Rc{ - ::std::rc::Rc::new(match value { +) -> ::dafny_runtime::Rc{ + ::dafny_runtime::Rc::new(match value { aws_sdk_kms::types::XksProxyConnectivityType::PublicEndpoint => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyConnectivityType::PUBLIC_ENDPOINT {}, aws_sdk_kms::types::XksProxyConnectivityType::VpcEndpointService => crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyConnectivityType::VPC_ENDPOINT_SERVICE {}, _ => panic!("Unknown enum variant: {}", value), }) } - #[allow(dead_code)] +#[allow(dead_code)] pub fn from_dafny( dafny_value: &crate::r#software::amazon::cryptography::services::kms::internaldafny::types::XksProxyConnectivityType, ) -> aws_sdk_kms::types::XksProxyConnectivityType { diff --git a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/types/error.rs b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/types/error.rs index b2e572bb0..c366dfcf1 100644 --- a/releases/rust/db_esdk/src/deps/com_amazonaws_kms/types/error.rs +++ b/releases/rust/db_esdk/src/deps/com_amazonaws_kms/types/error.rs @@ -4,201 +4,201 @@ #[derive(::std::clone::Clone, ::std::fmt::Debug, ::std::cmp::PartialEq)] pub enum Error { AlreadyExistsException { - error: aws_sdk_kms::types::error::AlreadyExistsException, -}, + error: aws_sdk_kms::types::error::AlreadyExistsException, + }, -CloudHsmClusterInUseException { - error: aws_sdk_kms::types::error::CloudHsmClusterInUseException, -}, + CloudHsmClusterInUseException { + error: aws_sdk_kms::types::error::CloudHsmClusterInUseException, + }, -CloudHsmClusterInvalidConfigurationException { - error: aws_sdk_kms::types::error::CloudHsmClusterInvalidConfigurationException, -}, + CloudHsmClusterInvalidConfigurationException { + error: aws_sdk_kms::types::error::CloudHsmClusterInvalidConfigurationException, + }, -CloudHsmClusterNotActiveException { - error: aws_sdk_kms::types::error::CloudHsmClusterNotActiveException, -}, + CloudHsmClusterNotActiveException { + error: aws_sdk_kms::types::error::CloudHsmClusterNotActiveException, + }, -CloudHsmClusterNotFoundException { - error: aws_sdk_kms::types::error::CloudHsmClusterNotFoundException, -}, + CloudHsmClusterNotFoundException { + error: aws_sdk_kms::types::error::CloudHsmClusterNotFoundException, + }, -CloudHsmClusterNotRelatedException { - error: aws_sdk_kms::types::error::CloudHsmClusterNotRelatedException, -}, + CloudHsmClusterNotRelatedException { + error: aws_sdk_kms::types::error::CloudHsmClusterNotRelatedException, + }, -ConflictException { - error: aws_sdk_kms::types::error::ConflictException, -}, + ConflictException { + error: aws_sdk_kms::types::error::ConflictException, + }, -CustomKeyStoreHasCmKsException { - error: aws_sdk_kms::types::error::CustomKeyStoreHasCmKsException, -}, + CustomKeyStoreHasCmKsException { + error: aws_sdk_kms::types::error::CustomKeyStoreHasCmKsException, + }, -CustomKeyStoreInvalidStateException { - error: aws_sdk_kms::types::error::CustomKeyStoreInvalidStateException, -}, + CustomKeyStoreInvalidStateException { + error: aws_sdk_kms::types::error::CustomKeyStoreInvalidStateException, + }, -CustomKeyStoreNameInUseException { - error: aws_sdk_kms::types::error::CustomKeyStoreNameInUseException, -}, + CustomKeyStoreNameInUseException { + error: aws_sdk_kms::types::error::CustomKeyStoreNameInUseException, + }, -CustomKeyStoreNotFoundException { - error: aws_sdk_kms::types::error::CustomKeyStoreNotFoundException, -}, + CustomKeyStoreNotFoundException { + error: aws_sdk_kms::types::error::CustomKeyStoreNotFoundException, + }, -DependencyTimeoutException { - error: aws_sdk_kms::types::error::DependencyTimeoutException, -}, + DependencyTimeoutException { + error: aws_sdk_kms::types::error::DependencyTimeoutException, + }, -DisabledException { - error: aws_sdk_kms::types::error::DisabledException, -}, + DisabledException { + error: aws_sdk_kms::types::error::DisabledException, + }, -DryRunOperationException { - error: aws_sdk_kms::types::error::DryRunOperationException, -}, + DryRunOperationException { + error: aws_sdk_kms::types::error::DryRunOperationException, + }, -ExpiredImportTokenException { - error: aws_sdk_kms::types::error::ExpiredImportTokenException, -}, + ExpiredImportTokenException { + error: aws_sdk_kms::types::error::ExpiredImportTokenException, + }, -IncorrectKeyException { - error: aws_sdk_kms::types::error::IncorrectKeyException, -}, + IncorrectKeyException { + error: aws_sdk_kms::types::error::IncorrectKeyException, + }, -IncorrectKeyMaterialException { - error: aws_sdk_kms::types::error::IncorrectKeyMaterialException, -}, + IncorrectKeyMaterialException { + error: aws_sdk_kms::types::error::IncorrectKeyMaterialException, + }, -IncorrectTrustAnchorException { - error: aws_sdk_kms::types::error::IncorrectTrustAnchorException, -}, + IncorrectTrustAnchorException { + error: aws_sdk_kms::types::error::IncorrectTrustAnchorException, + }, -InvalidAliasNameException { - error: aws_sdk_kms::types::error::InvalidAliasNameException, -}, + InvalidAliasNameException { + error: aws_sdk_kms::types::error::InvalidAliasNameException, + }, -InvalidArnException { - error: aws_sdk_kms::types::error::InvalidArnException, -}, + InvalidArnException { + error: aws_sdk_kms::types::error::InvalidArnException, + }, -InvalidCiphertextException { - error: aws_sdk_kms::types::error::InvalidCiphertextException, -}, + InvalidCiphertextException { + error: aws_sdk_kms::types::error::InvalidCiphertextException, + }, -InvalidGrantIdException { - error: aws_sdk_kms::types::error::InvalidGrantIdException, -}, + InvalidGrantIdException { + error: aws_sdk_kms::types::error::InvalidGrantIdException, + }, -InvalidGrantTokenException { - error: aws_sdk_kms::types::error::InvalidGrantTokenException, -}, + InvalidGrantTokenException { + error: aws_sdk_kms::types::error::InvalidGrantTokenException, + }, -InvalidImportTokenException { - error: aws_sdk_kms::types::error::InvalidImportTokenException, -}, + InvalidImportTokenException { + error: aws_sdk_kms::types::error::InvalidImportTokenException, + }, -InvalidKeyUsageException { - error: aws_sdk_kms::types::error::InvalidKeyUsageException, -}, + InvalidKeyUsageException { + error: aws_sdk_kms::types::error::InvalidKeyUsageException, + }, -InvalidMarkerException { - error: aws_sdk_kms::types::error::InvalidMarkerException, -}, + InvalidMarkerException { + error: aws_sdk_kms::types::error::InvalidMarkerException, + }, -KeyUnavailableException { - error: aws_sdk_kms::types::error::KeyUnavailableException, -}, + KeyUnavailableException { + error: aws_sdk_kms::types::error::KeyUnavailableException, + }, -KmsInternalException { - error: aws_sdk_kms::types::error::KmsInternalException, -}, + KmsInternalException { + error: aws_sdk_kms::types::error::KmsInternalException, + }, -KmsInvalidMacException { - error: aws_sdk_kms::types::error::KmsInvalidMacException, -}, + KmsInvalidMacException { + error: aws_sdk_kms::types::error::KmsInvalidMacException, + }, -KmsInvalidSignatureException { - error: aws_sdk_kms::types::error::KmsInvalidSignatureException, -}, + KmsInvalidSignatureException { + error: aws_sdk_kms::types::error::KmsInvalidSignatureException, + }, -KmsInvalidStateException { - error: aws_sdk_kms::types::error::KmsInvalidStateException, -}, + KmsInvalidStateException { + error: aws_sdk_kms::types::error::KmsInvalidStateException, + }, -LimitExceededException { - error: aws_sdk_kms::types::error::LimitExceededException, -}, + LimitExceededException { + error: aws_sdk_kms::types::error::LimitExceededException, + }, -MalformedPolicyDocumentException { - error: aws_sdk_kms::types::error::MalformedPolicyDocumentException, -}, + MalformedPolicyDocumentException { + error: aws_sdk_kms::types::error::MalformedPolicyDocumentException, + }, -NotFoundException { - error: aws_sdk_kms::types::error::NotFoundException, -}, + NotFoundException { + error: aws_sdk_kms::types::error::NotFoundException, + }, -TagException { - error: aws_sdk_kms::types::error::TagException, -}, + TagException { + error: aws_sdk_kms::types::error::TagException, + }, -UnsupportedOperationException { - error: aws_sdk_kms::types::error::UnsupportedOperationException, -}, + UnsupportedOperationException { + error: aws_sdk_kms::types::error::UnsupportedOperationException, + }, -XksKeyAlreadyInUseException { - error: aws_sdk_kms::types::error::XksKeyAlreadyInUseException, -}, + XksKeyAlreadyInUseException { + error: aws_sdk_kms::types::error::XksKeyAlreadyInUseException, + }, -XksKeyInvalidConfigurationException { - error: aws_sdk_kms::types::error::XksKeyInvalidConfigurationException, -}, + XksKeyInvalidConfigurationException { + error: aws_sdk_kms::types::error::XksKeyInvalidConfigurationException, + }, -XksKeyNotFoundException { - error: aws_sdk_kms::types::error::XksKeyNotFoundException, -}, + XksKeyNotFoundException { + error: aws_sdk_kms::types::error::XksKeyNotFoundException, + }, -XksProxyIncorrectAuthenticationCredentialException { - error: aws_sdk_kms::types::error::XksProxyIncorrectAuthenticationCredentialException, -}, + XksProxyIncorrectAuthenticationCredentialException { + error: aws_sdk_kms::types::error::XksProxyIncorrectAuthenticationCredentialException, + }, -XksProxyInvalidConfigurationException { - error: aws_sdk_kms::types::error::XksProxyInvalidConfigurationException, -}, + XksProxyInvalidConfigurationException { + error: aws_sdk_kms::types::error::XksProxyInvalidConfigurationException, + }, -XksProxyInvalidResponseException { - error: aws_sdk_kms::types::error::XksProxyInvalidResponseException, -}, + XksProxyInvalidResponseException { + error: aws_sdk_kms::types::error::XksProxyInvalidResponseException, + }, -XksProxyUriEndpointInUseException { - error: aws_sdk_kms::types::error::XksProxyUriEndpointInUseException, -}, + XksProxyUriEndpointInUseException { + error: aws_sdk_kms::types::error::XksProxyUriEndpointInUseException, + }, -XksProxyUriInUseException { - error: aws_sdk_kms::types::error::XksProxyUriInUseException, -}, + XksProxyUriInUseException { + error: aws_sdk_kms::types::error::XksProxyUriInUseException, + }, -XksProxyUriUnreachableException { - error: aws_sdk_kms::types::error::XksProxyUriUnreachableException, -}, + XksProxyUriUnreachableException { + error: aws_sdk_kms::types::error::XksProxyUriUnreachableException, + }, -XksProxyVpcEndpointServiceInUseException { - error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInUseException, -}, + XksProxyVpcEndpointServiceInUseException { + error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInUseException, + }, -XksProxyVpcEndpointServiceInvalidConfigurationException { - error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInvalidConfigurationException, -}, + XksProxyVpcEndpointServiceInvalidConfigurationException { + error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceInvalidConfigurationException, + }, -XksProxyVpcEndpointServiceNotFoundException { - error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceNotFoundException, -}, + XksProxyVpcEndpointServiceNotFoundException { + error: aws_sdk_kms::types::error::XksProxyVpcEndpointServiceNotFoundException, + }, Opaque { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, }, OpaqueWithText { - obj: ::dafny_runtime::Object, + obj: ::dafny_runtime::Object<::dafny_runtime::DynAny>, objMessage: ::std::string::String, }, } diff --git a/releases/rust/db_esdk/src/digest.rs b/releases/rust/db_esdk/src/digest.rs index f3a01ce67..10dffd979 100644 --- a/releases/rust/db_esdk/src/digest.rs +++ b/releases/rust/db_esdk/src/digest.rs @@ -12,12 +12,14 @@ use software::amazon::cryptography::primitives::internaldafny::types::DigestAlgo impl crate::ExternDigest::_default { #[allow(non_snake_case)] pub fn Digest( - digest_algorithm: &::std::rc::Rc, + digest_algorithm: &::dafny_runtime::Rc, message: &::dafny_runtime::Sequence, - ) -> ::std::rc::Rc< + ) -> ::dafny_runtime::Rc< _Wrappers_Compile::Result< ::dafny_runtime::Sequence, - ::std::rc::Rc, + ::dafny_runtime::Rc< + software::amazon::cryptography::primitives::internaldafny::types::Error, + >, >, > { let algorithm = match **digest_algorithm { @@ -27,7 +29,7 @@ impl crate::ExternDigest::_default { }; let message_vec: Vec = message.iter().collect(); let result = digest::digest(algorithm, &message_vec); - ::std::rc::Rc::new(_Wrappers_Compile::Result::Success { + ::dafny_runtime::Rc::new(_Wrappers_Compile::Result::Success { value: result.as_ref().iter().cloned().collect(), }) } diff --git a/releases/rust/db_esdk/src/ecdh.rs b/releases/rust/db_esdk/src/ecdh.rs index eb44091cd..5067dcf28 100644 --- a/releases/rust/db_esdk/src/ecdh.rs +++ b/releases/rust/db_esdk/src/ecdh.rs @@ -9,7 +9,7 @@ #[allow(non_snake_case)] pub mod ECDH { use crate::software::amazon::cryptography::primitives::internaldafny::types::Error as DafnyError; - use std::rc::Rc; + use dafny_runtime::Rc; fn error(s: &str) -> Rc { Rc::new(DafnyError::AwsCryptographicPrimitivesError { @@ -23,7 +23,7 @@ pub mod ECDH { use crate::software::amazon::cryptography::primitives::internaldafny::types::Error as DafnyError; use crate::*; use aws_lc_sys; - use std::rc::Rc; + use dafny_runtime::Rc; fn get_nid(x: &ECDHCurveSpec) -> i32 { match x { @@ -340,7 +340,7 @@ pub mod ECDH { } let ec_key = unsafe { EVP_PKEY_get0_EC_KEY(evp_pkey) }; - if unsafe {aws_lc_sys::EC_KEY_check_fips(ec_key)} != 1 { + if unsafe { aws_lc_sys::EC_KEY_check_fips(ec_key) } != 1 { return Err(INVALID_KEY.to_string()); } let ec_group = unsafe { EC_KEY_get0_group(ec_key) }; @@ -422,7 +422,7 @@ pub mod ECDH { use crate::software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec; use crate::software::amazon::cryptography::primitives::internaldafny::types::Error as DafnyError; use crate::*; - use std::rc::Rc; + use dafny_runtime::Rc; pub fn agree( curve_algorithm: &ECDHCurveSpec, @@ -472,7 +472,7 @@ pub mod ECDH { use crate::*; use aws_lc_rs::encoding::AsDer; use aws_lc_rs::encoding::EcPrivateKeyRfc5915Der; - use std::rc::Rc; + use dafny_runtime::Rc; fn ecdsa_key_gen(alg: &ECDHCurveSpec) -> Result<(Vec, Vec), String> { let private_key = @@ -518,7 +518,7 @@ pub mod ECDH { use super::*; use crate::software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec; use crate::*; - use std::rc::Rc; + use dafny_runtime::Rc; #[test] fn test_generate() { diff --git a/releases/rust/db_esdk/src/ecdsa.rs b/releases/rust/db_esdk/src/ecdsa.rs index ae4a51b7b..b31307f09 100644 --- a/releases/rust/db_esdk/src/ecdsa.rs +++ b/releases/rust/db_esdk/src/ecdsa.rs @@ -18,7 +18,7 @@ pub mod Signature { use aws_lc_rs::signature::EcdsaVerificationAlgorithm; use aws_lc_rs::signature::KeyPair; use aws_lc_rs::signature::UnparsedPublicKey; - use std::rc::Rc; + use dafny_runtime::Rc; fn error(s: &str) -> Rc { Rc::new(DafnyError::AwsCryptographicPrimitivesError { @@ -228,7 +228,7 @@ pub mod Signature { #[cfg(test)] mod tests { use super::*; - use std::rc::Rc; + use dafny_runtime::Rc; #[test] fn test_generate() { diff --git a/releases/rust/db_esdk/src/error/sealed_unhandled.rs b/releases/rust/db_esdk/src/error/sealed_unhandled.rs index eae800729..547b46713 100644 --- a/releases/rust/db_esdk/src/error/sealed_unhandled.rs +++ b/releases/rust/db_esdk/src/error/sealed_unhandled.rs @@ -27,6 +27,6 @@ pub struct Unhandled { pub(crate) meta: ::aws_smithy_types::error::metadata::ErrorMetadata, } -impl UpcastObject for Unhandled { - ::dafny_runtime::UpcastObjectFn!(dyn ::std::any::Any); +impl UpcastObject<::dafny_runtime::DynAny> for Unhandled { + ::dafny_runtime::UpcastObjectFn!(::dafny_runtime::DynAny); } diff --git a/releases/rust/db_esdk/src/hmac.rs b/releases/rust/db_esdk/src/hmac.rs index a336060f5..3e33c9afb 100644 --- a/releases/rust/db_esdk/src/hmac.rs +++ b/releases/rust/db_esdk/src/hmac.rs @@ -21,20 +21,22 @@ fn convert_algorithm(input: &DigestAlgorithm) -> hmac::Algorithm { impl crate::HMAC::_default { #[allow(non_snake_case)] pub fn Digest( - input: &::std::rc::Rc< + input: &::dafny_runtime::Rc< crate::software::amazon::cryptography::primitives::internaldafny::types::HMacInput, >, - ) -> ::std::rc::Rc< + ) -> ::dafny_runtime::Rc< _Wrappers_Compile::Result< ::dafny_runtime::Sequence, - ::std::rc::Rc, + ::dafny_runtime::Rc< + software::amazon::cryptography::primitives::internaldafny::types::Error, + >, >, > { let key_vec: Vec = input.key().iter().collect(); let the_key = hmac::Key::new(convert_algorithm(input.digestAlgorithm()), &key_vec); let message_vec: Vec = input.message().iter().collect(); let result = hmac::sign(&the_key, &message_vec); - ::std::rc::Rc::new(_Wrappers_Compile::Result::Success { + ::dafny_runtime::Rc::new(_Wrappers_Compile::Result::Success { value: result.as_ref().iter().cloned().collect(), }) } @@ -43,8 +45,8 @@ impl crate::HMAC::_default { #[allow(non_snake_case)] pub mod HMAC { use crate::*; + use ::dafny_runtime::RefCell; use aws_lc_rs::hmac; - use std::cell::RefCell; #[allow(non_camel_case_types)] pub struct _default {} @@ -58,33 +60,33 @@ pub mod HMAC { inner: RefCell, } - impl dafny_runtime::UpcastObject for HMac { - dafny_runtime::UpcastObjectFn!(dyn std::any::Any); + impl dafny_runtime::UpcastObject for HMac { + dafny_runtime::UpcastObjectFn!(dafny_runtime::DynAny); } impl HMac { pub fn Init(&self, salt: &::dafny_runtime::Sequence) { let salt: Vec = salt.iter().collect(); - self.inner.borrow_mut().key = Some(hmac::Key::new(self.algorithm, &salt)); + self.inner.lock().unwrap().key = Some(hmac::Key::new(self.algorithm, &salt)); let context = Some(hmac::Context::with_key( - self.inner.borrow().key.as_ref().unwrap(), + self.inner.lock().unwrap().key.as_ref().unwrap(), )); - self.inner.borrow_mut().context = context; + self.inner.lock().unwrap().context = context; } pub fn re_init(&self) { let context = Some(hmac::Context::with_key( - self.inner.borrow().key.as_ref().unwrap(), + self.inner.lock().unwrap().key.as_ref().unwrap(), )); - self.inner.borrow_mut().context = context; + self.inner.lock().unwrap().context = context; } pub fn Build( - input: &::std::rc::Rc< + input: &::dafny_runtime::Rc< software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm, >, - ) -> ::std::rc::Rc< + ) -> ::dafny_runtime::Rc< _Wrappers_Compile::Result< ::dafny_runtime::Object, - ::std::rc::Rc< + ::dafny_runtime::Rc< software::amazon::cryptography::primitives::internaldafny::types::Error, >, >, @@ -97,23 +99,24 @@ pub mod HMAC { }), }); - ::std::rc::Rc::new(_Wrappers_Compile::Result::Success { value: inner }) + ::dafny_runtime::Rc::new(_Wrappers_Compile::Result::Success { value: inner }) } pub fn BlockUpdate(&self, block: &::dafny_runtime::Sequence) { let part: Vec = block.iter().collect(); self.inner - .borrow_mut() + .lock() + .unwrap() .context .as_mut() .unwrap() .update(&part); } pub fn GetResult(&self) -> ::dafny_runtime::Sequence { - let is_empty = self.inner.borrow().context.is_none(); + let is_empty = self.inner.lock().unwrap().context.is_none(); if is_empty { return [].iter().cloned().collect(); } - let tag = self.inner.borrow_mut().context.take().unwrap().sign(); + let tag = self.inner.lock().unwrap().context.take().unwrap().sign(); // other languages allow you to call BlockUpdate after GetResult // so we re-initialize to mimic that behavior self.re_init(); diff --git a/releases/rust/db_esdk/src/implementation_from_dafny.rs b/releases/rust/db_esdk/src/implementation_from_dafny.rs index d8ed0e176..7b1cfbce6 100644 --- a/releases/rust/db_esdk/src/implementation_from_dafny.rs +++ b/releases/rust/db_esdk/src/implementation_from_dafny.rs @@ -1,137720 +1,145657 @@ #![allow(warnings, unconditional_panic)] #![allow(nonstandard_style)] +#![cfg_attr(any(), rustfmt::skip)] +/// Flattens all imported externs so that they can be accessed from this module pub mod _dafny_externs { - pub use crate::aes_gcm::*; - pub use crate::aes_kdf_ctr::*; - pub use crate::concurrent_call::*; - pub use crate::dafny_libraries::*; - pub use crate::ddb::*; - pub use crate::digest::*; - pub use crate::ecdh::*; - pub use crate::ecdsa::*; - pub use crate::hmac::*; - pub use crate::kms::*; - pub use crate::local_cmc::*; - pub use crate::random::*; - pub use crate::rsa::*; - pub use crate::sets::*; - pub use crate::software_externs::*; - pub use crate::storm_tracker::*; - pub use crate::time::*; - pub use crate::uuid::*; + pub use crate::aes_gcm::*; + pub use crate::aes_kdf_ctr::*; + pub use crate::concurrent_call::*; + pub use crate::dafny_libraries::*; + pub use crate::ddb::*; + pub use crate::digest::*; + pub use crate::ecdh::*; + pub use crate::ecdsa::*; + pub use crate::hmac::*; + pub use crate::kms::*; + pub use crate::local_cmc::*; + pub use crate::oslang::*; + pub use crate::random::*; + pub use crate::rsa::*; + pub use crate::sets::*; + pub use crate::software_externs::*; + pub use crate::storm_tracker::*; + pub use crate::time::*; + pub use crate::uuid::*; } pub mod _module { } +/// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(6,1) pub mod AESEncryption { - pub use ::dafny_runtime::Sequence; - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput; - pub use ::std::convert::Into; - pub use ::dafny_runtime::DafnyInt; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::OpaqueError; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput; - - pub struct _default {} - - impl _default { - pub fn EncryptionOutputFromByteSeq(s: &Sequence, encAlg: &Rc) -> Rc { - let mut cipherText: Sequence = s.take(&(s.cardinality() - Into::::into(encAlg.tagLength().clone()))); - let mut authTag: Sequence = s.drop(&(s.cardinality() - Into::::into(encAlg.tagLength().clone()))); - Rc::new(AESEncryptOutput::AESEncryptOutput { - cipherText: cipherText.clone(), - authTag: authTag.clone() - }) - } - pub fn AESEncrypt(input: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.iv().cardinality() == Into::::into(input.encAlg().ivLength().clone()) && input.key().cardinality() == Into::::into(input.encAlg().keyLength().clone()), &Rc::new(Error::AwsCryptographicPrimitivesError { - message: string_utf16_of("Request does not match algorithm.") - }))); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut r#__let_tmp_rhs0: Rc = input.clone(); - let mut encAlg: Rc = r#__let_tmp_rhs0.encAlg().clone(); - let mut iv: Sequence = r#__let_tmp_rhs0.iv().clone(); - let mut key: Sequence = r#__let_tmp_rhs0.key().clone(); - let mut msg: Sequence = r#__let_tmp_rhs0.msg().clone(); - let mut aad: Sequence = r#__let_tmp_rhs0.aad().clone(); - let mut valueOrError1 = MaybePlacebo::, OpaqueError>>>::new(); - let mut _out0 = MaybePlacebo::, OpaqueError>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::_dafny_externs::AESEncryption::AES_GCM::AESEncryptExtern(&encAlg, &iv, &key, &msg, &aad)); - valueOrError1 = MaybePlacebo::from(_out0.read()); - if valueOrError1.read().IsFailure() { - res = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return res.read(); - }; - let mut value: Rc = valueOrError1.read().Extract(); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(value.cipherText().cardinality() == msg.cardinality(), &Rc::new(Error::AwsCryptographicPrimitivesError { - message: string_utf16_of("AESEncrypt did not return cipherText of expected length") - }))); - if valueOrError2.read().IsFailure() { - res = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return res.read(); - }; - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(value.authTag().cardinality() == Into::::into(encAlg.tagLength().clone()), &Rc::new(Error::AwsCryptographicPrimitivesError { - message: string_utf16_of("AESEncryption did not return valid tag") - }))); - if valueOrError3.read().IsFailure() { - res = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return res.read(); - }; - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: value.clone() - })); - return res.read(); - } - pub fn AESDecrypt(input: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.key().cardinality() == Into::::into(input.encAlg().keyLength().clone()) && input.iv().cardinality() == Into::::into(input.encAlg().ivLength().clone()) && input.authTag().cardinality() == Into::::into(input.encAlg().tagLength().clone()), &Rc::new(Error::AwsCryptographicPrimitivesError { - message: string_utf16_of("Request does not match algorithm.") - }))); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut r#__let_tmp_rhs0: Rc = input.clone(); - let mut encAlg: Rc = r#__let_tmp_rhs0.encAlg().clone(); - let mut key: Sequence = r#__let_tmp_rhs0.key().clone(); - let mut cipherTxt: Sequence = r#__let_tmp_rhs0.cipherTxt().clone(); - let mut authTag: Sequence = r#__let_tmp_rhs0.authTag().clone(); - let mut iv: Sequence = r#__let_tmp_rhs0.iv().clone(); - let mut aad: Sequence = r#__let_tmp_rhs0.aad().clone(); - let mut valueOrError1 = MaybePlacebo::, OpaqueError>>>::new(); - let mut _out0 = MaybePlacebo::, OpaqueError>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::_dafny_externs::AESEncryption::AES_GCM::AESDecryptExtern(&encAlg, &key, &cipherTxt, &authTag, &iv, &aad)); - valueOrError1 = MaybePlacebo::from(_out0.read()); - if valueOrError1.read().IsFailure() { - res = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return res.read(); - }; - let mut value: Sequence = valueOrError1.read().Extract(); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(cipherTxt.cardinality() == value.cardinality(), &Rc::new(Error::AwsCryptographicPrimitivesError { - message: string_utf16_of("AESDecrypt did not return plaintext of expected length") - }))); - if valueOrError2.read().IsFailure() { - res = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return res.read(); - }; - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: value.clone() - })); - return res.read(); - } - pub fn CreateAESEncryptExternSuccess(output: &Rc) -> Rc, OpaqueError>> { - Rc::new(Result::, OpaqueError>::Success { - value: output.clone() - }) - } - pub fn CreateAESEncryptExternFailure(error: &OpaqueError) -> Rc, OpaqueError>> { - Rc::new(Result::, OpaqueError>::Failure { - error: error.clone() - }) - } - pub fn CreateAESDecryptExternSuccess(bytes: &Sequence) -> Rc, OpaqueError>> { - Rc::new(Result::, OpaqueError>::Success { - value: bytes.clone() - }) - } - pub fn CreateAESDecryptExternFailure(error: &OpaqueError) -> Rc, OpaqueError>> { - Rc::new(Result::, OpaqueError>::Failure { - error: error.clone() - }) - } - } -} -pub mod r#_Actions_Compile { - pub use ::dafny_runtime::DafnyType; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::MaybePlacebo; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::integer_range; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::md; - pub use ::std::rc::Rc; - pub use ::std::default::Default; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result::Success; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::convert::AsRef; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObject; - - pub struct _default {} - - impl _default { - pub fn DeterministicMap<_A: DafnyType, _R: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Sequence<_R> { - let mut res = MaybePlacebo::>::new(); - let mut rs: Sequence<_R> = seq![] as Sequence<_R>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut r = MaybePlacebo::<_R>::new(); - let mut _out0 = MaybePlacebo::<_R>::new(); - _out0 = MaybePlacebo::from(DeterministicAction::<_A, _R>::Invoke(md!(action.clone()), &s.get(&i))); - r = MaybePlacebo::from(_out0.read()); - rs = rs.concat(&seq![r.read()]); - } - res = MaybePlacebo::from(rs.clone()); - return res.read(); - } - pub fn DeterministicMapWithResult<_A: DafnyType, _R: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Rc, _E>> { - let mut res = MaybePlacebo::, _E>>>::new(); - let mut rs: Sequence<_R> = seq![] as Sequence<_R>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut valueOrError0 = MaybePlacebo::>>::new(); - let mut _out0 = MaybePlacebo::>>::new(); - _out0 = MaybePlacebo::from(DeterministicAction::<_A, Rc>>::Invoke(md!(action.clone()), &s.get(&i))); - valueOrError0 = MaybePlacebo::from(_out0.read()); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut r: _R = valueOrError0.read().Extract(); - rs = rs.concat(&seq![r.clone()]); - } - res = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, _E>::Success { - value: rs.clone() - })); - return res.read(); - } - pub fn DeterministicFlatMap<_A: DafnyType, _R: DafnyType>(action: &Object>>, s: &Sequence<_A>) -> Sequence<_R> { - let mut res = MaybePlacebo::>::new(); - let mut rs: Sequence<_R> = seq![] as Sequence<_R>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut r = MaybePlacebo::>::new(); - let mut _out0 = MaybePlacebo::>::new(); - _out0 = MaybePlacebo::from(DeterministicAction::<_A, Sequence<_R>>::Invoke(md!(action.clone()), &s.get(&i))); - r = MaybePlacebo::from(_out0.read()); - rs = rs.concat(&r.read()); - } - res = MaybePlacebo::from(rs.clone()); - return res.read(); - } - pub fn DeterministicFlatMapWithResult<_A: DafnyType, _R: DafnyType, _E: DafnyType>(action: &Object, _E>>, s: &Sequence<_A>) -> Rc, _E>> { - let mut res = MaybePlacebo::, _E>>>::new(); - let mut rs: Sequence<_R> = seq![] as Sequence<_R>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut valueOrError0 = MaybePlacebo::, _E>>>::new(); - let mut _out0 = MaybePlacebo::, _E>>>::new(); - _out0 = MaybePlacebo::from(DeterministicAction::<_A, Rc, _E>>>::Invoke(md!(action.clone()), &s.get(&i))); - valueOrError0 = MaybePlacebo::from(_out0.read()); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut r: Sequence<_R> = valueOrError0.read().Extract(); - rs = rs.concat(&r); - } - let mut _rhs0: Rc, _E>> = Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, _E>::Success { - value: rs.clone() - }); - res = MaybePlacebo::from(_rhs0.clone()); - return res.read(); - } - pub fn Filter<_A: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Sequence<_A> { - let mut res = MaybePlacebo::>::new(); - let mut rs: Sequence<_A> = seq![] as Sequence<_A>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut r: bool = ::default(); - let mut _out0: bool = ::default(); - _out0 = DeterministicAction::<_A, bool>::Invoke(md!(action.clone()), &s.get(&i)); - r = _out0; - if r { - rs = rs.concat(&seq![s.get(&i)]); - } - } - res = MaybePlacebo::from(rs.clone()); - return res.read(); - } - pub fn FilterWithResult<_A: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Rc, _E>> { - let mut res = MaybePlacebo::, _E>>>::new(); - let mut rs: Sequence<_A> = seq![] as Sequence<_A>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut valueOrError0 = MaybePlacebo::>>::new(); - let mut _out0 = MaybePlacebo::>>::new(); - _out0 = MaybePlacebo::from(DeterministicAction::<_A, Rc>>::Invoke(md!(action.clone()), &s.get(&i))); - valueOrError0 = MaybePlacebo::from(_out0.read()); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut r: bool = valueOrError0.read().Extract(); - if r { - rs = rs.concat(&seq![s.get(&i)]); - } - } - res = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, _E>::Success { - value: rs.clone() - })); - return res.read(); - } - pub fn ReduceToSuccess<_A: DafnyType, _B: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Rc>> { - let mut res = MaybePlacebo::>>>::new(); - let mut attemptedResults: Sequence>> = seq![] as Sequence>>; - let mut _hi0: DafnyInt = s.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut attempt = MaybePlacebo::>>::new(); - let mut _out0 = MaybePlacebo::>>::new(); - _out0 = MaybePlacebo::from(Action::<_A, Rc>>::Invoke(md!(action.clone()), &s.get(&i))); - attempt = MaybePlacebo::from(_out0.read()); - attemptedResults = attemptedResults.concat(&seq![attempt.read()]); - if matches!((&attempt.read()).as_ref(), Success{ .. }) { - let mut _rhs0: Rc>> = Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::<_B, Sequence<_E>>::Success { - value: attempt.read().value().clone() - }); - res = MaybePlacebo::from(_rhs0.clone()); - return res.read(); - } - } - res = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::<_B, Sequence<_E>>::Failure { - error: crate::implementation_from_dafny::r#_Seq_Compile::_default::Map::>, _E>(&(Rc::new(move |x0: &Rc>| _default::pluckErrors(x0)) as Rc _>), &attemptedResults) - })); - return res.read(); - } - pub fn pluckErrors<_B: DafnyType, _E: DafnyType>(r: &Rc>) -> _E { - r.error().clone() - } - } - - #[derive(PartialEq, Clone)] - pub enum ActionInvoke { - ActionInvoke { - input: A, - output: R - } - } - - impl ActionInvoke { - pub fn input(&self) -> &A { - match self { - ActionInvoke::ActionInvoke{input, output, } => input, - } - } - pub fn output(&self) -> &R { - match self { - ActionInvoke::ActionInvoke{input, output, } => output, - } - } - } - - impl Debug - for ActionInvoke { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for ActionInvoke { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ActionInvoke::ActionInvoke{input, output, } => { - write!(_formatter, "Actions_Compile.ActionInvoke.ActionInvoke(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + pub use ::dafny_runtime::Sequence; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput; + pub use ::dafny_runtime::int; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Outcome; + pub use ::dafny_runtime::string_utf16_of; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::OpaqueError; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput; - impl Eq - for ActionInvoke {} + pub struct _default {} - impl Hash - for ActionInvoke { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ActionInvoke::ActionInvoke{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } - - impl Default - for ActionInvoke { - fn default() -> ActionInvoke { - ActionInvoke::ActionInvoke { - input: Default::default(), - output: Default::default() - } - } - } - - impl AsRef> - for &ActionInvoke { - fn as_ref(&self) -> Self { - self - } - } - - pub trait Action: Any + UpcastObject - where - A: DafnyType, - R: DafnyType { - fn Invoke(&self, a: &A) -> R; - } - - pub trait ActionWithResult: Any + UpcastObject + Action>> + UpcastObject>>> - where - A: DafnyType, - R: DafnyType, - E: DafnyType {} - - pub trait DeterministicAction: Any + UpcastObject - where - A: DafnyType, - R: DafnyType { - fn Invoke(&self, a: &A) -> R; - } - - pub trait DeterministicActionWithResult: Any + UpcastObject + DeterministicAction>> + UpcastObject>>> - where - A: DafnyType, - R: DafnyType, - E: DafnyType {} + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(20,3) + pub fn EncryptionOutputFromByteSeq(s: &Sequence, encAlg: &Arc) -> Arc { + let mut cipherText: Sequence = s.take(&(s.cardinality() - int!(encAlg.tagLength().clone()))); + let mut authTag: Sequence = s.drop(&(s.cardinality() - int!(encAlg.tagLength().clone()))); + Arc::new(AESEncryptOutput::AESEncryptOutput { + cipherText: cipherText.clone(), + authTag: authTag.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(48,3) + pub fn AESEncrypt(input: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut valueOrError0: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(input.iv().cardinality() == int!(input.encAlg().ivLength().clone()) && input.key().cardinality() == int!(input.encAlg().keyLength().clone()), &Arc::new(Error::AwsCryptographicPrimitivesError { + message: string_utf16_of("Request does not match algorithm.") + })); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut __let_tmp_rhs0: Arc = input.clone(); + let mut encAlg: Arc = __let_tmp_rhs0.encAlg().clone(); + let mut iv: Sequence = __let_tmp_rhs0.iv().clone(); + let mut key: Sequence = __let_tmp_rhs0.key().clone(); + let mut msg: Sequence = __let_tmp_rhs0.msg().clone(); + let mut aad: Sequence = __let_tmp_rhs0.aad().clone(); + let mut valueOrError1: Arc, OpaqueError>>; + let mut _out0: Arc, OpaqueError>> = crate::implementation_from_dafny::_dafny_externs::AESEncryption::AES_GCM::AESEncryptExtern(&encAlg, &iv, &key, &msg, &aad); + valueOrError1 = _out0.clone(); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut value: Arc = valueOrError1.Extract(); + let mut valueOrError2: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(value.cipherText().cardinality() == msg.cardinality(), &Arc::new(Error::AwsCryptographicPrimitivesError { + message: string_utf16_of("AESEncrypt did not return cipherText of expected length") + })); + if valueOrError2.IsFailure() { + res = MaybePlacebo::from(valueOrError2.PropagateFailure::>()); + return res.read(); + }; + let mut valueOrError3: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(value.authTag().cardinality() == int!(encAlg.tagLength().clone()), &Arc::new(Error::AwsCryptographicPrimitivesError { + message: string_utf16_of("AESEncryption did not return valid tag") + })); + if valueOrError3.IsFailure() { + res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); + return res.read(); + }; + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: value.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(98,3) + pub fn AESDecrypt(input: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut valueOrError0: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(input.key().cardinality() == int!(input.encAlg().keyLength().clone()) && input.iv().cardinality() == int!(input.encAlg().ivLength().clone()) && input.authTag().cardinality() == int!(input.encAlg().tagLength().clone()), &Arc::new(Error::AwsCryptographicPrimitivesError { + message: string_utf16_of("Request does not match algorithm.") + })); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut __let_tmp_rhs0: Arc = input.clone(); + let mut encAlg: Arc = __let_tmp_rhs0.encAlg().clone(); + let mut key: Sequence = __let_tmp_rhs0.key().clone(); + let mut cipherTxt: Sequence = __let_tmp_rhs0.cipherTxt().clone(); + let mut authTag: Sequence = __let_tmp_rhs0.authTag().clone(); + let mut iv: Sequence = __let_tmp_rhs0.iv().clone(); + let mut aad: Sequence = __let_tmp_rhs0.aad().clone(); + let mut valueOrError1: Arc, OpaqueError>>; + let mut _out0: Arc, OpaqueError>> = crate::implementation_from_dafny::_dafny_externs::AESEncryption::AES_GCM::AESDecryptExtern(&encAlg, &key, &cipherTxt, &authTag, &iv, &aad); + valueOrError1 = _out0.clone(); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut value: Sequence = valueOrError1.Extract(); + let mut valueOrError2: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(cipherTxt.cardinality() == value.cardinality(), &Arc::new(Error::AwsCryptographicPrimitivesError { + message: string_utf16_of("AESDecrypt did not return plaintext of expected length") + })); + if valueOrError2.IsFailure() { + res = MaybePlacebo::from(valueOrError2.PropagateFailure::>()); + return res.read(); + }; + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: value.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(130,3) + pub fn CreateAESEncryptExternSuccess(output: &Arc) -> Arc, OpaqueError>> { + Arc::new(Result::, OpaqueError>::Success { + value: output.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(134,3) + pub fn CreateAESEncryptExternFailure(error: &OpaqueError) -> Arc, OpaqueError>> { + Arc::new(Result::, OpaqueError>::Failure { + error: error.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(138,3) + pub fn CreateAESDecryptExternSuccess(bytes: &Sequence) -> Arc, OpaqueError>> { + Arc::new(Result::, OpaqueError>::Success { + value: bytes.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AESEncryption.dfy(142,3) + pub fn CreateAESDecryptExternFailure(error: &OpaqueError) -> Arc, OpaqueError>> { + Arc::new(Result::, OpaqueError>::Failure { + error: error.clone() + }) + } + } } -pub mod AesKdfCtr { - pub use ::dafny_runtime::Sequence; - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; +/// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(7,1) +pub mod _Actions_Compile { + pub use ::dafny_runtime::DafnyType; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::MaybePlacebo; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::integer_range; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::rd; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result::Success; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::Any; + pub use ::dafny_runtime::UpcastObject; - pub struct _default {} + pub struct _default {} - impl _default { - pub fn CreateStreamSuccess(bytes: &Sequence) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: bytes.clone() - }) - } - pub fn CreateStreamFailure(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } -} -pub mod r#_AlgorithmSuites_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm::SHA_512; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF; - pub use ::dafny_runtime::seq; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::HMAC; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId::ESDK; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AES_GCM; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm; - pub use ::dafny_runtime::Map; - pub use ::dafny_runtime::map; - - pub struct _default {} - - impl _default { - pub fn r#_SupportedESDKEncrypt_q(e: &Rc) -> bool { - true && (e.AES_GCM().keyLength().clone() == 32 || e.AES_GCM().keyLength().clone() == 24 || e.AES_GCM().keyLength().clone() == 16) && e.AES_GCM().tagLength().clone() == 16 && e.AES_GCM().ivLength().clone() == 12 - } - pub fn r#_SupportedDBEEncrypt_q(e: &Rc) -> bool { - true && e.AES_GCM().keyLength().clone() == 32 && e.AES_GCM().tagLength().clone() == 16 && e.AES_GCM().ivLength().clone() == 12 - } - pub fn r#_SupportedDBEEDKWrapping_q(p: &Rc) -> bool { - matches!(p.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().tagLength().clone() == 16 && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().ivLength().clone() == 12 && matches!(p.IntermediateKeyWrapping().macKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(p.IntermediateKeyWrapping().keyEncryptionKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) - } - pub fn r#_KeyDerivationAlgorithm_q(kdf: &Rc) -> bool { - (!(true && matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) || kdf.HKDF().inputKeyLength().clone() == kdf.HKDF().outputKeyLength().clone() && (!(kdf.HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_512 {})) || kdf.HKDF().inputKeyLength().clone() == 32)) && !matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) - } - pub fn r#_CommitmentDerivationAlgorithm_q(kdf: &Rc) -> bool { - (!(true && matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) || matches!(kdf.HKDF().hmac().as_ref(), SHA_512{ .. }) && kdf.HKDF().saltLength().clone() == 32 && kdf.HKDF().inputKeyLength().clone() == 32 && kdf.HKDF().outputKeyLength().clone() == 32) && !matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) - } - pub fn r#_EdkWrappingAlgorithm_q(alg: &Rc) -> bool { - matches!(alg.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && matches!(alg.IntermediateKeyWrapping().keyEncryptionKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(alg.IntermediateKeyWrapping().macKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && true && alg.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 || matches!(alg.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } - pub fn r#_AlgorithmSuiteInfo_q(a: &Rc) -> bool { - _default::r#_KeyDerivationAlgorithm_q(a.kdf()) && _default::r#_CommitmentDerivationAlgorithm_q(a.commitment()) && _default::r#_EdkWrappingAlgorithm_q(a.edkWrapping()) && (!matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) || true && a.kdf().HKDF().outputKeyLength().clone() == a.encrypt().AES_GCM().keyLength().clone()) && (!matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) || matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) && (!matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) || a.commitment().HKDF().saltLength().clone() == 32 && a.commitment().clone() == a.kdf().clone()) && (!matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) || matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.edkWrapping().IntermediateKeyWrapping().keyEncryptionKeyKdf().clone() == a.kdf().clone() && a.edkWrapping().IntermediateKeyWrapping().macKeyKdf().clone() == a.kdf().clone()) && (!(matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. })) || a.kdf().HKDF().saltLength().clone() == 0) && (!(!matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. })) || true && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. })) - } - pub fn r#_ESDKAlgorithmSuite_q(a: &Rc) -> bool { - _default::r#_AlgorithmSuiteInfo_q(a) && _default::r#_SupportedESDKEncrypt_q(a.encrypt()) && (&({ - let mut a = a.clone(); - Rc::new(move |_source0: &Rc| -> bool{ - if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_NO_KDF{ .. }) { - a.binaryId().clone() == seq![0, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_NO_KDF{ .. }) { - a.binaryId().clone() == seq![0, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_NO_KDF{ .. }) { - a.binaryId().clone() == seq![0, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { - a.binaryId().clone() == seq![1, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { - a.binaryId().clone() == seq![1, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { - a.binaryId().clone() == seq![1, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{ .. }) { - a.binaryId().clone() == seq![2, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Rc::new(ECDSASignatureAlgorithm::ECDSA_P256 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{ .. }) { - a.binaryId().clone() == seq![3, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{ .. }) { - a.binaryId().clone() == seq![3, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - if matches!(_source0.as_ref(), ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{ .. }) { - a.binaryId().clone() == seq![4, 120] && a.messageVersion().clone() == 2 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } else { - a.binaryId().clone() == seq![5, 120] && a.messageVersion().clone() == 2 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) - } - } - } - } - } - } - } - } - } + impl _default { + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(104,3) + pub fn DeterministicMap<_A: DafnyType, _R: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Sequence<_R> { + let mut res = MaybePlacebo::>::new(); + let mut rs: Sequence<_R> = seq![] as Sequence<_R>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut r: _R; + let mut _out0: _R = DeterministicAction::<_A, _R>::Invoke(rd!(action.clone()), &s.get(&i)); + r = _out0.clone(); + rs = rs.concat(&seq![r.clone()]); + } + res = MaybePlacebo::from(rs.clone()); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(133,3) + pub fn DeterministicMapWithResult<_A: DafnyType, _R: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Arc, _E>> { + let mut res = MaybePlacebo::, _E>>>::new(); + let mut rs: Sequence<_R> = seq![] as Sequence<_R>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut valueOrError0: Arc>; + let mut _out0: Arc> = DeterministicAction::<_A, Arc>>::Invoke(rd!(action.clone()), &s.get(&i)); + valueOrError0 = _out0.clone(); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut r: _R = valueOrError0.Extract(); + rs = rs.concat(&seq![r.clone()]); } - }) - }))(a.id().ESDK()) - } - pub fn r#_DBEAlgorithmSuite_q(a: &Rc) -> bool { - _default::r#_AlgorithmSuiteInfo_q(a) && _default::r#_SupportedDBEEncrypt_q(a.encrypt()) && _default::r#_SupportedDBEEDKWrapping_q(a.edkWrapping()) && (&({ - let mut a = a.clone(); - Rc::new(move |_source0: &Rc| -> bool{ - if matches!(_source0.as_ref(), ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{ .. }) { - a.binaryId().clone() == seq![103, 0] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), HMAC{ .. }) && a.symmetricSignature().HMAC().clone() == Rc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && a.edkWrapping().IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 - } else { - a.binaryId().clone() == seq![103, 1] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Rc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), HMAC{ .. }) && a.symmetricSignature().HMAC().clone() == Rc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && a.edkWrapping().IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 - } - }) - }))(a.id().DBE()) - } - pub fn r#_AlgorithmSuite_q(a: &Rc) -> bool { - let mut _source0: Rc = a.id().clone(); - if matches!((&_source0).as_ref(), ESDK{ .. }) { - let mut r#___mcc_h0: Rc = _source0.ESDK().clone(); - _default::r#_ESDKAlgorithmSuite_q(a) - } else { - let mut r#___mcc_h1: Rc = _source0.DBE().clone(); - _default::r#_DBEAlgorithmSuite_q(a) - } - } - pub fn HKDF_SHA_256(keyLength: SymmetricKeyLength) -> Rc { - Rc::new(DerivationAlgorithm::HKDF { - HKDF: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { - hmac: Rc::new(DigestAlgorithm::SHA_256 {}), - saltLength: 0, - inputKeyLength: keyLength, - outputKeyLength: keyLength - }) - }) - } - pub fn HKDF_SHA_384(keyLength: SymmetricKeyLength) -> Rc { - Rc::new(DerivationAlgorithm::HKDF { - HKDF: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { - hmac: Rc::new(DigestAlgorithm::SHA_384 {}), - saltLength: 0, - inputKeyLength: keyLength, - outputKeyLength: keyLength - }) - }) - } - pub fn HKDF_SHA_512(keyLength: SymmetricKeyLength) -> Rc { - Rc::new(DerivationAlgorithm::HKDF { - HKDF: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { - hmac: Rc::new(DigestAlgorithm::SHA_512 {}), - saltLength: 32, - inputKeyLength: keyLength, - outputKeyLength: keyLength - }) - }) - } - pub fn GetSuite(id: &Rc) -> AlgorithmSuite { - let mut _source0: Rc = id.clone(); - if matches!((&_source0).as_ref(), ESDK{ .. }) { - let mut r#___mcc_h0: Rc = _source0.ESDK().clone(); - let mut e: Rc = r#___mcc_h0.clone(); - _default::GetESDKSuite(&e) - } else { - let mut r#___mcc_h1: Rc = _source0.DBE().clone(); - let mut e: Rc = r#___mcc_h1.clone(); - _default::GetDBESuite(&e) - } - } - pub fn GetDBESuite(id: &Rc) -> AlgorithmSuite { - _default::SupportedDBEAlgorithmSuites().get(id) - } - pub fn GetESDKSuite(id: &Rc) -> AlgorithmSuite { - _default::SupportedESDKAlgorithmSuites().get(id) - } - pub fn GetEncryptKeyLength(a: &Rc) -> i32 { - let mut _source0: Rc = a.encrypt().clone(); - let mut r#___mcc_h0: Rc = _source0.AES_GCM().clone(); - let mut e: Rc = r#___mcc_h0.clone(); - e.keyLength().clone() - } - pub fn GetEncryptTagLength(a: &Rc) -> i32 { - let mut _source0: Rc = a.encrypt().clone(); - let mut r#___mcc_h0: Rc = _source0.AES_GCM().clone(); - let mut e: Rc = r#___mcc_h0.clone(); - e.tagLength().clone() - } - pub fn GetEncryptIvLength(a: &Rc) -> i32 { - let mut _source0: Rc = a.encrypt().clone(); - let mut r#___mcc_h0: Rc = _source0.AES_GCM().clone(); - let mut e: Rc = r#___mcc_h0.clone(); - e.ivLength().clone() - } - pub fn GetAlgorithmSuiteInfo(r#_binaryId_q: &Sequence) -> Rc, Rc>> { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::AlgorithmSuiteInfoByBinaryId().contains(r#_binaryId_q), &Rc::new(Error::AwsCryptographicMaterialProvidersException { - message: string_utf16_of("Invalid BinaryId") - })); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::() - } else { - Rc::new(Result::>::Success { - value: _default::AlgorithmSuiteInfoByBinaryId().get(r#_binaryId_q) - }) - } - } - pub fn Bits128() -> i32 { - 16 - } - pub fn TagLen() -> i32 { - 16 - } - pub fn IvLen() -> i32 { - 12 - } - pub fn AES_128_GCM_IV12_TAG16() -> Rc { - Rc::new(Encrypt::AES_GCM { - AES_GCM: Rc::new(AES_GCM::AES_GCM { - keyLength: _default::Bits128(), - tagLength: _default::TagLen(), - ivLength: _default::IvLen() - }) - }) - } - pub fn Bits192() -> i32 { - 24 - } - pub fn AES_192_GCM_IV12_TAG16() -> Rc { - Rc::new(Encrypt::AES_GCM { - AES_GCM: Rc::new(AES_GCM::AES_GCM { - keyLength: _default::Bits192(), - tagLength: _default::TagLen(), - ivLength: _default::IvLen() - }) - }) - } - pub fn Bits256() -> i32 { - 32 - } - pub fn AES_256_GCM_IV12_TAG16() -> Rc { - Rc::new(Encrypt::AES_GCM { - AES_GCM: Rc::new(AES_GCM::AES_GCM { - keyLength: _default::Bits256(), - tagLength: _default::TagLen(), - ivLength: _default::IvLen() - }) - }) - } - pub fn EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() -> Rc { - Rc::new(EdkWrappingAlgorithm::IntermediateKeyWrapping { - IntermediateKeyWrapping: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping::IntermediateKeyWrapping { - keyEncryptionKeyKdf: _default::HKDF_SHA_512(_default::Bits256()), - macKeyKdf: _default::HKDF_SHA_512(_default::Bits256()), - pdkEncryptAlgorithm: _default::AES_256_GCM_IV12_TAG16() - }) - }) - } - pub fn DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::DBE { - DBE: Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}) - }), - binaryId: seq![103, 0], - messageVersion: 1, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_512(_default::Bits256()), - commitment: _default::HKDF_SHA_512(_default::Bits256()), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::HMAC { - HMAC: Rc::new(DigestAlgorithm::SHA_384 {}) - }), - edkWrapping: _default::EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() - }) - } - pub fn DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::DBE { - DBE: Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {}) - }), - binaryId: seq![103, 1], - messageVersion: 1, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_512(_default::Bits256()), - commitment: _default::HKDF_SHA_512(_default::Bits256()), - signature: Rc::new(SignatureAlgorithm::ECDSA { - ECDSA: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { - curve: Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) - }) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::HMAC { - HMAC: Rc::new(DigestAlgorithm::SHA_384 {}) - }), - edkWrapping: _default::EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() - }) - } - pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}) - }), - binaryId: seq![0, 20], - messageVersion: 1, - encrypt: _default::AES_128_GCM_IV12_TAG16(), - kdf: Rc::new(DerivationAlgorithm::IDENTITY { - IDENTITY: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) - }), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}) - }), - binaryId: seq![0, 70], - messageVersion: 1, - encrypt: _default::AES_192_GCM_IV12_TAG16(), - kdf: Rc::new(DerivationAlgorithm::IDENTITY { - IDENTITY: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) - }), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}) - }), - binaryId: seq![0, 120], - messageVersion: 1, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: Rc::new(DerivationAlgorithm::IDENTITY { - IDENTITY: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) - }), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}) - }), - binaryId: seq![1, 20], - messageVersion: 1, - encrypt: _default::AES_128_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_256(_default::Bits128()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}) - }), - binaryId: seq![1, 70], - messageVersion: 1, - encrypt: _default::AES_192_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_256(_default::Bits192()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}) - }), - binaryId: seq![1, 120], - messageVersion: 1, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_256(_default::Bits256()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}) - }), - binaryId: seq![2, 20], - messageVersion: 1, - encrypt: _default::AES_128_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_256(_default::Bits128()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::ECDSA { - ECDSA: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { - curve: Rc::new(ECDSASignatureAlgorithm::ECDSA_P256 {}) - }) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}) - }), - binaryId: seq![3, 70], - messageVersion: 1, - encrypt: _default::AES_192_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_384(_default::Bits192()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::ECDSA { - ECDSA: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { - curve: Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) - }) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}) - }), - binaryId: seq![3, 120], - messageVersion: 1, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_384(_default::Bits256()), - commitment: Rc::new(DerivationAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - signature: Rc::new(SignatureAlgorithm::ECDSA { - ECDSA: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { - curve: Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) - }) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}) - }), - binaryId: seq![4, 120], - messageVersion: 2, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_512(_default::Bits256()), - commitment: _default::HKDF_SHA_512(_default::Bits256()), - signature: Rc::new(SignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384() -> AlgorithmSuite { - Rc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Rc::new(AlgorithmSuiteId::ESDK { - ESDK: Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {}) - }), - binaryId: seq![5, 120], - messageVersion: 2, - encrypt: _default::AES_256_GCM_IV12_TAG16(), - kdf: _default::HKDF_SHA_512(_default::Bits256()), - commitment: _default::HKDF_SHA_512(_default::Bits256()), - signature: Rc::new(SignatureAlgorithm::ECDSA { - ECDSA: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { - curve: Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) - }) - }), - symmetricSignature: Rc::new(SymmetricSignatureAlgorithm::None { - _None: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) - }), - edkWrapping: Rc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) - }) - }) - } - pub fn SupportedESDKAlgorithmSuites() -> Map, AlgorithmSuite> { - map![(Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {})) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY()), (Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384())] - } - pub fn SupportedDBEAlgorithmSuites() -> Map, AlgorithmSuite> { - map![(Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {})) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384()), (Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {})) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384())] - } - pub fn AlgorithmSuiteInfoByBinaryId() -> Map, AlgorithmSuite> { - map![(seq![0, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF()), (seq![0, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF()), (seq![0, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF()), (seq![1, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256()), (seq![1, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256()), (seq![1, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256()), (seq![2, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256()), (seq![3, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (seq![3, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (seq![4, 120]) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY()), (seq![5, 120]) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384()), (seq![103, 0]) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384()), (seq![103, 1]) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384())] - } - } - - pub type AlgorithmSuite = Rc; -} -pub mod software { - pub mod amazon { - pub mod cryptography { - pub mod primitives { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CryptoConfig; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HMacInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput; - - pub struct _default {} - - impl _default { - pub fn DefaultCryptoConfig() -> Rc { - Rc::new(CryptoConfig::CryptoConfig {}) - } - pub fn AtomicPrimitives(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient::_ctor(&_nw0, &Rc::new(Config::Config {})); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); + res = MaybePlacebo::from(Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, _E>::Success { + value: rs.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(170,3) + pub fn DeterministicFlatMap<_A: DafnyType, _R: DafnyType>(action: &Object>>, s: &Sequence<_A>) -> Sequence<_R> { + let mut res = MaybePlacebo::>::new(); + let mut rs: Sequence<_R> = seq![] as Sequence<_R>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut r: Sequence<_R>; + let mut _out0: Sequence<_R> = DeterministicAction::<_A, Sequence<_R>>::Invoke(rd!(action.clone()), &s.get(&i)); + r = _out0.clone(); + rs = rs.concat(&r); + } + res = MaybePlacebo::from(rs.clone()); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(206,3) + pub fn DeterministicFlatMapWithResult<_A: DafnyType, _R: DafnyType, _E: DafnyType>(action: &Object, _E>>, s: &Sequence<_A>) -> Arc, _E>> { + let mut res = MaybePlacebo::, _E>>>::new(); + let mut rs: Sequence<_R> = seq![] as Sequence<_R>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut valueOrError0: Arc, _E>>; + let mut _out0: Arc, _E>> = DeterministicAction::<_A, Arc, _E>>>::Invoke(rd!(action.clone()), &s.get(&i)); + valueOrError0 = _out0.clone(); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut r: Sequence<_R> = valueOrError0.Extract(); + rs = rs.concat(&r); } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) + let mut _rhs0: Arc, _E>> = Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, _E>::Success { + value: rs.clone() + }); + res = MaybePlacebo::from(_rhs0.clone()); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(246,3) + pub fn Filter<_A: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Sequence<_A> { + let mut res = MaybePlacebo::>::new(); + let mut rs: Sequence<_A> = seq![] as Sequence<_A>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut r: bool; + let mut _out0: bool = DeterministicAction::<_A, bool>::Invoke(rd!(action.clone()), &s.get(&i)); + r = _out0; + if r { + rs = rs.concat(&seq![s.get(&i)]); + } } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) + res = MaybePlacebo::from(rs.clone()); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(279,3) + pub fn FilterWithResult<_A: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Arc, _E>> { + let mut res = MaybePlacebo::, _E>>>::new(); + let mut rs: Sequence<_A> = seq![] as Sequence<_A>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut valueOrError0: Arc>; + let mut _out0: Arc> = DeterministicAction::<_A, Arc>>::Invoke(rd!(action.clone()), &s.get(&i)); + valueOrError0 = _out0.clone(); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut r: bool = valueOrError0.Extract(); + if r { + rs = rs.concat(&seq![s.get(&i)]); + } } - } - - pub struct AtomicPrimitivesClient { - pub r#__i_config: Rc - } - - impl AtomicPrimitivesClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { - UpcastObjectFn!(dyn Any); - } - - impl IAwsCryptographicPrimitivesClient - for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { - fn GenerateRandomBytes(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateRandomBytes(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn Digest(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::Digest(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn HMac(&self, input: &Rc) -> Rc, Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::HMac(&self.config().clone(), input) - } - fn HkdfExtract(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::HkdfExtract(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn HkdfExpand(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::HkdfExpand(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn Hkdf(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::Hkdf(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn KdfCounterMode(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::KdfCounterMode(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn AesKdfCounterMode(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::AesKdfCounterMode(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn AESEncrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::AESEncrypt(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn AESDecrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::AESDecrypt(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GenerateRSAKeyPair(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateRSAKeyPair(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetRSAKeyModulusLength(&self, input: &Rc) -> Rc, Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GetRSAKeyModulusLength(&self.config().clone(), input) - } - fn RSADecrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::RSADecrypt(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn RSAEncrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::RSAEncrypt(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GenerateECDSASignatureKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateECDSASignatureKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ECDSASign(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::ECDSASign(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ECDSAVerify(&self, input: &Rc) -> Rc>> { - let mut output = MaybePlacebo::>>>::new(); - let mut _out0 = MaybePlacebo::>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::ECDSAVerify(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GenerateECCKeyPair(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateECCKeyPair(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetPublicKeyFromPrivateKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::GetPublicKeyFromPrivateKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ValidatePublicKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::ValidatePublicKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DeriveSharedSecret(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::DeriveSharedSecret(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CompressPublicKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::CompressPublicKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DecompressPublicKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::DecompressPublicKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ParsePublicKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyPrimitivesOperations_Compile::_default::ParsePublicKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { - UpcastObjectFn!(dyn IAwsCryptographicPrimitivesClient); - } - - pub mod types { - pub use ::dafny_runtime::truncate; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::DafnyCharUTF16; - - pub struct _default {} - - impl _default { - pub fn IsValid_PositiveInteger(x: i32) -> bool { - !(x < truncate!(int!(0), i32)) - } - pub fn IsValid_RSAModulusLengthBits(x: i32) -> bool { - !(x < truncate!(int!(81), i32)) - } - pub fn IsValid_RSAModulusLengthBitsToGenerate(x: i32) -> bool { - !(x < truncate!(int!(81), i32)) && !(truncate!(int!(4096), i32) < x) - } - pub fn IsValid_SymmetricKeyLength(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(32), i32) < x) - } - pub fn IsValid_Uint8Bits(x: i32) -> bool { - !(x < truncate!(int!(0), i32)) && !(truncate!(int!(255), i32) < x) - } - pub fn IsValid_Uint8Bytes(x: i32) -> bool { - !(x < truncate!(int!(0), i32)) && !(truncate!(int!(32), i32) < x) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } + res = MaybePlacebo::from(Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, _E>::Success { + value: rs.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(318,3) + pub fn ReduceToSuccess<_A: DafnyType, _B: DafnyType, _E: DafnyType>(action: &Object>, s: &Sequence<_A>) -> Arc>> { + let mut res = MaybePlacebo::>>>::new(); + let mut attemptedResults: Sequence>> = seq![] as Sequence>>; + let mut _hi0: DafnyInt = s.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut attempt: Arc>; + let mut _out0: Arc> = Action::<_A, Arc>>::Invoke(rd!(action.clone()), &s.get(&i)); + attempt = _out0.clone(); + attemptedResults = attemptedResults.concat(&seq![attempt.clone()]); + if matches!((&attempt).as_ref(), Success{ .. }) { + let mut _rhs0: Arc>> = Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::<_B, Sequence<_E>>::Success { + value: attempt.value().clone() + }); + res = MaybePlacebo::from(_rhs0.clone()); + return res.read(); + } } + res = MaybePlacebo::from(Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::<_B, Sequence<_E>>::Failure { + error: crate::implementation_from_dafny::_Seq_Compile::_default::Map::>, _E>(&(Arc::new(move |x0: &Arc>| _default::pluckErrors(x0)) as Arc _ + Sync + Send>), &attemptedResults) + })); + return res.read(); + } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(380,3) + pub fn pluckErrors<_B: DafnyType, _E: DafnyType>(r: &Arc>) -> _E { + r.error().clone() + } + } - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(12,3) + #[derive(PartialEq, Clone)] + pub enum ActionInvoke { + ActionInvoke { + input: A, + output: R + } + } - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } + impl ActionInvoke { + /// Returns a borrow of the field input + pub fn input(&self) -> &A { + match self { + ActionInvoke::ActionInvoke{input, output, } => input, } - - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &R { + match self { + ActionInvoke::ActionInvoke{input, output, } => output, } + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + impl Debug + for ActionInvoke { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } + + impl DafnyPrint + for ActionInvoke { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ActionInvoke::ActionInvoke{input, output, } => { + write!(_formatter, "Actions_Compile.ActionInvoke.ActionInvoke(")?; DafnyPrint::fmt_print(input, _formatter, false)?; write!(_formatter, ", ")?; DafnyPrint::fmt_print(output, _formatter, false)?; write!(_formatter, ")")?; Ok(()) - }, - } - } + }, } + } + } - impl Eq - for DafnyCallEvent {} + impl Eq + for ActionInvoke {} - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { + impl Hash + for ActionInvoke { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ActionInvoke::ActionInvoke{input, output, } => { Hash::hash(input, _state); Hash::hash(output, _state) - }, - } - } + }, } + } + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } + impl Default + for ActionInvoke { + fn default() -> ActionInvoke { + ActionInvoke::ActionInvoke { + input: Default::default(), + output: Default::default() } + } + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef> + for ActionInvoke { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum AES_CTR { - AES_CTR { - keyLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength, - nonceLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits - } - } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(17,3) + pub trait Action: Any + Sync + Send + UpcastObject + where + A: DafnyType, + R: DafnyType { + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(22,5) + fn Invoke(&self, a: &A) -> R; + } - impl AES_CTR { - pub fn keyLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength { - match self { - AES_CTR::AES_CTR{keyLength, nonceLength, } => keyLength, - } - } - pub fn nonceLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits { - match self { - AES_CTR::AES_CTR{keyLength, nonceLength, } => nonceLength, - } - } - } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(56,3) + pub trait ActionWithResult: Any + Sync + Send + UpcastObject + Action>> + UpcastObject>>> + where + A: DafnyType, + R: DafnyType, + E: DafnyType {} - impl Debug - for AES_CTR { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(68,3) + pub trait DeterministicAction: Any + Sync + Send + UpcastObject + where + A: DafnyType, + R: DafnyType { + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(73,5) + fn Invoke(&self, a: &A) -> R; + } - impl DafnyPrint - for AES_CTR { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AES_CTR::AES_CTR{keyLength, nonceLength, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AES__CTR.AES__CTR(")?; - DafnyPrint::fmt_print(keyLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(nonceLength, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/StandardLibrary/src/Actions.dfy(89,3) + pub trait DeterministicActionWithResult: Any + Sync + Send + UpcastObject + DeterministicAction>> + UpcastObject>>> + where + A: DafnyType, + R: DafnyType, + E: DafnyType {} +} +/// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AesKdfCtr.dfy(46,1) +pub mod AesKdfCtr { + pub use ::dafny_runtime::Sequence; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; - impl Eq - for AES_CTR {} + pub struct _default {} - impl Hash - for AES_CTR { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AES_CTR::AES_CTR{keyLength, nonceLength, } => { - Hash::hash(keyLength, _state); - Hash::hash(nonceLength, _state) - }, - } - } - } + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AesKdfCtr.dfy(68,3) + pub fn CreateStreamSuccess(bytes: &Sequence) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: bytes.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/AesKdfCtr.dfy(72,3) + pub fn CreateStreamFailure(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } +} +/// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(6,1) +pub mod _AlgorithmSuites_Compile { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Encrypt; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm::SHA_512; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF; + pub use ::dafny_runtime::seq; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::HMAC; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId::ESDK; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AES_GCM; + pub use ::dafny_runtime::Sequence; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Outcome; + pub use ::dafny_runtime::string_utf16_of; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm; + pub use ::dafny_runtime::Map; + pub use ::dafny_runtime::map; - impl Default - for AES_CTR { - fn default() -> AES_CTR { - AES_CTR::AES_CTR { - keyLength: Default::default(), - nonceLength: Default::default() - } - } - } + pub struct _default {} - impl AsRef - for &AES_CTR { - fn as_ref(&self) -> Self { - self - } + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(13,3) + pub fn _SupportedESDKEncrypt_q(e: &Arc) -> bool { + true && (e.AES_GCM().keyLength().clone() == 32 || e.AES_GCM().keyLength().clone() == 24 || e.AES_GCM().keyLength().clone() == 16) && e.AES_GCM().tagLength().clone() == 16 && e.AES_GCM().ivLength().clone() == 12 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(24,3) + pub fn _SupportedDBEEncrypt_q(e: &Arc) -> bool { + true && e.AES_GCM().keyLength().clone() == 32 && e.AES_GCM().tagLength().clone() == 16 && e.AES_GCM().ivLength().clone() == 12 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(32,3) + pub fn _SupportedDBEEDKWrapping_q(p: &Arc) -> bool { + matches!(p.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().tagLength().clone() == 16 && p.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().ivLength().clone() == 12 && matches!(p.IntermediateKeyWrapping().macKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(p.IntermediateKeyWrapping().keyEncryptionKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(43,3) + pub fn _KeyDerivationAlgorithm_q(kdf: &Arc) -> bool { + (!(true && matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) || kdf.HKDF().inputKeyLength().clone() == kdf.HKDF().outputKeyLength().clone() && (!(kdf.HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_512 {})) || kdf.HKDF().inputKeyLength().clone() == 32)) && !matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(53,3) + pub fn _CommitmentDerivationAlgorithm_q(kdf: &Arc) -> bool { + (!(true && matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) || matches!(kdf.HKDF().hmac().as_ref(), SHA_512{ .. }) && kdf.HKDF().saltLength().clone() == 32 && kdf.HKDF().inputKeyLength().clone() == 32 && kdf.HKDF().outputKeyLength().clone() == 32) && !matches!(kdf.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(65,3) + pub fn _EdkWrappingAlgorithm_q(alg: &Arc) -> bool { + matches!(alg.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && matches!(alg.IntermediateKeyWrapping().keyEncryptionKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(alg.IntermediateKeyWrapping().macKeyKdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && true && alg.IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 || matches!(alg.as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(77,3) + pub fn _AlgorithmSuiteInfo_q(a: &Arc) -> bool { + _default::_KeyDerivationAlgorithm_q(a.kdf()) && _default::_CommitmentDerivationAlgorithm_q(a.commitment()) && _default::_EdkWrappingAlgorithm_q(a.edkWrapping()) && (!matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) || true && a.kdf().HKDF().outputKeyLength().clone() == a.encrypt().AES_GCM().keyLength().clone()) && (!matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) || matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. })) && (!matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) || a.commitment().HKDF().saltLength().clone() == 32 && a.commitment().clone() == a.kdf().clone()) && (!matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) || matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.edkWrapping().IntermediateKeyWrapping().keyEncryptionKeyKdf().clone() == a.kdf().clone() && a.edkWrapping().IntermediateKeyWrapping().macKeyKdf().clone() == a.kdf().clone()) && (!(matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. })) || a.kdf().HKDF().saltLength().clone() == 0) && (!(!matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. })) || true && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. })) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(117,3) + pub fn _ESDKAlgorithmSuite_q(a: &Arc) -> bool { + _default::_AlgorithmSuiteInfo_q(a) && _default::_SupportedESDKEncrypt_q(a.encrypt()) && (&({ + let mut a = a.clone(); + Arc::new(move |_source0: &Arc| -> bool{ + if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_NO_KDF{ .. }) { + a.binaryId().clone() == seq![0, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_NO_KDF{ .. }) { + a.binaryId().clone() == seq![0, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_NO_KDF{ .. }) { + a.binaryId().clone() == seq![0, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::IDENTITY{ .. }) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { + a.binaryId().clone() == seq![1, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { + a.binaryId().clone() == seq![1, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{ .. }) { + a.binaryId().clone() == seq![1, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{ .. }) { + a.binaryId().clone() == seq![2, 20] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 16 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_256 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Arc::new(ECDSASignatureAlgorithm::ECDSA_P256 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{ .. }) { + a.binaryId().clone() == seq![3, 70] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 24 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{ .. }) { + a.binaryId().clone() == seq![3, 120] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::None{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + if matches!(_source0.as_ref(), ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{ .. }) { + a.binaryId().clone() == seq![4, 120] && a.messageVersion().clone() == 2 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } else { + a.binaryId().clone() == seq![5, 120] && a.messageVersion().clone() == 2 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SymmetricSignatureAlgorithm::None{ .. }) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{ .. }) + } + } + } + } + } + } + } + } + } + } + }) + }))(a.id().ESDK()) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(262,3) + pub fn _DBEAlgorithmSuite_q(a: &Arc) -> bool { + _default::_AlgorithmSuiteInfo_q(a) && _default::_SupportedDBEEncrypt_q(a.encrypt()) && _default::_SupportedDBEEDKWrapping_q(a.edkWrapping()) && (&({ + let mut a = a.clone(); + Arc::new(move |_source0: &Arc| -> bool{ + if matches!(_source0.as_ref(), ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{ .. }) { + a.binaryId().clone() == seq![103, 0] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::None{ .. }) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), HMAC{ .. }) && a.symmetricSignature().HMAC().clone() == Arc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && a.edkWrapping().IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 + } else { + a.binaryId().clone() == seq![103, 1] && a.messageVersion().clone() == 1 && true && a.encrypt().AES_GCM().keyLength().clone() == 32 && matches!(a.kdf().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && a.kdf().HKDF().hmac().clone() == Arc::new(DigestAlgorithm::SHA_512 {}) && matches!(a.signature().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA{ .. }) && a.signature().ECDSA().curve().clone() == Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) && matches!(a.commitment().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DerivationAlgorithm::HKDF{ .. }) && matches!(a.symmetricSignature().as_ref(), HMAC{ .. }) && a.symmetricSignature().HMAC().clone() == Arc::new(DigestAlgorithm::SHA_384 {}) && matches!(a.edkWrapping().as_ref(), crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EdkWrappingAlgorithm::IntermediateKeyWrapping{ .. }) && true && a.edkWrapping().IntermediateKeyWrapping().pdkEncryptAlgorithm().AES_GCM().keyLength().clone() == 32 + } + }) + }))(a.id().DBE()) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(307,3) + pub fn _AlgorithmSuite_q(a: &Arc) -> bool { + let mut _source0: Arc = a.id().clone(); + if matches!((&_source0).as_ref(), ESDK{ .. }) { + let mut ___mcc_h0: Arc = _source0.ESDK().clone(); + _default::_ESDKAlgorithmSuite_q(a) + } else { + let mut ___mcc_h1: Arc = _source0.DBE().clone(); + _default::_DBEAlgorithmSuite_q(a) + } + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(338,3) + pub fn HKDF_SHA_256(keyLength: SymmetricKeyLength) -> Arc { + Arc::new(DerivationAlgorithm::HKDF { + HKDF: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { + hmac: Arc::new(DigestAlgorithm::SHA_256 {}), + saltLength: 0, + inputKeyLength: keyLength, + outputKeyLength: keyLength + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(351,3) + pub fn HKDF_SHA_384(keyLength: SymmetricKeyLength) -> Arc { + Arc::new(DerivationAlgorithm::HKDF { + HKDF: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { + hmac: Arc::new(DigestAlgorithm::SHA_384 {}), + saltLength: 0, + inputKeyLength: keyLength, + outputKeyLength: keyLength + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(364,3) + pub fn HKDF_SHA_512(keyLength: SymmetricKeyLength) -> Arc { + Arc::new(DerivationAlgorithm::HKDF { + HKDF: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::HKDF::HKDF { + hmac: Arc::new(DigestAlgorithm::SHA_512 {}), + saltLength: 32, + inputKeyLength: keyLength, + outputKeyLength: keyLength + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(541,3) + pub fn GetSuite(id: &Arc) -> AlgorithmSuite { + let mut _source0: Arc = id.clone(); + if matches!((&_source0).as_ref(), ESDK{ .. }) { + let mut ___mcc_h0: Arc = _source0.ESDK().clone(); + let mut e: Arc = ___mcc_h0.clone(); + _default::GetESDKSuite(&e) + } else { + let mut ___mcc_h1: Arc = _source0.DBE().clone(); + let mut e: Arc = ___mcc_h1.clone(); + _default::GetDBESuite(&e) + } + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(581,3) + pub fn GetDBESuite(id: &Arc) -> AlgorithmSuite { + _default::SupportedDBEAlgorithmSuites().get(id) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(623,3) + pub fn GetESDKSuite(id: &Arc) -> AlgorithmSuite { + _default::SupportedESDKAlgorithmSuites().get(id) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(646,3) + pub fn GetEncryptKeyLength(a: &Arc) -> i32 { + let mut _source0: Arc = a.encrypt().clone(); + let mut ___mcc_h0: Arc = _source0.AES_GCM().clone(); + let mut e: Arc = ___mcc_h0.clone(); + e.keyLength().clone() + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(657,3) + pub fn GetEncryptTagLength(a: &Arc) -> i32 { + let mut _source0: Arc = a.encrypt().clone(); + let mut ___mcc_h0: Arc = _source0.AES_GCM().clone(); + let mut e: Arc = ___mcc_h0.clone(); + e.tagLength().clone() + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(668,3) + pub fn GetEncryptIvLength(a: &Arc) -> i32 { + let mut _source0: Arc = a.encrypt().clone(); + let mut ___mcc_h0: Arc = _source0.AES_GCM().clone(); + let mut e: Arc = ___mcc_h0.clone(); + e.ivLength().clone() + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(699,3) + pub fn GetAlgorithmSuiteInfo(_binaryId_q: &Sequence) -> Arc, Arc>> { + let mut valueOrError0: Arc>> = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(_default::AlgorithmSuiteInfoByBinaryId().contains(_binaryId_q), &Arc::new(Error::AwsCryptographicMaterialProvidersException { + message: string_utf16_of("Invalid BinaryId") + })); + if valueOrError0.IsFailure() { + valueOrError0.PropagateFailure::() + } else { + Arc::new(Result::>::Success { + value: _default::AlgorithmSuiteInfoByBinaryId().get(_binaryId_q) + }) } + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(318,3) + pub fn Bits128() -> i32 { + 16 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(319,3) + pub fn TagLen() -> i32 { + 16 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(320,3) + pub fn IvLen() -> i32 { + 12 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(322,3) + pub fn AES_128_GCM_IV12_TAG16() -> Arc { + Arc::new(Encrypt::AES_GCM { + AES_GCM: Arc::new(AES_GCM::AES_GCM { + keyLength: _default::Bits128(), + tagLength: _default::TagLen(), + ivLength: _default::IvLen() + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(317,3) + pub fn Bits192() -> i32 { + 24 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(327,3) + pub fn AES_192_GCM_IV12_TAG16() -> Arc { + Arc::new(Encrypt::AES_GCM { + AES_GCM: Arc::new(AES_GCM::AES_GCM { + keyLength: _default::Bits192(), + tagLength: _default::TagLen(), + ivLength: _default::IvLen() + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(316,3) + pub fn Bits256() -> i32 { + 32 + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(332,3) + pub fn AES_256_GCM_IV12_TAG16() -> Arc { + Arc::new(Encrypt::AES_GCM { + AES_GCM: Arc::new(AES_GCM::AES_GCM { + keyLength: _default::Bits256(), + tagLength: _default::TagLen(), + ivLength: _default::IvLen() + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(377,3) + pub fn EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() -> Arc { + Arc::new(EdkWrappingAlgorithm::IntermediateKeyWrapping { + IntermediateKeyWrapping: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IntermediateKeyWrapping::IntermediateKeyWrapping { + keyEncryptionKeyKdf: _default::HKDF_SHA_512(_default::Bits256()), + macKeyKdf: _default::HKDF_SHA_512(_default::Bits256()), + pdkEncryptAlgorithm: _default::AES_256_GCM_IV12_TAG16() + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(387,3) + pub fn DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::DBE { + DBE: Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}) + }), + binaryId: seq![103, 0], + messageVersion: 1, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_512(_default::Bits256()), + commitment: _default::HKDF_SHA_512(_default::Bits256()), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::HMAC { + HMAC: Arc::new(DigestAlgorithm::SHA_384 {}) + }), + edkWrapping: _default::EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(398,3) + pub fn DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::DBE { + DBE: Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {}) + }), + binaryId: seq![103, 1], + messageVersion: 1, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_512(_default::Bits256()), + commitment: _default::HKDF_SHA_512(_default::Bits256()), + signature: Arc::new(SignatureAlgorithm::ECDSA { + ECDSA: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { + curve: Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) + }) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::HMAC { + HMAC: Arc::new(DigestAlgorithm::SHA_384 {}) + }), + edkWrapping: _default::EDK_INTERMEDIATE_WRAPPING_AES_GCM_256_HKDF_SHA_512() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(413,3) + pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}) + }), + binaryId: seq![0, 20], + messageVersion: 1, + encrypt: _default::AES_128_GCM_IV12_TAG16(), + kdf: Arc::new(DerivationAlgorithm::IDENTITY { + IDENTITY: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) + }), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(424,3) + pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}) + }), + binaryId: seq![0, 70], + messageVersion: 1, + encrypt: _default::AES_192_GCM_IV12_TAG16(), + kdf: Arc::new(DerivationAlgorithm::IDENTITY { + IDENTITY: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) + }), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(435,3) + pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}) + }), + binaryId: seq![0, 120], + messageVersion: 1, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: Arc::new(DerivationAlgorithm::IDENTITY { + IDENTITY: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IDENTITY::IDENTITY {}) + }), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(448,3) + pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}) + }), + binaryId: seq![1, 20], + messageVersion: 1, + encrypt: _default::AES_128_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_256(_default::Bits128()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(459,3) + pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}) + }), + binaryId: seq![1, 70], + messageVersion: 1, + encrypt: _default::AES_192_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_256(_default::Bits192()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(470,3) + pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}) + }), + binaryId: seq![1, 120], + messageVersion: 1, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_256(_default::Bits256()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(483,3) + pub fn ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}) + }), + binaryId: seq![2, 20], + messageVersion: 1, + encrypt: _default::AES_128_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_256(_default::Bits128()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::ECDSA { + ECDSA: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { + curve: Arc::new(ECDSASignatureAlgorithm::ECDSA_P256 {}) + }) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(494,3) + pub fn ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}) + }), + binaryId: seq![3, 70], + messageVersion: 1, + encrypt: _default::AES_192_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_384(_default::Bits192()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::ECDSA { + ECDSA: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { + curve: Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) + }) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(505,3) + pub fn ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}) + }), + binaryId: seq![3, 120], + messageVersion: 1, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_384(_default::Bits256()), + commitment: Arc::new(DerivationAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + signature: Arc::new(SignatureAlgorithm::ECDSA { + ECDSA: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { + curve: Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) + }) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(518,3) + pub fn ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}) + }), + binaryId: seq![4, 120], + messageVersion: 2, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_512(_default::Bits256()), + commitment: _default::HKDF_SHA_512(_default::Bits256()), + signature: Arc::new(SignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(529,3) + pub fn ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384() -> AlgorithmSuite { + Arc::new(AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Arc::new(AlgorithmSuiteId::ESDK { + ESDK: Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {}) + }), + binaryId: seq![5, 120], + messageVersion: 2, + encrypt: _default::AES_256_GCM_IV12_TAG16(), + kdf: _default::HKDF_SHA_512(_default::Bits256()), + commitment: _default::HKDF_SHA_512(_default::Bits256()), + signature: Arc::new(SignatureAlgorithm::ECDSA { + ECDSA: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ECDSA::ECDSA { + curve: Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}) + }) + }), + symmetricSignature: Arc::new(SymmetricSignatureAlgorithm::None { + _None: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::None::None {}) + }), + edkWrapping: Arc::new(EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {}) + }) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(605,3) + pub fn SupportedESDKAlgorithmSuites() -> Map, AlgorithmSuite> { + map![(Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {})) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {})) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY()), (Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {})) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384())] + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(572,3) + pub fn SupportedDBEAlgorithmSuites() -> Map, AlgorithmSuite> { + map![(Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {})) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384()), (Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {})) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384())] + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(679,3) + pub fn AlgorithmSuiteInfoByBinaryId() -> Map, AlgorithmSuite> { + map![(seq![0, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_NO_KDF()), (seq![0, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_NO_KDF()), (seq![0, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_NO_KDF()), (seq![1, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256()), (seq![1, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256()), (seq![1, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256()), (seq![2, 20]) => (_default::ESDK_ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256()), (seq![3, 70]) => (_default::ESDK_ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (seq![3, 120]) => (_default::ESDK_ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384()), (seq![4, 120]) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY()), (seq![5, 120]) => (_default::ESDK_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384()), (seq![103, 0]) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384()), (seq![103, 1]) => (_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384())] + } + } - #[derive(PartialEq, Clone)] - pub enum AES_GCM { - AES_GCM { - keyLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength, - tagLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bytes, - ivLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/AlgorithmSuites.dfy(313,3) + pub type AlgorithmSuite = Arc; +} +pub mod software { + pub mod amazon { + pub mod cryptography { + pub mod primitives { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/Index.dfy(7,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CryptoConfig; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Error; + pub use crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRandomBytesInput; + pub use ::dafny_runtime::Sequence; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HMacInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfExtractInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfExpandInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::HkdfInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::KdfCtrInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AesKdfCtrInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESEncryptOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AESDecryptInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateRSAKeyPairOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetRSAKeyModulusLengthOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSADecryptInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAEncryptInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECDSASignatureKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSAVerifyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GenerateECCKeyPairOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::GetPublicKeyFromPrivateKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ValidatePublicKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DeriveSharedSecretOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::CompressPublicKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DecompressPublicKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ParsePublicKeyOutput; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/Index.dfy(10,3) + pub fn DefaultCryptoConfig() -> Arc { + Arc::new(CryptoConfig::CryptoConfig {}) + } + /// END MANUAL FIX + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/Index.dfy(14,3) + pub fn AtomicPrimitives(config: &Arc) -> Arc, Arc>> { + let mut res: Arc, Arc>>; + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient::_ctor(&_nw0, &Arc::new(Config::Config {})); + client = _nw0.clone(); + res = Arc::new(Result::, Arc>::Success { + value: client.clone() + }); + return res.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(721,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(724,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl AES_GCM { - pub fn keyLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength { - match self { - AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => keyLength, - } - } - pub fn tagLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bytes { - match self { - AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => tagLength, - } - } - pub fn ivLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits { - match self { - AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => ivLength, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/Index.dfy(27,3) + pub struct AtomicPrimitivesClient { + pub __i_config: Arc + } - impl Debug - for AES_GCM { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AtomicPrimitivesClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/src/Index.dfy(35,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(735,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl DafnyPrint - for AES_GCM { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AES__GCM.AES__GCM(")?; - DafnyPrint::fmt_print(keyLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(tagLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ivLength, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { + UpcastObjectFn!(DynAny); + } - impl Eq - for AES_GCM {} + impl IAwsCryptographicPrimitivesClient + for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(744,5) + fn GenerateRandomBytes(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateRandomBytes(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(764,5) + fn Digest(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::Digest(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(783,5) + fn HMac(&self, input: &Arc) -> Arc, Arc>> { + crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::HMac(&self.config().clone(), input) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(793,5) + fn HkdfExtract(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::HkdfExtract(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(813,5) + fn HkdfExpand(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::HkdfExpand(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(833,5) + fn Hkdf(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::Hkdf(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(853,5) + fn KdfCounterMode(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::KdfCounterMode(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(873,5) + fn AesKdfCounterMode(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::AesKdfCounterMode(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(893,5) + fn AESEncrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::AESEncrypt(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(913,5) + fn AESDecrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::AESDecrypt(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(933,5) + fn GenerateRSAKeyPair(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateRSAKeyPair(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(952,5) + fn GetRSAKeyModulusLength(&self, input: &Arc) -> Arc, Arc>> { + crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GetRSAKeyModulusLength(&self.config().clone(), input) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(962,5) + fn RSADecrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::RSADecrypt(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(982,5) + fn RSAEncrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::RSAEncrypt(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1002,5) + fn GenerateECDSASignatureKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateECDSASignatureKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1022,5) + fn ECDSASign(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::ECDSASign(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1042,5) + fn ECDSAVerify(&self, input: &Arc) -> Arc>> { + let mut output: Arc>>; + let mut _out0: Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::ECDSAVerify(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1062,5) + fn GenerateECCKeyPair(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GenerateECCKeyPair(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1082,5) + fn GetPublicKeyFromPrivateKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::GetPublicKeyFromPrivateKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1102,5) + fn ValidatePublicKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::ValidatePublicKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1122,5) + fn DeriveSharedSecret(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::DeriveSharedSecret(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1142,5) + fn CompressPublicKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::CompressPublicKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1162,5) + fn DecompressPublicKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::DecompressPublicKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(1182,5) + fn ParsePublicKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyPrimitivesOperations_Compile::_default::ParsePublicKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl Hash - for AES_GCM { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => { - Hash::hash(keyLength, _state); - Hash::hash(tagLength, _state); - Hash::hash(ivLength, _state) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient { + UpcastObjectFn!(dyn IAwsCryptographicPrimitivesClient); + } - impl Default - for AES_GCM { - fn default() -> AES_GCM { - AES_GCM::AES_GCM { - keyLength: Default::default(), - tagLength: Default::default(), - ivLength: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(5,1) + pub mod types { + pub use ::dafny_runtime::truncate; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::Sequence; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::DafnyCharUTF16; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(606,3) + pub fn IsValid_PositiveInteger(x: i32) -> bool { + !(x < truncate!(int!(0), i32)) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(620,3) + pub fn IsValid_RSAModulusLengthBits(x: i32) -> bool { + !(x < truncate!(int!(81), i32)) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(624,3) + pub fn IsValid_RSAModulusLengthBitsToGenerate(x: i32) -> bool { + !(x < truncate!(int!(81), i32)) && !(truncate!(int!(4096), i32) < x) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(642,3) + pub fn IsValid_SymmetricKeyLength(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(32), i32) < x) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(646,3) + pub fn IsValid_Uint8Bits(x: i32) -> bool { + !(x < truncate!(int!(0), i32)) && !(truncate!(int!(255), i32) < x) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(650,3) + pub fn IsValid_Uint8Bytes(x: i32) -> bool { + !(x < truncate!(int!(0), i32)) && !(truncate!(int!(32), i32) < x) + } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(699,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl AsRef - for &AES_GCM { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(11,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - #[derive(PartialEq, Clone)] - pub enum AESDecryptInput { - AESDecryptInput { - encAlg: Rc, - key: Sequence, - cipherTxt: Sequence, - authTag: Sequence, - iv: Sequence, - aad: Sequence - } - } - - impl AESDecryptInput { - pub fn encAlg(&self) -> &Rc { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => encAlg, - } - } - pub fn key(&self) -> &Sequence { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => key, - } - } - pub fn cipherTxt(&self) -> &Sequence { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => cipherTxt, - } - } - pub fn authTag(&self) -> &Sequence { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => authTag, - } - } - pub fn iv(&self) -> &Sequence { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => iv, - } - } - pub fn aad(&self) -> &Sequence { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => aad, - } - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl Debug - for AESDecryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for AESDecryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESDecryptInput.AESDecryptInput(")?; - DafnyPrint::fmt_print(encAlg, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cipherTxt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(authTag, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(iv, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(aad, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for AESDecryptInput {} + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Hash - for AESDecryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => { - Hash::hash(encAlg, _state); - Hash::hash(key, _state); - Hash::hash(cipherTxt, _state); - Hash::hash(authTag, _state); - Hash::hash(iv, _state); - Hash::hash(aad, _state) - }, - } - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl Default - for AESDecryptInput { - fn default() -> AESDecryptInput { - AESDecryptInput::AESDecryptInput { - encAlg: Default::default(), - key: Default::default(), - cipherTxt: Default::default(), - authTag: Default::default(), - iv: Default::default(), - aad: Default::default() - } - } - } - - impl AsRef - for &AESDecryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum AESEncryptInput { - AESEncryptInput { - encAlg: Rc, - iv: Sequence, - key: Sequence, - msg: Sequence, - aad: Sequence - } - } - - impl AESEncryptInput { - pub fn encAlg(&self) -> &Rc { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => encAlg, - } - } - pub fn iv(&self) -> &Sequence { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => iv, - } - } - pub fn key(&self) -> &Sequence { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => key, - } - } - pub fn msg(&self) -> &Sequence { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => msg, - } - } - pub fn aad(&self) -> &Sequence { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => aad, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(15,3) + #[derive(PartialEq, Clone)] + pub enum AES_CTR { + AES_CTR { + keyLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength, + nonceLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits + } + } - impl Debug - for AESEncryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AES_CTR { + /// Returns a borrow of the field keyLength + pub fn keyLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength { + match self { + AES_CTR::AES_CTR{keyLength, nonceLength, } => keyLength, + } + } + /// Returns a borrow of the field nonceLength + pub fn nonceLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits { + match self { + AES_CTR::AES_CTR{keyLength, nonceLength, } => nonceLength, + } + } + } - impl DafnyPrint - for AESEncryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESEncryptInput.AESEncryptInput(")?; - DafnyPrint::fmt_print(encAlg, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(iv, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(msg, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(aad, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for AES_CTR { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AESEncryptInput {} + impl DafnyPrint + for AES_CTR { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AES_CTR::AES_CTR{keyLength, nonceLength, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AES__CTR.AES__CTR(")?; + DafnyPrint::fmt_print(keyLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(nonceLength, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AESEncryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => { - Hash::hash(encAlg, _state); - Hash::hash(iv, _state); - Hash::hash(key, _state); - Hash::hash(msg, _state); - Hash::hash(aad, _state) - }, - } - } - } + impl Eq + for AES_CTR {} + + impl Hash + for AES_CTR { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AES_CTR::AES_CTR{keyLength, nonceLength, } => { + Hash::hash(keyLength, _state); + Hash::hash(nonceLength, _state) + }, + } + } + } - impl Default - for AESEncryptInput { - fn default() -> AESEncryptInput { - AESEncryptInput::AESEncryptInput { - encAlg: Default::default(), - iv: Default::default(), - key: Default::default(), - msg: Default::default(), - aad: Default::default() - } - } - } + impl Default + for AES_CTR { + fn default() -> AES_CTR { + AES_CTR::AES_CTR { + keyLength: Default::default(), + nonceLength: Default::default() + } + } + } - impl AsRef - for &AESEncryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for AES_CTR { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum AESEncryptOutput { - AESEncryptOutput { - cipherText: Sequence, - authTag: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(19,3) + #[derive(PartialEq, Clone)] + pub enum AES_GCM { + AES_GCM { + keyLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength, + tagLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bytes, + ivLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits + } + } - impl AESEncryptOutput { - pub fn cipherText(&self) -> &Sequence { - match self { - AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => cipherText, - } - } - pub fn authTag(&self) -> &Sequence { - match self { - AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => authTag, - } - } - } + impl AES_GCM { + /// Returns a borrow of the field keyLength + pub fn keyLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength { + match self { + AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => keyLength, + } + } + /// Returns a borrow of the field tagLength + pub fn tagLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bytes { + match self { + AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => tagLength, + } + } + /// Returns a borrow of the field ivLength + pub fn ivLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::Uint8Bits { + match self { + AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => ivLength, + } + } + } - impl Debug - for AESEncryptOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for AES_GCM { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for AESEncryptOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESEncryptOutput.AESEncryptOutput(")?; - DafnyPrint::fmt_print(cipherText, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(authTag, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for AES_GCM { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AES__GCM.AES__GCM(")?; + DafnyPrint::fmt_print(keyLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(tagLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ivLength, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for AESEncryptOutput {} + impl Eq + for AES_GCM {} + + impl Hash + for AES_GCM { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AES_GCM::AES_GCM{keyLength, tagLength, ivLength, } => { + Hash::hash(keyLength, _state); + Hash::hash(tagLength, _state); + Hash::hash(ivLength, _state) + }, + } + } + } - impl Hash - for AESEncryptOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => { - Hash::hash(cipherText, _state); - Hash::hash(authTag, _state) - }, - } - } - } + impl Default + for AES_GCM { + fn default() -> AES_GCM { + AES_GCM::AES_GCM { + keyLength: Default::default(), + tagLength: Default::default(), + ivLength: Default::default() + } + } + } - impl Default - for AESEncryptOutput { - fn default() -> AESEncryptOutput { - AESEncryptOutput::AESEncryptOutput { - cipherText: Default::default(), - authTag: Default::default() - } - } - } + impl AsRef + for AES_GCM { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &AESEncryptOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(24,3) + #[derive(PartialEq, Clone)] + pub enum AESDecryptInput { + AESDecryptInput { + encAlg: Arc, + key: Sequence, + cipherTxt: Sequence, + authTag: Sequence, + iv: Sequence, + aad: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum AesKdfCtrInput { - AesKdfCtrInput { - ikm: Sequence, - expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, - nonce: Rc>> - } - } + impl AESDecryptInput { + /// Returns a borrow of the field encAlg + pub fn encAlg(&self) -> &Arc { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => encAlg, + } + } + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => key, + } + } + /// Returns a borrow of the field cipherTxt + pub fn cipherTxt(&self) -> &Sequence { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => cipherTxt, + } + } + /// Returns a borrow of the field authTag + pub fn authTag(&self) -> &Sequence { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => authTag, + } + } + /// Returns a borrow of the field iv + pub fn iv(&self) -> &Sequence { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => iv, + } + } + /// Returns a borrow of the field aad + pub fn aad(&self) -> &Sequence { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => aad, + } + } + } - impl AesKdfCtrInput { - pub fn ikm(&self) -> &Sequence { - match self { - AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => ikm, - } - } - pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => expectedLength, - } - } - pub fn nonce(&self) -> &Rc>> { - match self { - AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => nonce, - } - } - } + impl Debug + for AESDecryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for AesKdfCtrInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for AESDecryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESDecryptInput.AESDecryptInput(")?; + DafnyPrint::fmt_print(encAlg, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cipherTxt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(authTag, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(iv, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(aad, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for AesKdfCtrInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AesKdfCtrInput.AesKdfCtrInput(")?; - DafnyPrint::fmt_print(ikm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expectedLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(nonce, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for AESDecryptInput {} + + impl Hash + for AESDecryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AESDecryptInput::AESDecryptInput{encAlg, key, cipherTxt, authTag, iv, aad, } => { + Hash::hash(encAlg, _state); + Hash::hash(key, _state); + Hash::hash(cipherTxt, _state); + Hash::hash(authTag, _state); + Hash::hash(iv, _state); + Hash::hash(aad, _state) + }, + } + } + } - impl Eq - for AesKdfCtrInput {} + impl Default + for AESDecryptInput { + fn default() -> AESDecryptInput { + AESDecryptInput::AESDecryptInput { + encAlg: Default::default(), + key: Default::default(), + cipherTxt: Default::default(), + authTag: Default::default(), + iv: Default::default(), + aad: Default::default() + } + } + } - impl Hash - for AesKdfCtrInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => { - Hash::hash(ikm, _state); - Hash::hash(expectedLength, _state); - Hash::hash(nonce, _state) - }, - } - } - } + impl AsRef + for AESDecryptInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for AesKdfCtrInput { - fn default() -> AesKdfCtrInput { - AesKdfCtrInput::AesKdfCtrInput { - ikm: Default::default(), - expectedLength: Default::default(), - nonce: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(32,3) + #[derive(PartialEq, Clone)] + pub enum AESEncryptInput { + AESEncryptInput { + encAlg: Arc, + iv: Sequence, + key: Sequence, + msg: Sequence, + aad: Sequence + } + } - impl AsRef - for &AesKdfCtrInput { - fn as_ref(&self) -> Self { - self - } - } - - pub struct IAwsCryptographicPrimitivesClientCallHistory {} - - impl IAwsCryptographicPrimitivesClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClientCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IAwsCryptographicPrimitivesClient: Any + UpcastObject { - fn GenerateRandomBytes(&self, input: &Rc) -> Rc, Rc>>; - fn Digest(&self, input: &Rc) -> Rc, Rc>>; - fn HMac(&self, input: &Rc) -> Rc, Rc>>; - fn HkdfExtract(&self, input: &Rc) -> Rc, Rc>>; - fn HkdfExpand(&self, input: &Rc) -> Rc, Rc>>; - fn Hkdf(&self, input: &Rc) -> Rc, Rc>>; - fn KdfCounterMode(&self, input: &Rc) -> Rc, Rc>>; - fn AesKdfCounterMode(&self, input: &Rc) -> Rc, Rc>>; - fn AESEncrypt(&self, input: &Rc) -> Rc, Rc>>; - fn AESDecrypt(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateRSAKeyPair(&self, input: &Rc) -> Rc, Rc>>; - fn GetRSAKeyModulusLength(&self, input: &Rc) -> Rc, Rc>>; - fn RSADecrypt(&self, input: &Rc) -> Rc, Rc>>; - fn RSAEncrypt(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateECDSASignatureKey(&self, input: &Rc) -> Rc, Rc>>; - fn ECDSASign(&self, input: &Rc) -> Rc, Rc>>; - fn ECDSAVerify(&self, input: &Rc) -> Rc>>; - fn GenerateECCKeyPair(&self, input: &Rc) -> Rc, Rc>>; - fn GetPublicKeyFromPrivateKey(&self, input: &Rc) -> Rc, Rc>>; - fn ValidatePublicKey(&self, input: &Rc) -> Rc, Rc>>; - fn DeriveSharedSecret(&self, input: &Rc) -> Rc, Rc>>; - fn CompressPublicKey(&self, input: &Rc) -> Rc, Rc>>; - fn DecompressPublicKey(&self, input: &Rc) -> Rc, Rc>>; - fn ParsePublicKey(&self, input: &Rc) -> Rc, Rc>>; - } + impl AESEncryptInput { + /// Returns a borrow of the field encAlg + pub fn encAlg(&self) -> &Arc { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => encAlg, + } + } + /// Returns a borrow of the field iv + pub fn iv(&self) -> &Sequence { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => iv, + } + } + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => key, + } + } + /// Returns a borrow of the field msg + pub fn msg(&self) -> &Sequence { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => msg, + } + } + /// Returns a borrow of the field aad + pub fn aad(&self) -> &Sequence { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => aad, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CompressPublicKeyInput { - CompressPublicKeyInput { - publicKey: Rc, - eccCurve: Rc - } - } + impl Debug + for AESEncryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl CompressPublicKeyInput { - pub fn publicKey(&self) -> &Rc { - match self { - CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => publicKey, - } - } - pub fn eccCurve(&self) -> &Rc { - match self { - CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => eccCurve, - } - } - } + impl DafnyPrint + for AESEncryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESEncryptInput.AESEncryptInput(")?; + DafnyPrint::fmt_print(encAlg, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(iv, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(msg, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(aad, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for CompressPublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for AESEncryptInput {} + + impl Hash + for AESEncryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AESEncryptInput::AESEncryptInput{encAlg, iv, key, msg, aad, } => { + Hash::hash(encAlg, _state); + Hash::hash(iv, _state); + Hash::hash(key, _state); + Hash::hash(msg, _state); + Hash::hash(aad, _state) + }, + } + } + } - impl DafnyPrint - for CompressPublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CompressPublicKeyInput.CompressPublicKeyInput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for AESEncryptInput { + fn default() -> AESEncryptInput { + AESEncryptInput::AESEncryptInput { + encAlg: Default::default(), + iv: Default::default(), + key: Default::default(), + msg: Default::default(), + aad: Default::default() + } + } + } - impl Eq - for CompressPublicKeyInput {} + impl AsRef + for AESEncryptInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for CompressPublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => { - Hash::hash(publicKey, _state); - Hash::hash(eccCurve, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(39,3) + #[derive(PartialEq, Clone)] + pub enum AESEncryptOutput { + AESEncryptOutput { + cipherText: Sequence, + authTag: Sequence + } + } - impl Default - for CompressPublicKeyInput { - fn default() -> CompressPublicKeyInput { - CompressPublicKeyInput::CompressPublicKeyInput { - publicKey: Default::default(), - eccCurve: Default::default() - } - } - } + impl AESEncryptOutput { + /// Returns a borrow of the field cipherText + pub fn cipherText(&self) -> &Sequence { + match self { + AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => cipherText, + } + } + /// Returns a borrow of the field authTag + pub fn authTag(&self) -> &Sequence { + match self { + AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => authTag, + } + } + } - impl AsRef - for &CompressPublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for AESEncryptOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum CompressPublicKeyOutput { - CompressPublicKeyOutput { - compressedPublicKey: Sequence - } - } + impl DafnyPrint + for AESEncryptOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AESEncryptOutput.AESEncryptOutput(")?; + DafnyPrint::fmt_print(cipherText, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(authTag, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl CompressPublicKeyOutput { - pub fn compressedPublicKey(&self) -> &Sequence { - match self { - CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => compressedPublicKey, - } - } - } + impl Eq + for AESEncryptOutput {} + + impl Hash + for AESEncryptOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AESEncryptOutput::AESEncryptOutput{cipherText, authTag, } => { + Hash::hash(cipherText, _state); + Hash::hash(authTag, _state) + }, + } + } + } - impl Debug - for CompressPublicKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for AESEncryptOutput { + fn default() -> AESEncryptOutput { + AESEncryptOutput::AESEncryptOutput { + cipherText: Default::default(), + authTag: Default::default() + } + } + } - impl DafnyPrint - for CompressPublicKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CompressPublicKeyOutput.CompressPublicKeyOutput(")?; - DafnyPrint::fmt_print(compressedPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for AESEncryptOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for CompressPublicKeyOutput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(43,3) + #[derive(PartialEq, Clone)] + pub enum AesKdfCtrInput { + AesKdfCtrInput { + ikm: Sequence, + expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, + nonce: Arc>> + } + } - impl Hash - for CompressPublicKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => { - Hash::hash(compressedPublicKey, _state) - }, - } - } - } + impl AesKdfCtrInput { + /// Returns a borrow of the field ikm + pub fn ikm(&self) -> &Sequence { + match self { + AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => ikm, + } + } + /// Returns a borrow of the field expectedLength + pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => expectedLength, + } + } + /// Returns a borrow of the field nonce + pub fn nonce(&self) -> &Arc>> { + match self { + AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => nonce, + } + } + } - impl Default - for CompressPublicKeyOutput { - fn default() -> CompressPublicKeyOutput { - CompressPublicKeyOutput::CompressPublicKeyOutput { - compressedPublicKey: Default::default() - } - } - } + impl Debug + for AesKdfCtrInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &CompressPublicKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for AesKdfCtrInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.AesKdfCtrInput.AesKdfCtrInput(")?; + DafnyPrint::fmt_print(ikm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expectedLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(nonce, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CryptoConfig { - CryptoConfig {} - } + impl Eq + for AesKdfCtrInput {} + + impl Hash + for AesKdfCtrInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AesKdfCtrInput::AesKdfCtrInput{ikm, expectedLength, nonce, } => { + Hash::hash(ikm, _state); + Hash::hash(expectedLength, _state); + Hash::hash(nonce, _state) + }, + } + } + } - impl CryptoConfig {} + impl Default + for AesKdfCtrInput { + fn default() -> AesKdfCtrInput { + AesKdfCtrInput::AesKdfCtrInput { + ikm: Default::default(), + expectedLength: Default::default(), + nonce: Default::default() + } + } + } - impl Debug - for CryptoConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for AesKdfCtrInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CryptoConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CryptoConfig::CryptoConfig{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CryptoConfig.CryptoConfig")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(48,3) + pub struct IAwsCryptographicPrimitivesClientCallHistory {} - impl CryptoConfig { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CryptoConfig::CryptoConfig {})].iter() - } - } + impl IAwsCryptographicPrimitivesClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Eq - for CryptoConfig {} + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl Hash - for CryptoConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CryptoConfig::CryptoConfig{} => { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(100,3) + pub trait IAwsCryptographicPrimitivesClient: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(129,5) + fn GenerateRandomBytes(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(144,5) + fn Digest(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(159,5) + fn HMac(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(165,5) + fn HkdfExtract(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(180,5) + fn HkdfExpand(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(195,5) + fn Hkdf(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(210,5) + fn KdfCounterMode(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(225,5) + fn AesKdfCounterMode(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(240,5) + fn AESEncrypt(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(255,5) + fn AESDecrypt(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(270,5) + fn GenerateRSAKeyPair(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(285,5) + fn GetRSAKeyModulusLength(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(291,5) + fn RSADecrypt(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(306,5) + fn RSAEncrypt(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(321,5) + fn GenerateECDSASignatureKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(336,5) + fn ECDSASign(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(351,5) + fn ECDSAVerify(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(366,5) + fn GenerateECCKeyPair(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(381,5) + fn GetPublicKeyFromPrivateKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(396,5) + fn ValidatePublicKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(411,5) + fn DeriveSharedSecret(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(426,5) + fn CompressPublicKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(441,5) + fn DecompressPublicKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(456,5) + fn ParsePublicKey(&self, input: &Arc) -> Arc, Arc>>; + } - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(470,3) + #[derive(PartialEq, Clone)] + pub enum CompressPublicKeyInput { + CompressPublicKeyInput { + publicKey: Arc, + eccCurve: Arc + } + } - impl Default - for CryptoConfig { - fn default() -> CryptoConfig { - CryptoConfig::CryptoConfig {} - } - } + impl CompressPublicKeyInput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => publicKey, + } + } + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => eccCurve, + } + } + } - impl AsRef - for &CryptoConfig { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for CompressPublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DecompressPublicKeyInput { - DecompressPublicKeyInput { - compressedPublicKey: Sequence, - eccCurve: Rc - } - } + impl DafnyPrint + for CompressPublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CompressPublicKeyInput.CompressPublicKeyInput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DecompressPublicKeyInput { - pub fn compressedPublicKey(&self) -> &Sequence { - match self { - DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => compressedPublicKey, - } - } - pub fn eccCurve(&self) -> &Rc { - match self { - DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => eccCurve, - } - } - } + impl Eq + for CompressPublicKeyInput {} + + impl Hash + for CompressPublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CompressPublicKeyInput::CompressPublicKeyInput{publicKey, eccCurve, } => { + Hash::hash(publicKey, _state); + Hash::hash(eccCurve, _state) + }, + } + } + } - impl Debug - for DecompressPublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CompressPublicKeyInput { + fn default() -> CompressPublicKeyInput { + CompressPublicKeyInput::CompressPublicKeyInput { + publicKey: Default::default(), + eccCurve: Default::default() + } + } + } - impl DafnyPrint - for DecompressPublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DecompressPublicKeyInput.DecompressPublicKeyInput(")?; - DafnyPrint::fmt_print(compressedPublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CompressPublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecompressPublicKeyInput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(474,3) + #[derive(PartialEq, Clone)] + pub enum CompressPublicKeyOutput { + CompressPublicKeyOutput { + compressedPublicKey: Sequence + } + } - impl Hash - for DecompressPublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => { - Hash::hash(compressedPublicKey, _state); - Hash::hash(eccCurve, _state) - }, - } - } - } + impl CompressPublicKeyOutput { + /// Returns a borrow of the field compressedPublicKey + pub fn compressedPublicKey(&self) -> &Sequence { + match self { + CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => compressedPublicKey, + } + } + } - impl Default - for DecompressPublicKeyInput { - fn default() -> DecompressPublicKeyInput { - DecompressPublicKeyInput::DecompressPublicKeyInput { - compressedPublicKey: Default::default(), - eccCurve: Default::default() - } - } - } + impl Debug + for CompressPublicKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DecompressPublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CompressPublicKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CompressPublicKeyOutput.CompressPublicKeyOutput(")?; + DafnyPrint::fmt_print(compressedPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DecompressPublicKeyOutput { - DecompressPublicKeyOutput { - publicKey: Rc - } - } + impl Eq + for CompressPublicKeyOutput {} - impl DecompressPublicKeyOutput { - pub fn publicKey(&self) -> &Rc { - match self { - DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => publicKey, - } - } - } + impl Hash + for CompressPublicKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CompressPublicKeyOutput::CompressPublicKeyOutput{compressedPublicKey, } => { + Hash::hash(compressedPublicKey, _state) + }, + } + } + } - impl Debug - for DecompressPublicKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CompressPublicKeyOutput { + fn default() -> CompressPublicKeyOutput { + CompressPublicKeyOutput::CompressPublicKeyOutput { + compressedPublicKey: Default::default() + } + } + } - impl DafnyPrint - for DecompressPublicKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DecompressPublicKeyOutput.DecompressPublicKeyOutput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CompressPublicKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecompressPublicKeyOutput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(477,3) + #[derive(PartialEq, Clone)] + pub enum CryptoConfig { + CryptoConfig {} + } - impl Hash - for DecompressPublicKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => { - Hash::hash(publicKey, _state) - }, - } - } - } + impl CryptoConfig {} - impl Default - for DecompressPublicKeyOutput { - fn default() -> DecompressPublicKeyOutput { - DecompressPublicKeyOutput::DecompressPublicKeyOutput { - publicKey: Default::default() - } - } - } + impl Debug + for CryptoConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DecompressPublicKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CryptoConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CryptoConfig::CryptoConfig{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.CryptoConfig.CryptoConfig")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeriveSharedSecretInput { - DeriveSharedSecretInput { - eccCurve: Rc, - privateKey: Rc, - publicKey: Rc - } - } + impl CryptoConfig { + /// Enumerates all possible values of CryptoConfig + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CryptoConfig::CryptoConfig {})].iter() + } + } - impl DeriveSharedSecretInput { - pub fn eccCurve(&self) -> &Rc { - match self { - DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => eccCurve, - } - } - pub fn privateKey(&self) -> &Rc { - match self { - DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => privateKey, - } - } - pub fn publicKey(&self) -> &Rc { - match self { - DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => publicKey, - } - } - } + impl Eq + for CryptoConfig {} - impl Debug - for DeriveSharedSecretInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for CryptoConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CryptoConfig::CryptoConfig{} => { - impl DafnyPrint - for DeriveSharedSecretInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DeriveSharedSecretInput.DeriveSharedSecretInput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl Eq - for DeriveSharedSecretInput {} + impl Default + for CryptoConfig { + fn default() -> CryptoConfig { + CryptoConfig::CryptoConfig {} + } + } - impl Hash - for DeriveSharedSecretInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => { - Hash::hash(eccCurve, _state); - Hash::hash(privateKey, _state); - Hash::hash(publicKey, _state) - }, - } - } - } + impl AsRef + for CryptoConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeriveSharedSecretInput { - fn default() -> DeriveSharedSecretInput { - DeriveSharedSecretInput::DeriveSharedSecretInput { - eccCurve: Default::default(), - privateKey: Default::default(), - publicKey: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(480,3) + #[derive(PartialEq, Clone)] + pub enum DecompressPublicKeyInput { + DecompressPublicKeyInput { + compressedPublicKey: Sequence, + eccCurve: Arc + } + } - impl AsRef - for &DeriveSharedSecretInput { - fn as_ref(&self) -> Self { - self - } - } + impl DecompressPublicKeyInput { + /// Returns a borrow of the field compressedPublicKey + pub fn compressedPublicKey(&self) -> &Sequence { + match self { + DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => compressedPublicKey, + } + } + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => eccCurve, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeriveSharedSecretOutput { - DeriveSharedSecretOutput { - sharedSecret: Sequence - } - } + impl Debug + for DecompressPublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeriveSharedSecretOutput { - pub fn sharedSecret(&self) -> &Sequence { - match self { - DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => sharedSecret, - } - } - } + impl DafnyPrint + for DecompressPublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DecompressPublicKeyInput.DecompressPublicKeyInput(")?; + DafnyPrint::fmt_print(compressedPublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeriveSharedSecretOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DecompressPublicKeyInput {} + + impl Hash + for DecompressPublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecompressPublicKeyInput::DecompressPublicKeyInput{compressedPublicKey, eccCurve, } => { + Hash::hash(compressedPublicKey, _state); + Hash::hash(eccCurve, _state) + }, + } + } + } - impl DafnyPrint - for DeriveSharedSecretOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DeriveSharedSecretOutput.DeriveSharedSecretOutput(")?; - DafnyPrint::fmt_print(sharedSecret, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DecompressPublicKeyInput { + fn default() -> DecompressPublicKeyInput { + DecompressPublicKeyInput::DecompressPublicKeyInput { + compressedPublicKey: Default::default(), + eccCurve: Default::default() + } + } + } - impl Eq - for DeriveSharedSecretOutput {} + impl AsRef + for DecompressPublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DeriveSharedSecretOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => { - Hash::hash(sharedSecret, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(484,3) + #[derive(PartialEq, Clone)] + pub enum DecompressPublicKeyOutput { + DecompressPublicKeyOutput { + publicKey: Arc + } + } - impl Default - for DeriveSharedSecretOutput { - fn default() -> DeriveSharedSecretOutput { - DeriveSharedSecretOutput::DeriveSharedSecretOutput { - sharedSecret: Default::default() - } - } - } + impl DecompressPublicKeyOutput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => publicKey, + } + } + } - impl AsRef - for &DeriveSharedSecretOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DecompressPublicKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DigestAlgorithm { - SHA_512 {}, - SHA_384 {}, - SHA_256 {} - } + impl DafnyPrint + for DecompressPublicKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DecompressPublicKeyOutput.DecompressPublicKeyOutput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DigestAlgorithm {} + impl Eq + for DecompressPublicKeyOutput {} - impl Debug - for DigestAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DecompressPublicKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecompressPublicKeyOutput::DecompressPublicKeyOutput{publicKey, } => { + Hash::hash(publicKey, _state) + }, + } + } + } - impl DafnyPrint - for DigestAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DigestAlgorithm::SHA_512{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__512")?; - Ok(()) - }, - DigestAlgorithm::SHA_384{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__384")?; - Ok(()) - }, - DigestAlgorithm::SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__256")?; - Ok(()) - }, - } - } - } + impl Default + for DecompressPublicKeyOutput { + fn default() -> DecompressPublicKeyOutput { + DecompressPublicKeyOutput::DecompressPublicKeyOutput { + publicKey: Default::default() + } + } + } - impl DigestAlgorithm { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DigestAlgorithm::SHA_512 {}), Rc::new(DigestAlgorithm::SHA_384 {}), Rc::new(DigestAlgorithm::SHA_256 {})].iter() - } - } + impl AsRef + for DecompressPublicKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DigestAlgorithm {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(487,3) + #[derive(PartialEq, Clone)] + pub enum DeriveSharedSecretInput { + DeriveSharedSecretInput { + eccCurve: Arc, + privateKey: Arc, + publicKey: Arc + } + } - impl Hash - for DigestAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DigestAlgorithm::SHA_512{} => { + impl DeriveSharedSecretInput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => eccCurve, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc { + match self { + DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => privateKey, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => publicKey, + } + } + } - }, - DigestAlgorithm::SHA_384{} => { + impl Debug + for DeriveSharedSecretInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - DigestAlgorithm::SHA_256{} => { + impl DafnyPrint + for DeriveSharedSecretInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DeriveSharedSecretInput.DeriveSharedSecretInput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for DeriveSharedSecretInput {} + + impl Hash + for DeriveSharedSecretInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeriveSharedSecretInput::DeriveSharedSecretInput{eccCurve, privateKey, publicKey, } => { + Hash::hash(eccCurve, _state); + Hash::hash(privateKey, _state); + Hash::hash(publicKey, _state) + }, + } + } + } - impl Default - for DigestAlgorithm { - fn default() -> DigestAlgorithm { - DigestAlgorithm::SHA_512 {} - } - } + impl Default + for DeriveSharedSecretInput { + fn default() -> DeriveSharedSecretInput { + DeriveSharedSecretInput::DeriveSharedSecretInput { + eccCurve: Default::default(), + privateKey: Default::default(), + publicKey: Default::default() + } + } + } - impl AsRef - for &DigestAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DeriveSharedSecretInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum DigestInput { - DigestInput { - digestAlgorithm: Rc, - message: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(492,3) + #[derive(PartialEq, Clone)] + pub enum DeriveSharedSecretOutput { + DeriveSharedSecretOutput { + sharedSecret: Sequence + } + } - impl DigestInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - DigestInput::DigestInput{digestAlgorithm, message, } => digestAlgorithm, - } - } - pub fn message(&self) -> &Sequence { - match self { - DigestInput::DigestInput{digestAlgorithm, message, } => message, - } - } - } + impl DeriveSharedSecretOutput { + /// Returns a borrow of the field sharedSecret + pub fn sharedSecret(&self) -> &Sequence { + match self { + DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => sharedSecret, + } + } + } - impl Debug - for DigestInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DeriveSharedSecretOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DigestInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DigestInput::DigestInput{digestAlgorithm, message, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestInput.DigestInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DeriveSharedSecretOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DeriveSharedSecretOutput.DeriveSharedSecretOutput(")?; + DafnyPrint::fmt_print(sharedSecret, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DigestInput {} + impl Eq + for DeriveSharedSecretOutput {} - impl Hash - for DigestInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DigestInput::DigestInput{digestAlgorithm, message, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(message, _state) - }, - } - } - } + impl Hash + for DeriveSharedSecretOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeriveSharedSecretOutput::DeriveSharedSecretOutput{sharedSecret, } => { + Hash::hash(sharedSecret, _state) + }, + } + } + } - impl Default - for DigestInput { - fn default() -> DigestInput { - DigestInput::DigestInput { - digestAlgorithm: Default::default(), - message: Default::default() - } - } - } + impl Default + for DeriveSharedSecretOutput { + fn default() -> DeriveSharedSecretOutput { + DeriveSharedSecretOutput::DeriveSharedSecretOutput { + sharedSecret: Default::default() + } + } + } - impl AsRef - for &DigestInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DeriveSharedSecretOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ECCPrivateKey { - ECCPrivateKey { - pem: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(495,3) + #[derive(PartialEq, Clone)] + pub enum DigestAlgorithm { + SHA_512 {}, + SHA_384 {}, + SHA_256 {} + } - impl ECCPrivateKey { - pub fn pem(&self) -> &Sequence { - match self { - ECCPrivateKey::ECCPrivateKey{pem, } => pem, - } - } - } + impl DigestAlgorithm {} - impl Debug - for ECCPrivateKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DigestAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ECCPrivateKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECCPrivateKey::ECCPrivateKey{pem, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECCPrivateKey.ECCPrivateKey(")?; - DafnyPrint::fmt_print(pem, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DigestAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DigestAlgorithm::SHA_512{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__512")?; + Ok(()) + }, + DigestAlgorithm::SHA_384{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__384")?; + Ok(()) + }, + DigestAlgorithm::SHA_256{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestAlgorithm.SHA__256")?; + Ok(()) + }, + } + } + } - impl Eq - for ECCPrivateKey {} + impl DigestAlgorithm { + /// Enumerates all possible values of DigestAlgorithm + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DigestAlgorithm::SHA_512 {}), Arc::new(DigestAlgorithm::SHA_384 {}), Arc::new(DigestAlgorithm::SHA_256 {})].iter() + } + } - impl Hash - for ECCPrivateKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECCPrivateKey::ECCPrivateKey{pem, } => { - Hash::hash(pem, _state) - }, - } - } - } + impl Eq + for DigestAlgorithm {} - impl Default - for ECCPrivateKey { - fn default() -> ECCPrivateKey { - ECCPrivateKey::ECCPrivateKey { - pem: Default::default() - } - } - } + impl Hash + for DigestAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DigestAlgorithm::SHA_512{} => { - impl AsRef - for &ECCPrivateKey { - fn as_ref(&self) -> Self { - self - } - } + }, + DigestAlgorithm::SHA_384{} => { - #[derive(PartialEq, Clone)] - pub enum ECCPublicKey { - ECCPublicKey { - der: Sequence - } - } + }, + DigestAlgorithm::SHA_256{} => { - impl ECCPublicKey { - pub fn der(&self) -> &Sequence { - match self { - ECCPublicKey::ECCPublicKey{der, } => der, - } - } - } + }, + } + } + } - impl Debug - for ECCPublicKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DigestAlgorithm { + fn default() -> DigestAlgorithm { + DigestAlgorithm::SHA_512 {} + } + } - impl DafnyPrint - for ECCPublicKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECCPublicKey::ECCPublicKey{der, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECCPublicKey.ECCPublicKey(")?; - DafnyPrint::fmt_print(der, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DigestAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ECCPublicKey {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(499,3) + #[derive(PartialEq, Clone)] + pub enum DigestInput { + DigestInput { + digestAlgorithm: Arc, + message: Sequence + } + } - impl Hash - for ECCPublicKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECCPublicKey::ECCPublicKey{der, } => { - Hash::hash(der, _state) - }, - } - } - } + impl DigestInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + DigestInput::DigestInput{digestAlgorithm, message, } => digestAlgorithm, + } + } + /// Returns a borrow of the field message + pub fn message(&self) -> &Sequence { + match self { + DigestInput::DigestInput{digestAlgorithm, message, } => message, + } + } + } - impl Default - for ECCPublicKey { - fn default() -> ECCPublicKey { - ECCPublicKey::ECCPublicKey { - der: Default::default() - } - } - } + impl Debug + for DigestInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ECCPublicKey { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DigestInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DigestInput::DigestInput{digestAlgorithm, message, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.DigestInput.DigestInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ECDHCurveSpec { - ECC_NIST_P256 {}, - ECC_NIST_P384 {}, - ECC_NIST_P521 {}, - SM2 {} - } + impl Eq + for DigestInput {} + + impl Hash + for DigestInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DigestInput::DigestInput{digestAlgorithm, message, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(message, _state) + }, + } + } + } - impl ECDHCurveSpec {} + impl Default + for DigestInput { + fn default() -> DigestInput { + DigestInput::DigestInput { + digestAlgorithm: Default::default(), + message: Default::default() + } + } + } - impl Debug - for ECDHCurveSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DigestInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ECDHCurveSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECDHCurveSpec::ECC_NIST_P256{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P256")?; - Ok(()) - }, - ECDHCurveSpec::ECC_NIST_P384{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P384")?; - Ok(()) - }, - ECDHCurveSpec::ECC_NIST_P521{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P521")?; - Ok(()) - }, - ECDHCurveSpec::SM2{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.SM2")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(503,3) + #[derive(PartialEq, Clone)] + pub enum ECCPrivateKey { + ECCPrivateKey { + pem: Sequence + } + } - impl ECDHCurveSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ECDHCurveSpec::ECC_NIST_P256 {}), Rc::new(ECDHCurveSpec::ECC_NIST_P384 {}), Rc::new(ECDHCurveSpec::ECC_NIST_P521 {}), Rc::new(ECDHCurveSpec::SM2 {})].iter() - } - } + impl ECCPrivateKey { + /// Returns a borrow of the field pem + pub fn pem(&self) -> &Sequence { + match self { + ECCPrivateKey::ECCPrivateKey{pem, } => pem, + } + } + } - impl Eq - for ECDHCurveSpec {} + impl Debug + for ECCPrivateKey { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ECDHCurveSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECDHCurveSpec::ECC_NIST_P256{} => { + impl DafnyPrint + for ECCPrivateKey { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECCPrivateKey::ECCPrivateKey{pem, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECCPrivateKey.ECCPrivateKey(")?; + DafnyPrint::fmt_print(pem, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ECDHCurveSpec::ECC_NIST_P384{} => { + impl Eq + for ECCPrivateKey {} - }, - ECDHCurveSpec::ECC_NIST_P521{} => { + impl Hash + for ECCPrivateKey { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECCPrivateKey::ECCPrivateKey{pem, } => { + Hash::hash(pem, _state) + }, + } + } + } - }, - ECDHCurveSpec::SM2{} => { + impl Default + for ECCPrivateKey { + fn default() -> ECCPrivateKey { + ECCPrivateKey::ECCPrivateKey { + pem: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for ECCPrivateKey { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ECDHCurveSpec { - fn default() -> ECDHCurveSpec { - ECDHCurveSpec::ECC_NIST_P256 {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(506,3) + #[derive(PartialEq, Clone)] + pub enum ECCPublicKey { + ECCPublicKey { + der: Sequence + } + } - impl AsRef - for &ECDHCurveSpec { - fn as_ref(&self) -> Self { - self - } - } + impl ECCPublicKey { + /// Returns a borrow of the field der + pub fn der(&self) -> &Sequence { + match self { + ECCPublicKey::ECCPublicKey{der, } => der, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ECDSASignatureAlgorithm { - ECDSA_P384 {}, - ECDSA_P256 {} - } + impl Debug + for ECCPublicKey { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ECDSASignatureAlgorithm {} + impl DafnyPrint + for ECCPublicKey { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECCPublicKey::ECCPublicKey{der, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECCPublicKey.ECCPublicKey(")?; + DafnyPrint::fmt_print(der, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ECDSASignatureAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ECCPublicKey {} - impl DafnyPrint - for ECDSASignatureAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECDSASignatureAlgorithm::ECDSA_P384{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignatureAlgorithm.ECDSA__P384")?; - Ok(()) - }, - ECDSASignatureAlgorithm::ECDSA_P256{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignatureAlgorithm.ECDSA__P256")?; - Ok(()) - }, - } - } - } + impl Hash + for ECCPublicKey { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECCPublicKey::ECCPublicKey{der, } => { + Hash::hash(der, _state) + }, + } + } + } - impl ECDSASignatureAlgorithm { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}), Rc::new(ECDSASignatureAlgorithm::ECDSA_P256 {})].iter() - } - } + impl Default + for ECCPublicKey { + fn default() -> ECCPublicKey { + ECCPublicKey::ECCPublicKey { + der: Default::default() + } + } + } - impl Eq - for ECDSASignatureAlgorithm {} + impl AsRef + for ECCPublicKey { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ECDSASignatureAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECDSASignatureAlgorithm::ECDSA_P384{} => { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(509,3) + #[derive(PartialEq, Clone)] + pub enum ECDHCurveSpec { + ECC_NIST_P256 {}, + ECC_NIST_P384 {}, + ECC_NIST_P521 {}, + SM2 {} + } - }, - ECDSASignatureAlgorithm::ECDSA_P256{} => { + impl ECDHCurveSpec {} - }, - } - } - } + impl Debug + for ECDHCurveSpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ECDSASignatureAlgorithm { - fn default() -> ECDSASignatureAlgorithm { - ECDSASignatureAlgorithm::ECDSA_P384 {} - } - } + impl DafnyPrint + for ECDHCurveSpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECDHCurveSpec::ECC_NIST_P256{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P256")?; + Ok(()) + }, + ECDHCurveSpec::ECC_NIST_P384{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P384")?; + Ok(()) + }, + ECDHCurveSpec::ECC_NIST_P521{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.ECC__NIST__P521")?; + Ok(()) + }, + ECDHCurveSpec::SM2{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDHCurveSpec.SM2")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ECDSASignatureAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl ECDHCurveSpec { + /// Enumerates all possible values of ECDHCurveSpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ECDHCurveSpec::ECC_NIST_P256 {}), Arc::new(ECDHCurveSpec::ECC_NIST_P384 {}), Arc::new(ECDHCurveSpec::ECC_NIST_P521 {}), Arc::new(ECDHCurveSpec::SM2 {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum ECDSASignInput { - ECDSASignInput { - signatureAlgorithm: Rc, - signingKey: Sequence, - message: Sequence - } - } + impl Eq + for ECDHCurveSpec {} - impl ECDSASignInput { - pub fn signatureAlgorithm(&self) -> &Rc { - match self { - ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => signatureAlgorithm, - } - } - pub fn signingKey(&self) -> &Sequence { - match self { - ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => signingKey, - } - } - pub fn message(&self) -> &Sequence { - match self { - ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => message, - } - } - } + impl Hash + for ECDHCurveSpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECDHCurveSpec::ECC_NIST_P256{} => { - impl Debug - for ECDSASignInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ECDHCurveSpec::ECC_NIST_P384{} => { - impl DafnyPrint - for ECDSASignInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignInput.ECDSASignInput(")?; - DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signingKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ECDHCurveSpec::ECC_NIST_P521{} => { - impl Eq - for ECDSASignInput {} + }, + ECDHCurveSpec::SM2{} => { - impl Hash - for ECDSASignInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => { - Hash::hash(signatureAlgorithm, _state); - Hash::hash(signingKey, _state); - Hash::hash(message, _state) - }, - } - } - } + }, + } + } + } - impl Default - for ECDSASignInput { - fn default() -> ECDSASignInput { - ECDSASignInput::ECDSASignInput { - signatureAlgorithm: Default::default(), - signingKey: Default::default(), - message: Default::default() - } - } - } + impl Default + for ECDHCurveSpec { + fn default() -> ECDHCurveSpec { + ECDHCurveSpec::ECC_NIST_P256 {} + } + } - impl AsRef - for &ECDSASignInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ECDHCurveSpec { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ECDSAVerifyInput { - ECDSAVerifyInput { - signatureAlgorithm: Rc, - verificationKey: Sequence, - message: Sequence, - signature: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(514,3) + #[derive(PartialEq, Clone)] + pub enum ECDSASignatureAlgorithm { + ECDSA_P384 {}, + ECDSA_P256 {} + } - impl ECDSAVerifyInput { - pub fn signatureAlgorithm(&self) -> &Rc { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => signatureAlgorithm, - } - } - pub fn verificationKey(&self) -> &Sequence { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => verificationKey, - } - } - pub fn message(&self) -> &Sequence { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => message, - } - } - pub fn signature(&self) -> &Sequence { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => signature, - } - } - } + impl ECDSASignatureAlgorithm {} - impl Debug - for ECDSAVerifyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ECDSASignatureAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ECDSAVerifyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSAVerifyInput.ECDSAVerifyInput(")?; - DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(verificationKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signature, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ECDSASignatureAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECDSASignatureAlgorithm::ECDSA_P384{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignatureAlgorithm.ECDSA__P384")?; + Ok(()) + }, + ECDSASignatureAlgorithm::ECDSA_P256{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignatureAlgorithm.ECDSA__P256")?; + Ok(()) + }, + } + } + } - impl Eq - for ECDSAVerifyInput {} + impl ECDSASignatureAlgorithm { + /// Enumerates all possible values of ECDSASignatureAlgorithm + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ECDSASignatureAlgorithm::ECDSA_P384 {}), Arc::new(ECDSASignatureAlgorithm::ECDSA_P256 {})].iter() + } + } - impl Hash - for ECDSAVerifyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => { - Hash::hash(signatureAlgorithm, _state); - Hash::hash(verificationKey, _state); - Hash::hash(message, _state); - Hash::hash(signature, _state) - }, - } - } - } + impl Eq + for ECDSASignatureAlgorithm {} - impl Default - for ECDSAVerifyInput { - fn default() -> ECDSAVerifyInput { - ECDSAVerifyInput::ECDSAVerifyInput { - signatureAlgorithm: Default::default(), - verificationKey: Default::default(), - message: Default::default(), - signature: Default::default() - } - } - } + impl Hash + for ECDSASignatureAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECDSASignatureAlgorithm::ECDSA_P384{} => { - impl AsRef - for &ECDSAVerifyInput { - fn as_ref(&self) -> Self { - self - } - } + }, + ECDSASignatureAlgorithm::ECDSA_P256{} => { - #[derive(PartialEq, Clone)] - pub enum GenerateECCKeyPairInput { - GenerateECCKeyPairInput { - eccCurve: Rc - } - } + }, + } + } + } - impl GenerateECCKeyPairInput { - pub fn eccCurve(&self) -> &Rc { - match self { - GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => eccCurve, - } - } - } + impl Default + for ECDSASignatureAlgorithm { + fn default() -> ECDSASignatureAlgorithm { + ECDSASignatureAlgorithm::ECDSA_P384 {} + } + } - impl Debug - for GenerateECCKeyPairInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ECDSASignatureAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GenerateECCKeyPairInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECCKeyPairInput.GenerateECCKeyPairInput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(517,3) + #[derive(PartialEq, Clone)] + pub enum ECDSASignInput { + ECDSASignInput { + signatureAlgorithm: Arc, + signingKey: Sequence, + message: Sequence + } + } - impl Eq - for GenerateECCKeyPairInput {} + impl ECDSASignInput { + /// Returns a borrow of the field signatureAlgorithm + pub fn signatureAlgorithm(&self) -> &Arc { + match self { + ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => signatureAlgorithm, + } + } + /// Returns a borrow of the field signingKey + pub fn signingKey(&self) -> &Sequence { + match self { + ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => signingKey, + } + } + /// Returns a borrow of the field message + pub fn message(&self) -> &Sequence { + match self { + ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => message, + } + } + } - impl Hash - for GenerateECCKeyPairInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => { - Hash::hash(eccCurve, _state) - }, - } - } - } + impl Debug + for ECDSASignInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for GenerateECCKeyPairInput { - fn default() -> GenerateECCKeyPairInput { - GenerateECCKeyPairInput::GenerateECCKeyPairInput { - eccCurve: Default::default() - } - } - } + impl DafnyPrint + for ECDSASignInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSASignInput.ECDSASignInput(")?; + DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signingKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &GenerateECCKeyPairInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ECDSASignInput {} + + impl Hash + for ECDSASignInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECDSASignInput::ECDSASignInput{signatureAlgorithm, signingKey, message, } => { + Hash::hash(signatureAlgorithm, _state); + Hash::hash(signingKey, _state); + Hash::hash(message, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateECCKeyPairOutput { - GenerateECCKeyPairOutput { - eccCurve: Rc, - privateKey: Rc, - publicKey: Rc - } - } + impl Default + for ECDSASignInput { + fn default() -> ECDSASignInput { + ECDSASignInput::ECDSASignInput { + signatureAlgorithm: Default::default(), + signingKey: Default::default(), + message: Default::default() + } + } + } - impl GenerateECCKeyPairOutput { - pub fn eccCurve(&self) -> &Rc { - match self { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => eccCurve, - } - } - pub fn privateKey(&self) -> &Rc { - match self { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => privateKey, - } - } - pub fn publicKey(&self) -> &Rc { - match self { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => publicKey, - } - } - } + impl AsRef + for ECDSASignInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for GenerateECCKeyPairOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(522,3) + #[derive(PartialEq, Clone)] + pub enum ECDSAVerifyInput { + ECDSAVerifyInput { + signatureAlgorithm: Arc, + verificationKey: Sequence, + message: Sequence, + signature: Sequence + } + } - impl DafnyPrint - for GenerateECCKeyPairOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECCKeyPairOutput.GenerateECCKeyPairOutput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ECDSAVerifyInput { + /// Returns a borrow of the field signatureAlgorithm + pub fn signatureAlgorithm(&self) -> &Arc { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => signatureAlgorithm, + } + } + /// Returns a borrow of the field verificationKey + pub fn verificationKey(&self) -> &Sequence { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => verificationKey, + } + } + /// Returns a borrow of the field message + pub fn message(&self) -> &Sequence { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => message, + } + } + /// Returns a borrow of the field signature + pub fn signature(&self) -> &Sequence { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => signature, + } + } + } - impl Eq - for GenerateECCKeyPairOutput {} + impl Debug + for ECDSAVerifyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for GenerateECCKeyPairOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => { - Hash::hash(eccCurve, _state); - Hash::hash(privateKey, _state); - Hash::hash(publicKey, _state) - }, - } - } - } + impl DafnyPrint + for ECDSAVerifyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ECDSAVerifyInput.ECDSAVerifyInput(")?; + DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(verificationKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signature, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for GenerateECCKeyPairOutput { - fn default() -> GenerateECCKeyPairOutput { - GenerateECCKeyPairOutput::GenerateECCKeyPairOutput { - eccCurve: Default::default(), - privateKey: Default::default(), - publicKey: Default::default() - } - } - } + impl Eq + for ECDSAVerifyInput {} + + impl Hash + for ECDSAVerifyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECDSAVerifyInput::ECDSAVerifyInput{signatureAlgorithm, verificationKey, message, signature, } => { + Hash::hash(signatureAlgorithm, _state); + Hash::hash(verificationKey, _state); + Hash::hash(message, _state); + Hash::hash(signature, _state) + }, + } + } + } - impl AsRef - for &GenerateECCKeyPairOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ECDSAVerifyInput { + fn default() -> ECDSAVerifyInput { + ECDSAVerifyInput::ECDSAVerifyInput { + signatureAlgorithm: Default::default(), + verificationKey: Default::default(), + message: Default::default(), + signature: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateECDSASignatureKeyInput { - GenerateECDSASignatureKeyInput { - signatureAlgorithm: Rc - } - } + impl AsRef + for ECDSAVerifyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl GenerateECDSASignatureKeyInput { - pub fn signatureAlgorithm(&self) -> &Rc { - match self { - GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => signatureAlgorithm, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(528,3) + #[derive(PartialEq, Clone)] + pub enum GenerateECCKeyPairInput { + GenerateECCKeyPairInput { + eccCurve: Arc + } + } - impl Debug - for GenerateECDSASignatureKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GenerateECCKeyPairInput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => eccCurve, + } + } + } - impl DafnyPrint - for GenerateECDSASignatureKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECDSASignatureKeyInput.GenerateECDSASignatureKeyInput(")?; - DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GenerateECCKeyPairInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GenerateECDSASignatureKeyInput {} + impl DafnyPrint + for GenerateECCKeyPairInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECCKeyPairInput.GenerateECCKeyPairInput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GenerateECDSASignatureKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => { - Hash::hash(signatureAlgorithm, _state) - }, - } - } - } + impl Eq + for GenerateECCKeyPairInput {} - impl Default - for GenerateECDSASignatureKeyInput { - fn default() -> GenerateECDSASignatureKeyInput { - GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput { - signatureAlgorithm: Default::default() - } - } - } + impl Hash + for GenerateECCKeyPairInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateECCKeyPairInput::GenerateECCKeyPairInput{eccCurve, } => { + Hash::hash(eccCurve, _state) + }, + } + } + } - impl AsRef - for &GenerateECDSASignatureKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for GenerateECCKeyPairInput { + fn default() -> GenerateECCKeyPairInput { + GenerateECCKeyPairInput::GenerateECCKeyPairInput { + eccCurve: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateECDSASignatureKeyOutput { - GenerateECDSASignatureKeyOutput { - signatureAlgorithm: Rc, - verificationKey: Sequence, - signingKey: Sequence - } - } + impl AsRef + for GenerateECCKeyPairInput { + fn as_ref(&self) -> &Self { + self + } + } - impl GenerateECDSASignatureKeyOutput { - pub fn signatureAlgorithm(&self) -> &Rc { - match self { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => signatureAlgorithm, - } - } - pub fn verificationKey(&self) -> &Sequence { - match self { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => verificationKey, - } - } - pub fn signingKey(&self) -> &Sequence { - match self { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => signingKey, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(531,3) + #[derive(PartialEq, Clone)] + pub enum GenerateECCKeyPairOutput { + GenerateECCKeyPairOutput { + eccCurve: Arc, + privateKey: Arc, + publicKey: Arc + } + } - impl Debug - for GenerateECDSASignatureKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GenerateECCKeyPairOutput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => eccCurve, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc { + match self { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => privateKey, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => publicKey, + } + } + } - impl DafnyPrint - for GenerateECDSASignatureKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECDSASignatureKeyOutput.GenerateECDSASignatureKeyOutput(")?; - DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(verificationKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signingKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GenerateECCKeyPairOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GenerateECDSASignatureKeyOutput {} + impl DafnyPrint + for GenerateECCKeyPairOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECCKeyPairOutput.GenerateECCKeyPairOutput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GenerateECDSASignatureKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => { - Hash::hash(signatureAlgorithm, _state); - Hash::hash(verificationKey, _state); - Hash::hash(signingKey, _state) - }, - } - } - } + impl Eq + for GenerateECCKeyPairOutput {} + + impl Hash + for GenerateECCKeyPairOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput{eccCurve, privateKey, publicKey, } => { + Hash::hash(eccCurve, _state); + Hash::hash(privateKey, _state); + Hash::hash(publicKey, _state) + }, + } + } + } - impl Default - for GenerateECDSASignatureKeyOutput { - fn default() -> GenerateECDSASignatureKeyOutput { - GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput { - signatureAlgorithm: Default::default(), - verificationKey: Default::default(), - signingKey: Default::default() - } - } - } + impl Default + for GenerateECCKeyPairOutput { + fn default() -> GenerateECCKeyPairOutput { + GenerateECCKeyPairOutput::GenerateECCKeyPairOutput { + eccCurve: Default::default(), + privateKey: Default::default(), + publicKey: Default::default() + } + } + } - impl AsRef - for &GenerateECDSASignatureKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GenerateECCKeyPairOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateRandomBytesInput { - GenerateRandomBytesInput { - length: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(536,3) + #[derive(PartialEq, Clone)] + pub enum GenerateECDSASignatureKeyInput { + GenerateECDSASignatureKeyInput { + signatureAlgorithm: Arc + } + } - impl GenerateRandomBytesInput { - pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => length, - } - } - } + impl GenerateECDSASignatureKeyInput { + /// Returns a borrow of the field signatureAlgorithm + pub fn signatureAlgorithm(&self) -> &Arc { + match self { + GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => signatureAlgorithm, + } + } + } - impl Debug - for GenerateRandomBytesInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GenerateECDSASignatureKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GenerateRandomBytesInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRandomBytesInput.GenerateRandomBytesInput(")?; - DafnyPrint::fmt_print(length, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GenerateECDSASignatureKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECDSASignatureKeyInput.GenerateECDSASignatureKeyInput(")?; + DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GenerateRandomBytesInput {} + impl Eq + for GenerateECDSASignatureKeyInput {} - impl Hash - for GenerateRandomBytesInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => { - Hash::hash(length, _state) - }, - } - } - } + impl Hash + for GenerateECDSASignatureKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput{signatureAlgorithm, } => { + Hash::hash(signatureAlgorithm, _state) + }, + } + } + } - impl Default - for GenerateRandomBytesInput { - fn default() -> GenerateRandomBytesInput { - GenerateRandomBytesInput::GenerateRandomBytesInput { - length: Default::default() - } - } - } + impl Default + for GenerateECDSASignatureKeyInput { + fn default() -> GenerateECDSASignatureKeyInput { + GenerateECDSASignatureKeyInput::GenerateECDSASignatureKeyInput { + signatureAlgorithm: Default::default() + } + } + } - impl AsRef - for &GenerateRandomBytesInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GenerateECDSASignatureKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateRSAKeyPairInput { - GenerateRSAKeyPairInput { - lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBitsToGenerate - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(539,3) + #[derive(PartialEq, Clone)] + pub enum GenerateECDSASignatureKeyOutput { + GenerateECDSASignatureKeyOutput { + signatureAlgorithm: Arc, + verificationKey: Sequence, + signingKey: Sequence + } + } - impl GenerateRSAKeyPairInput { - pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBitsToGenerate { - match self { - GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => lengthBits, - } - } - } + impl GenerateECDSASignatureKeyOutput { + /// Returns a borrow of the field signatureAlgorithm + pub fn signatureAlgorithm(&self) -> &Arc { + match self { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => signatureAlgorithm, + } + } + /// Returns a borrow of the field verificationKey + pub fn verificationKey(&self) -> &Sequence { + match self { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => verificationKey, + } + } + /// Returns a borrow of the field signingKey + pub fn signingKey(&self) -> &Sequence { + match self { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => signingKey, + } + } + } - impl Debug - for GenerateRSAKeyPairInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GenerateECDSASignatureKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GenerateRSAKeyPairInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRSAKeyPairInput.GenerateRSAKeyPairInput(")?; - DafnyPrint::fmt_print(lengthBits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GenerateECDSASignatureKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateECDSASignatureKeyOutput.GenerateECDSASignatureKeyOutput(")?; + DafnyPrint::fmt_print(signatureAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(verificationKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signingKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GenerateRSAKeyPairInput {} + impl Eq + for GenerateECDSASignatureKeyOutput {} + + impl Hash + for GenerateECDSASignatureKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput{signatureAlgorithm, verificationKey, signingKey, } => { + Hash::hash(signatureAlgorithm, _state); + Hash::hash(verificationKey, _state); + Hash::hash(signingKey, _state) + }, + } + } + } - impl Hash - for GenerateRSAKeyPairInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => { - Hash::hash(lengthBits, _state) - }, - } - } - } + impl Default + for GenerateECDSASignatureKeyOutput { + fn default() -> GenerateECDSASignatureKeyOutput { + GenerateECDSASignatureKeyOutput::GenerateECDSASignatureKeyOutput { + signatureAlgorithm: Default::default(), + verificationKey: Default::default(), + signingKey: Default::default() + } + } + } - impl Default - for GenerateRSAKeyPairInput { - fn default() -> GenerateRSAKeyPairInput { - GenerateRSAKeyPairInput::GenerateRSAKeyPairInput { - lengthBits: Default::default() - } - } - } + impl AsRef + for GenerateECDSASignatureKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GenerateRSAKeyPairInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(544,3) + #[derive(PartialEq, Clone)] + pub enum GenerateRandomBytesInput { + GenerateRandomBytesInput { + length: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger + } + } - #[derive(PartialEq, Clone)] - pub enum GenerateRSAKeyPairOutput { - GenerateRSAKeyPairOutput { - publicKey: Rc, - privateKey: Rc - } - } + impl GenerateRandomBytesInput { + /// Returns a borrow of the field length + pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => length, + } + } + } - impl GenerateRSAKeyPairOutput { - pub fn publicKey(&self) -> &Rc { - match self { - GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => publicKey, - } - } - pub fn privateKey(&self) -> &Rc { - match self { - GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => privateKey, - } - } - } + impl Debug + for GenerateRandomBytesInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for GenerateRSAKeyPairOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GenerateRandomBytesInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRandomBytesInput.GenerateRandomBytesInput(")?; + DafnyPrint::fmt_print(length, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GenerateRSAKeyPairOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRSAKeyPairOutput.GenerateRSAKeyPairOutput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for GenerateRandomBytesInput {} - impl Eq - for GenerateRSAKeyPairOutput {} + impl Hash + for GenerateRandomBytesInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateRandomBytesInput::GenerateRandomBytesInput{length, } => { + Hash::hash(length, _state) + }, + } + } + } - impl Hash - for GenerateRSAKeyPairOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => { - Hash::hash(publicKey, _state); - Hash::hash(privateKey, _state) - }, - } - } - } + impl Default + for GenerateRandomBytesInput { + fn default() -> GenerateRandomBytesInput { + GenerateRandomBytesInput::GenerateRandomBytesInput { + length: Default::default() + } + } + } - impl Default - for GenerateRSAKeyPairOutput { - fn default() -> GenerateRSAKeyPairOutput { - GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput { - publicKey: Default::default(), - privateKey: Default::default() - } - } - } + impl AsRef + for GenerateRandomBytesInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GenerateRSAKeyPairOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(547,3) + #[derive(PartialEq, Clone)] + pub enum GenerateRSAKeyPairInput { + GenerateRSAKeyPairInput { + lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBitsToGenerate + } + } - #[derive(PartialEq, Clone)] - pub enum GetPublicKeyFromPrivateKeyInput { - GetPublicKeyFromPrivateKeyInput { - eccCurve: Rc, - privateKey: Rc - } - } + impl GenerateRSAKeyPairInput { + /// Returns a borrow of the field lengthBits + pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBitsToGenerate { + match self { + GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => lengthBits, + } + } + } - impl GetPublicKeyFromPrivateKeyInput { - pub fn eccCurve(&self) -> &Rc { - match self { - GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => eccCurve, - } - } - pub fn privateKey(&self) -> &Rc { - match self { - GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => privateKey, - } - } - } + impl Debug + for GenerateRSAKeyPairInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for GetPublicKeyFromPrivateKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GenerateRSAKeyPairInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRSAKeyPairInput.GenerateRSAKeyPairInput(")?; + DafnyPrint::fmt_print(lengthBits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GetPublicKeyFromPrivateKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetPublicKeyFromPrivateKeyInput.GetPublicKeyFromPrivateKeyInput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for GenerateRSAKeyPairInput {} - impl Eq - for GetPublicKeyFromPrivateKeyInput {} + impl Hash + for GenerateRSAKeyPairInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateRSAKeyPairInput::GenerateRSAKeyPairInput{lengthBits, } => { + Hash::hash(lengthBits, _state) + }, + } + } + } - impl Hash - for GetPublicKeyFromPrivateKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => { - Hash::hash(eccCurve, _state); - Hash::hash(privateKey, _state) - }, - } - } - } + impl Default + for GenerateRSAKeyPairInput { + fn default() -> GenerateRSAKeyPairInput { + GenerateRSAKeyPairInput::GenerateRSAKeyPairInput { + lengthBits: Default::default() + } + } + } - impl Default - for GetPublicKeyFromPrivateKeyInput { - fn default() -> GetPublicKeyFromPrivateKeyInput { - GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput { - eccCurve: Default::default(), - privateKey: Default::default() - } - } - } + impl AsRef + for GenerateRSAKeyPairInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GetPublicKeyFromPrivateKeyInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(550,3) + #[derive(PartialEq, Clone)] + pub enum GenerateRSAKeyPairOutput { + GenerateRSAKeyPairOutput { + publicKey: Arc, + privateKey: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum GetPublicKeyFromPrivateKeyOutput { - GetPublicKeyFromPrivateKeyOutput { - eccCurve: Rc, - privateKey: Rc, - publicKey: Sequence - } - } + impl GenerateRSAKeyPairOutput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => publicKey, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc { + match self { + GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => privateKey, + } + } + } - impl GetPublicKeyFromPrivateKeyOutput { - pub fn eccCurve(&self) -> &Rc { - match self { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => eccCurve, - } - } - pub fn privateKey(&self) -> &Rc { - match self { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => privateKey, - } - } - pub fn publicKey(&self) -> &Sequence { - match self { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => publicKey, - } - } - } + impl Debug + for GenerateRSAKeyPairOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for GetPublicKeyFromPrivateKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GenerateRSAKeyPairOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GenerateRSAKeyPairOutput.GenerateRSAKeyPairOutput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GetPublicKeyFromPrivateKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetPublicKeyFromPrivateKeyOutput.GetPublicKeyFromPrivateKeyOutput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for GenerateRSAKeyPairOutput {} + + impl Hash + for GenerateRSAKeyPairOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput{publicKey, privateKey, } => { + Hash::hash(publicKey, _state); + Hash::hash(privateKey, _state) + }, + } + } + } - impl Eq - for GetPublicKeyFromPrivateKeyOutput {} + impl Default + for GenerateRSAKeyPairOutput { + fn default() -> GenerateRSAKeyPairOutput { + GenerateRSAKeyPairOutput::GenerateRSAKeyPairOutput { + publicKey: Default::default(), + privateKey: Default::default() + } + } + } - impl Hash - for GetPublicKeyFromPrivateKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => { - Hash::hash(eccCurve, _state); - Hash::hash(privateKey, _state); - Hash::hash(publicKey, _state) - }, - } - } - } + impl AsRef + for GenerateRSAKeyPairOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for GetPublicKeyFromPrivateKeyOutput { - fn default() -> GetPublicKeyFromPrivateKeyOutput { - GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput { - eccCurve: Default::default(), - privateKey: Default::default(), - publicKey: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(554,3) + #[derive(PartialEq, Clone)] + pub enum GetPublicKeyFromPrivateKeyInput { + GetPublicKeyFromPrivateKeyInput { + eccCurve: Arc, + privateKey: Arc + } + } - impl AsRef - for &GetPublicKeyFromPrivateKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl GetPublicKeyFromPrivateKeyInput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => eccCurve, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc { + match self { + GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => privateKey, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetRSAKeyModulusLengthInput { - GetRSAKeyModulusLengthInput { - publicKey: Sequence - } - } + impl Debug + for GetPublicKeyFromPrivateKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl GetRSAKeyModulusLengthInput { - pub fn publicKey(&self) -> &Sequence { - match self { - GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => publicKey, - } - } - } + impl DafnyPrint + for GetPublicKeyFromPrivateKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetPublicKeyFromPrivateKeyInput.GetPublicKeyFromPrivateKeyInput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for GetRSAKeyModulusLengthInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GetPublicKeyFromPrivateKeyInput {} + + impl Hash + for GetPublicKeyFromPrivateKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput{eccCurve, privateKey, } => { + Hash::hash(eccCurve, _state); + Hash::hash(privateKey, _state) + }, + } + } + } - impl DafnyPrint - for GetRSAKeyModulusLengthInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetRSAKeyModulusLengthInput.GetRSAKeyModulusLengthInput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetPublicKeyFromPrivateKeyInput { + fn default() -> GetPublicKeyFromPrivateKeyInput { + GetPublicKeyFromPrivateKeyInput::GetPublicKeyFromPrivateKeyInput { + eccCurve: Default::default(), + privateKey: Default::default() + } + } + } - impl Eq - for GetRSAKeyModulusLengthInput {} + impl AsRef + for GetPublicKeyFromPrivateKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetRSAKeyModulusLengthInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => { - Hash::hash(publicKey, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(558,3) + #[derive(PartialEq, Clone)] + pub enum GetPublicKeyFromPrivateKeyOutput { + GetPublicKeyFromPrivateKeyOutput { + eccCurve: Arc, + privateKey: Arc, + publicKey: Sequence + } + } - impl Default - for GetRSAKeyModulusLengthInput { - fn default() -> GetRSAKeyModulusLengthInput { - GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput { - publicKey: Default::default() - } - } - } + impl GetPublicKeyFromPrivateKeyOutput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => eccCurve, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc { + match self { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => privateKey, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Sequence { + match self { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => publicKey, + } + } + } - impl AsRef - for &GetRSAKeyModulusLengthInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetPublicKeyFromPrivateKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetRSAKeyModulusLengthOutput { - GetRSAKeyModulusLengthOutput { - length: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits - } - } + impl DafnyPrint + for GetPublicKeyFromPrivateKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetPublicKeyFromPrivateKeyOutput.GetPublicKeyFromPrivateKeyOutput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetRSAKeyModulusLengthOutput { - pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { - match self { - GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => length, - } - } - } + impl Eq + for GetPublicKeyFromPrivateKeyOutput {} + + impl Hash + for GetPublicKeyFromPrivateKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput{eccCurve, privateKey, publicKey, } => { + Hash::hash(eccCurve, _state); + Hash::hash(privateKey, _state); + Hash::hash(publicKey, _state) + }, + } + } + } - impl Debug - for GetRSAKeyModulusLengthOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetPublicKeyFromPrivateKeyOutput { + fn default() -> GetPublicKeyFromPrivateKeyOutput { + GetPublicKeyFromPrivateKeyOutput::GetPublicKeyFromPrivateKeyOutput { + eccCurve: Default::default(), + privateKey: Default::default(), + publicKey: Default::default() + } + } + } - impl DafnyPrint - for GetRSAKeyModulusLengthOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetRSAKeyModulusLengthOutput.GetRSAKeyModulusLengthOutput(")?; - DafnyPrint::fmt_print(length, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetPublicKeyFromPrivateKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GetRSAKeyModulusLengthOutput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(563,3) + #[derive(PartialEq, Clone)] + pub enum GetRSAKeyModulusLengthInput { + GetRSAKeyModulusLengthInput { + publicKey: Sequence + } + } - impl Hash - for GetRSAKeyModulusLengthOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => { - Hash::hash(length, _state) - }, - } - } - } + impl GetRSAKeyModulusLengthInput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Sequence { + match self { + GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => publicKey, + } + } + } - impl Default - for GetRSAKeyModulusLengthOutput { - fn default() -> GetRSAKeyModulusLengthOutput { - GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput { - length: Default::default() - } - } - } + impl Debug + for GetRSAKeyModulusLengthInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &GetRSAKeyModulusLengthOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetRSAKeyModulusLengthInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetRSAKeyModulusLengthInput.GetRSAKeyModulusLengthInput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum HkdfExpandInput { - HkdfExpandInput { - digestAlgorithm: Rc, - prk: Sequence, - info: Sequence, - expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger - } - } + impl Eq + for GetRSAKeyModulusLengthInput {} - impl HkdfExpandInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => digestAlgorithm, - } - } - pub fn prk(&self) -> &Sequence { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => prk, - } - } - pub fn info(&self) -> &Sequence { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => info, - } - } - pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => expectedLength, - } - } - } + impl Hash + for GetRSAKeyModulusLengthInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput{publicKey, } => { + Hash::hash(publicKey, _state) + }, + } + } + } - impl Debug - for HkdfExpandInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetRSAKeyModulusLengthInput { + fn default() -> GetRSAKeyModulusLengthInput { + GetRSAKeyModulusLengthInput::GetRSAKeyModulusLengthInput { + publicKey: Default::default() + } + } + } - impl DafnyPrint - for HkdfExpandInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfExpandInput.HkdfExpandInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(prk, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(info, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expectedLength, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetRSAKeyModulusLengthInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for HkdfExpandInput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(566,3) + #[derive(PartialEq, Clone)] + pub enum GetRSAKeyModulusLengthOutput { + GetRSAKeyModulusLengthOutput { + length: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits + } + } - impl Hash - for HkdfExpandInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(prk, _state); - Hash::hash(info, _state); - Hash::hash(expectedLength, _state) - }, - } - } - } + impl GetRSAKeyModulusLengthOutput { + /// Returns a borrow of the field length + pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { + match self { + GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => length, + } + } + } - impl Default - for HkdfExpandInput { - fn default() -> HkdfExpandInput { - HkdfExpandInput::HkdfExpandInput { - digestAlgorithm: Default::default(), - prk: Default::default(), - info: Default::default(), - expectedLength: Default::default() - } - } - } + impl Debug + for GetRSAKeyModulusLengthOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &HkdfExpandInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetRSAKeyModulusLengthOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.GetRSAKeyModulusLengthOutput.GetRSAKeyModulusLengthOutput(")?; + DafnyPrint::fmt_print(length, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum HkdfExtractInput { - HkdfExtractInput { - digestAlgorithm: Rc, - salt: Rc>>, - ikm: Sequence - } - } + impl Eq + for GetRSAKeyModulusLengthOutput {} - impl HkdfExtractInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => digestAlgorithm, - } - } - pub fn salt(&self) -> &Rc>> { - match self { - HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => salt, - } - } - pub fn ikm(&self) -> &Sequence { - match self { - HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => ikm, - } - } - } + impl Hash + for GetRSAKeyModulusLengthOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput{length, } => { + Hash::hash(length, _state) + }, + } + } + } - impl Debug - for HkdfExtractInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetRSAKeyModulusLengthOutput { + fn default() -> GetRSAKeyModulusLengthOutput { + GetRSAKeyModulusLengthOutput::GetRSAKeyModulusLengthOutput { + length: Default::default() + } + } + } - impl DafnyPrint - for HkdfExtractInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfExtractInput.HkdfExtractInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(salt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ikm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetRSAKeyModulusLengthOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for HkdfExtractInput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(569,3) + #[derive(PartialEq, Clone)] + pub enum HkdfExpandInput { + HkdfExpandInput { + digestAlgorithm: Arc, + prk: Sequence, + info: Sequence, + expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger + } + } - impl Hash - for HkdfExtractInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(salt, _state); - Hash::hash(ikm, _state) - }, - } - } - } + impl HkdfExpandInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => digestAlgorithm, + } + } + /// Returns a borrow of the field prk + pub fn prk(&self) -> &Sequence { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => prk, + } + } + /// Returns a borrow of the field info + pub fn info(&self) -> &Sequence { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => info, + } + } + /// Returns a borrow of the field expectedLength + pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => expectedLength, + } + } + } - impl Default - for HkdfExtractInput { - fn default() -> HkdfExtractInput { - HkdfExtractInput::HkdfExtractInput { - digestAlgorithm: Default::default(), - salt: Default::default(), - ikm: Default::default() - } - } - } + impl Debug + for HkdfExpandInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &HkdfExtractInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for HkdfExpandInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfExpandInput.HkdfExpandInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(prk, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(info, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expectedLength, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum HkdfInput { - HkdfInput { - digestAlgorithm: Rc, - salt: Rc>>, - ikm: Sequence, - info: Sequence, - expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger - } - } - - impl HkdfInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => digestAlgorithm, - } - } - pub fn salt(&self) -> &Rc>> { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => salt, - } - } - pub fn ikm(&self) -> &Sequence { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => ikm, - } - } - pub fn info(&self) -> &Sequence { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => info, - } - } - pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => expectedLength, - } - } - } - - impl Debug - for HkdfInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for HkdfInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfInput.HkdfInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(salt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ikm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(info, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expectedLength, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for HkdfInput {} + impl Eq + for HkdfExpandInput {} + + impl Hash + for HkdfExpandInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + HkdfExpandInput::HkdfExpandInput{digestAlgorithm, prk, info, expectedLength, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(prk, _state); + Hash::hash(info, _state); + Hash::hash(expectedLength, _state) + }, + } + } + } - impl Hash - for HkdfInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(salt, _state); - Hash::hash(ikm, _state); - Hash::hash(info, _state); - Hash::hash(expectedLength, _state) - }, - } - } - } + impl Default + for HkdfExpandInput { + fn default() -> HkdfExpandInput { + HkdfExpandInput::HkdfExpandInput { + digestAlgorithm: Default::default(), + prk: Default::default(), + info: Default::default(), + expectedLength: Default::default() + } + } + } - impl Default - for HkdfInput { - fn default() -> HkdfInput { - HkdfInput::HkdfInput { - digestAlgorithm: Default::default(), - salt: Default::default(), - ikm: Default::default(), - info: Default::default(), - expectedLength: Default::default() - } - } - } + impl AsRef + for HkdfExpandInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &HkdfInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(575,3) + #[derive(PartialEq, Clone)] + pub enum HkdfExtractInput { + HkdfExtractInput { + digestAlgorithm: Arc, + salt: Arc>>, + ikm: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum HMacInput { - HMacInput { - digestAlgorithm: Rc, - key: Sequence, - message: Sequence - } - } + impl HkdfExtractInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => digestAlgorithm, + } + } + /// Returns a borrow of the field salt + pub fn salt(&self) -> &Arc>> { + match self { + HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => salt, + } + } + /// Returns a borrow of the field ikm + pub fn ikm(&self) -> &Sequence { + match self { + HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => ikm, + } + } + } - impl HMacInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - HMacInput::HMacInput{digestAlgorithm, key, message, } => digestAlgorithm, - } - } - pub fn key(&self) -> &Sequence { - match self { - HMacInput::HMacInput{digestAlgorithm, key, message, } => key, - } - } - pub fn message(&self) -> &Sequence { - match self { - HMacInput::HMacInput{digestAlgorithm, key, message, } => message, - } - } - } + impl Debug + for HkdfExtractInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for HMacInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for HkdfExtractInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfExtractInput.HkdfExtractInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(salt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ikm, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for HMacInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - HMacInput::HMacInput{digestAlgorithm, key, message, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HMacInput.HMacInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for HkdfExtractInput {} + + impl Hash + for HkdfExtractInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + HkdfExtractInput::HkdfExtractInput{digestAlgorithm, salt, ikm, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(salt, _state); + Hash::hash(ikm, _state) + }, + } + } + } - impl Eq - for HMacInput {} + impl Default + for HkdfExtractInput { + fn default() -> HkdfExtractInput { + HkdfExtractInput::HkdfExtractInput { + digestAlgorithm: Default::default(), + salt: Default::default(), + ikm: Default::default() + } + } + } - impl Hash - for HMacInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - HMacInput::HMacInput{digestAlgorithm, key, message, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(key, _state); - Hash::hash(message, _state) - }, - } - } - } + impl AsRef + for HkdfExtractInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for HMacInput { - fn default() -> HMacInput { - HMacInput::HMacInput { - digestAlgorithm: Default::default(), - key: Default::default(), - message: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(580,3) + #[derive(PartialEq, Clone)] + pub enum HkdfInput { + HkdfInput { + digestAlgorithm: Arc, + salt: Arc>>, + ikm: Sequence, + info: Sequence, + expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger + } + } - impl AsRef - for &HMacInput { - fn as_ref(&self) -> Self { - self - } - } + impl HkdfInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => digestAlgorithm, + } + } + /// Returns a borrow of the field salt + pub fn salt(&self) -> &Arc>> { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => salt, + } + } + /// Returns a borrow of the field ikm + pub fn ikm(&self) -> &Sequence { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => ikm, + } + } + /// Returns a borrow of the field info + pub fn info(&self) -> &Sequence { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => info, + } + } + /// Returns a borrow of the field expectedLength + pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => expectedLength, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KdfCtrInput { - KdfCtrInput { - digestAlgorithm: Rc, - ikm: Sequence, - expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, - purpose: Rc>>, - nonce: Rc>> - } - } - - impl KdfCtrInput { - pub fn digestAlgorithm(&self) -> &Rc { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => digestAlgorithm, - } - } - pub fn ikm(&self) -> &Sequence { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => ikm, - } - } - pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => expectedLength, - } - } - pub fn purpose(&self) -> &Rc>> { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => purpose, - } - } - pub fn nonce(&self) -> &Rc>> { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => nonce, - } - } - } + impl Debug + for HkdfInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for KdfCtrInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for HkdfInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HkdfInput.HkdfInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(salt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ikm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(info, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expectedLength, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for KdfCtrInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.KdfCtrInput.KdfCtrInput(")?; - DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ikm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expectedLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(purpose, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(nonce, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for HkdfInput {} + + impl Hash + for HkdfInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + HkdfInput::HkdfInput{digestAlgorithm, salt, ikm, info, expectedLength, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(salt, _state); + Hash::hash(ikm, _state); + Hash::hash(info, _state); + Hash::hash(expectedLength, _state) + }, + } + } + } - impl Eq - for KdfCtrInput {} + impl Default + for HkdfInput { + fn default() -> HkdfInput { + HkdfInput::HkdfInput { + digestAlgorithm: Default::default(), + salt: Default::default(), + ikm: Default::default(), + info: Default::default(), + expectedLength: Default::default() + } + } + } - impl Hash - for KdfCtrInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => { - Hash::hash(digestAlgorithm, _state); - Hash::hash(ikm, _state); - Hash::hash(expectedLength, _state); - Hash::hash(purpose, _state); - Hash::hash(nonce, _state) - }, - } - } - } + impl AsRef + for HkdfInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for KdfCtrInput { - fn default() -> KdfCtrInput { - KdfCtrInput::KdfCtrInput { - digestAlgorithm: Default::default(), - ikm: Default::default(), - expectedLength: Default::default(), - purpose: Default::default(), - nonce: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(587,3) + #[derive(PartialEq, Clone)] + pub enum HMacInput { + HMacInput { + digestAlgorithm: Arc, + key: Sequence, + message: Sequence + } + } - impl AsRef - for &KdfCtrInput { - fn as_ref(&self) -> Self { - self - } - } + impl HMacInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + HMacInput::HMacInput{digestAlgorithm, key, message, } => digestAlgorithm, + } + } + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence { + match self { + HMacInput::HMacInput{digestAlgorithm, key, message, } => key, + } + } + /// Returns a borrow of the field message + pub fn message(&self) -> &Sequence { + match self { + HMacInput::HMacInput{digestAlgorithm, key, message, } => message, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ParsePublicKeyInput { - ParsePublicKeyInput { - publicKey: Sequence - } - } + impl Debug + for HMacInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ParsePublicKeyInput { - pub fn publicKey(&self) -> &Sequence { - match self { - ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => publicKey, - } - } - } + impl DafnyPrint + for HMacInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + HMacInput::HMacInput{digestAlgorithm, key, message, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.HMacInput.HMacInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ParsePublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for HMacInput {} + + impl Hash + for HMacInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + HMacInput::HMacInput{digestAlgorithm, key, message, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(key, _state); + Hash::hash(message, _state) + }, + } + } + } - impl DafnyPrint - for ParsePublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ParsePublicKeyInput.ParsePublicKeyInput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for HMacInput { + fn default() -> HMacInput { + HMacInput::HMacInput { + digestAlgorithm: Default::default(), + key: Default::default(), + message: Default::default() + } + } + } - impl Eq - for ParsePublicKeyInput {} + impl AsRef + for HMacInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ParsePublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => { - Hash::hash(publicKey, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(592,3) + #[derive(PartialEq, Clone)] + pub enum KdfCtrInput { + KdfCtrInput { + digestAlgorithm: Arc, + ikm: Sequence, + expectedLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, + purpose: Arc>>, + nonce: Arc>> + } + } - impl Default - for ParsePublicKeyInput { - fn default() -> ParsePublicKeyInput { - ParsePublicKeyInput::ParsePublicKeyInput { - publicKey: Default::default() - } - } - } + impl KdfCtrInput { + /// Returns a borrow of the field digestAlgorithm + pub fn digestAlgorithm(&self) -> &Arc { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => digestAlgorithm, + } + } + /// Returns a borrow of the field ikm + pub fn ikm(&self) -> &Sequence { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => ikm, + } + } + /// Returns a borrow of the field expectedLength + pub fn expectedLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => expectedLength, + } + } + /// Returns a borrow of the field purpose + pub fn purpose(&self) -> &Arc>> { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => purpose, + } + } + /// Returns a borrow of the field nonce + pub fn nonce(&self) -> &Arc>> { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => nonce, + } + } + } - impl AsRef - for &ParsePublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for KdfCtrInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ParsePublicKeyOutput { - ParsePublicKeyOutput { - publicKey: Rc - } - } + impl DafnyPrint + for KdfCtrInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.KdfCtrInput.KdfCtrInput(")?; + DafnyPrint::fmt_print(digestAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ikm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expectedLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(purpose, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(nonce, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ParsePublicKeyOutput { - pub fn publicKey(&self) -> &Rc { - match self { - ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => publicKey, - } - } - } + impl Eq + for KdfCtrInput {} + + impl Hash + for KdfCtrInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KdfCtrInput::KdfCtrInput{digestAlgorithm, ikm, expectedLength, purpose, nonce, } => { + Hash::hash(digestAlgorithm, _state); + Hash::hash(ikm, _state); + Hash::hash(expectedLength, _state); + Hash::hash(purpose, _state); + Hash::hash(nonce, _state) + }, + } + } + } - impl Debug - for ParsePublicKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for KdfCtrInput { + fn default() -> KdfCtrInput { + KdfCtrInput::KdfCtrInput { + digestAlgorithm: Default::default(), + ikm: Default::default(), + expectedLength: Default::default(), + purpose: Default::default(), + nonce: Default::default() + } + } + } - impl DafnyPrint - for ParsePublicKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ParsePublicKeyOutput.ParsePublicKeyOutput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for KdfCtrInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ParsePublicKeyOutput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(599,3) + #[derive(PartialEq, Clone)] + pub enum ParsePublicKeyInput { + ParsePublicKeyInput { + publicKey: Sequence + } + } - impl Hash - for ParsePublicKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => { - Hash::hash(publicKey, _state) - }, - } - } - } + impl ParsePublicKeyInput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Sequence { + match self { + ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => publicKey, + } + } + } - impl Default - for ParsePublicKeyOutput { - fn default() -> ParsePublicKeyOutput { - ParsePublicKeyOutput::ParsePublicKeyOutput { - publicKey: Default::default() - } - } - } + impl Debug + for ParsePublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ParsePublicKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for ParsePublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ParsePublicKeyInput.ParsePublicKeyInput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type PositiveInteger = i32; + impl Eq + for ParsePublicKeyInput {} - #[derive(PartialEq, Clone)] - pub enum RSADecryptInput { - RSADecryptInput { - padding: Rc, - privateKey: Sequence, - cipherText: Sequence - } - } + impl Hash + for ParsePublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ParsePublicKeyInput::ParsePublicKeyInput{publicKey, } => { + Hash::hash(publicKey, _state) + }, + } + } + } - impl RSADecryptInput { - pub fn padding(&self) -> &Rc { - match self { - RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => padding, - } - } - pub fn privateKey(&self) -> &Sequence { - match self { - RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => privateKey, - } - } - pub fn cipherText(&self) -> &Sequence { - match self { - RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => cipherText, - } - } - } + impl Default + for ParsePublicKeyInput { + fn default() -> ParsePublicKeyInput { + ParsePublicKeyInput::ParsePublicKeyInput { + publicKey: Default::default() + } + } + } - impl Debug - for RSADecryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ParsePublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for RSADecryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSADecryptInput.RSADecryptInput(")?; - DafnyPrint::fmt_print(padding, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cipherText, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(602,3) + #[derive(PartialEq, Clone)] + pub enum ParsePublicKeyOutput { + ParsePublicKeyOutput { + publicKey: Arc + } + } - impl Eq - for RSADecryptInput {} + impl ParsePublicKeyOutput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc { + match self { + ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => publicKey, + } + } + } - impl Hash - for RSADecryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => { - Hash::hash(padding, _state); - Hash::hash(privateKey, _state); - Hash::hash(cipherText, _state) - }, - } - } - } + impl Debug + for ParsePublicKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for RSADecryptInput { - fn default() -> RSADecryptInput { - RSADecryptInput::RSADecryptInput { - padding: Default::default(), - privateKey: Default::default(), - cipherText: Default::default() - } - } - } + impl DafnyPrint + for ParsePublicKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ParsePublicKeyOutput.ParsePublicKeyOutput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &RSADecryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ParsePublicKeyOutput {} - #[derive(PartialEq, Clone)] - pub enum RSAEncryptInput { - RSAEncryptInput { - padding: Rc, - publicKey: Sequence, - plaintext: Sequence - } - } + impl Hash + for ParsePublicKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ParsePublicKeyOutput::ParsePublicKeyOutput{publicKey, } => { + Hash::hash(publicKey, _state) + }, + } + } + } - impl RSAEncryptInput { - pub fn padding(&self) -> &Rc { - match self { - RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => padding, - } - } - pub fn publicKey(&self) -> &Sequence { - match self { - RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => publicKey, - } - } - pub fn plaintext(&self) -> &Sequence { - match self { - RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => plaintext, - } - } - } + impl Default + for ParsePublicKeyOutput { + fn default() -> ParsePublicKeyOutput { + ParsePublicKeyOutput::ParsePublicKeyOutput { + publicKey: Default::default() + } + } + } - impl Debug - for RSAEncryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ParsePublicKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for RSAEncryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAEncryptInput.RSAEncryptInput(")?; - DafnyPrint::fmt_print(padding, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(605,3) + pub type PositiveInteger = i32; - impl Eq - for RSAEncryptInput {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(609,3) + #[derive(PartialEq, Clone)] + pub enum RSADecryptInput { + RSADecryptInput { + padding: Arc, + privateKey: Sequence, + cipherText: Sequence + } + } - impl Hash - for RSAEncryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => { - Hash::hash(padding, _state); - Hash::hash(publicKey, _state); - Hash::hash(plaintext, _state) - }, - } - } - } + impl RSADecryptInput { + /// Returns a borrow of the field padding + pub fn padding(&self) -> &Arc { + match self { + RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => padding, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Sequence { + match self { + RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => privateKey, + } + } + /// Returns a borrow of the field cipherText + pub fn cipherText(&self) -> &Sequence { + match self { + RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => cipherText, + } + } + } - impl Default - for RSAEncryptInput { - fn default() -> RSAEncryptInput { - RSAEncryptInput::RSAEncryptInput { - padding: Default::default(), - publicKey: Default::default(), - plaintext: Default::default() - } - } - } + impl Debug + for RSADecryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &RSAEncryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for RSADecryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSADecryptInput.RSADecryptInput(")?; + DafnyPrint::fmt_print(padding, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cipherText, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type RSAModulusLengthBits = i32; + impl Eq + for RSADecryptInput {} + + impl Hash + for RSADecryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RSADecryptInput::RSADecryptInput{padding, privateKey, cipherText, } => { + Hash::hash(padding, _state); + Hash::hash(privateKey, _state); + Hash::hash(cipherText, _state) + }, + } + } + } - pub type RSAModulusLengthBitsToGenerate = i32; + impl Default + for RSADecryptInput { + fn default() -> RSADecryptInput { + RSADecryptInput::RSADecryptInput { + padding: Default::default(), + privateKey: Default::default(), + cipherText: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum RSAPaddingMode { - PKCS1 {}, - OAEP_SHA1 {}, - OAEP_SHA256 {}, - OAEP_SHA384 {}, - OAEP_SHA512 {} - } + impl AsRef + for RSADecryptInput { + fn as_ref(&self) -> &Self { + self + } + } - impl RSAPaddingMode {} + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(614,3) + #[derive(PartialEq, Clone)] + pub enum RSAEncryptInput { + RSAEncryptInput { + padding: Arc, + publicKey: Sequence, + plaintext: Sequence + } + } - impl Debug - for RSAPaddingMode { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl RSAEncryptInput { + /// Returns a borrow of the field padding + pub fn padding(&self) -> &Arc { + match self { + RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => padding, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Sequence { + match self { + RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => publicKey, + } + } + /// Returns a borrow of the field plaintext + pub fn plaintext(&self) -> &Sequence { + match self { + RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => plaintext, + } + } + } - impl DafnyPrint - for RSAPaddingMode { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RSAPaddingMode::PKCS1{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.PKCS1")?; - Ok(()) - }, - RSAPaddingMode::OAEP_SHA1{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA1")?; - Ok(()) - }, - RSAPaddingMode::OAEP_SHA256{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA256")?; - Ok(()) - }, - RSAPaddingMode::OAEP_SHA384{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA384")?; - Ok(()) - }, - RSAPaddingMode::OAEP_SHA512{} => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA512")?; - Ok(()) - }, - } - } - } + impl Debug + for RSAEncryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl RSAPaddingMode { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(RSAPaddingMode::PKCS1 {}), Rc::new(RSAPaddingMode::OAEP_SHA1 {}), Rc::new(RSAPaddingMode::OAEP_SHA256 {}), Rc::new(RSAPaddingMode::OAEP_SHA384 {}), Rc::new(RSAPaddingMode::OAEP_SHA512 {})].iter() - } - } + impl DafnyPrint + for RSAEncryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAEncryptInput.RSAEncryptInput(")?; + DafnyPrint::fmt_print(padding, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for RSAPaddingMode {} + impl Eq + for RSAEncryptInput {} + + impl Hash + for RSAEncryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RSAEncryptInput::RSAEncryptInput{padding, publicKey, plaintext, } => { + Hash::hash(padding, _state); + Hash::hash(publicKey, _state); + Hash::hash(plaintext, _state) + }, + } + } + } - impl Hash - for RSAPaddingMode { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RSAPaddingMode::PKCS1{} => { + impl Default + for RSAEncryptInput { + fn default() -> RSAEncryptInput { + RSAEncryptInput::RSAEncryptInput { + padding: Default::default(), + publicKey: Default::default(), + plaintext: Default::default() + } + } + } - }, - RSAPaddingMode::OAEP_SHA1{} => { + impl AsRef + for RSAEncryptInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - RSAPaddingMode::OAEP_SHA256{} => { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(619,3) + pub type RSAModulusLengthBits = i32; - }, - RSAPaddingMode::OAEP_SHA384{} => { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(623,3) + pub type RSAModulusLengthBitsToGenerate = i32; - }, - RSAPaddingMode::OAEP_SHA512{} => { + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(627,3) + #[derive(PartialEq, Clone)] + pub enum RSAPaddingMode { + PKCS1 {}, + OAEP_SHA1 {}, + OAEP_SHA256 {}, + OAEP_SHA384 {}, + OAEP_SHA512 {} + } - }, - } - } - } + impl RSAPaddingMode {} - impl Default - for RSAPaddingMode { - fn default() -> RSAPaddingMode { - RSAPaddingMode::PKCS1 {} - } - } + impl Debug + for RSAPaddingMode { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &RSAPaddingMode { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for RSAPaddingMode { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RSAPaddingMode::PKCS1{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.PKCS1")?; + Ok(()) + }, + RSAPaddingMode::OAEP_SHA1{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA1")?; + Ok(()) + }, + RSAPaddingMode::OAEP_SHA256{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA256")?; + Ok(()) + }, + RSAPaddingMode::OAEP_SHA384{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA384")?; + Ok(()) + }, + RSAPaddingMode::OAEP_SHA512{} => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPaddingMode.OAEP__SHA512")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum RSAPrivateKey { - RSAPrivateKey { - lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits, - pem: Sequence - } - } + impl RSAPaddingMode { + /// Enumerates all possible values of RSAPaddingMode + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(RSAPaddingMode::PKCS1 {}), Arc::new(RSAPaddingMode::OAEP_SHA1 {}), Arc::new(RSAPaddingMode::OAEP_SHA256 {}), Arc::new(RSAPaddingMode::OAEP_SHA384 {}), Arc::new(RSAPaddingMode::OAEP_SHA512 {})].iter() + } + } - impl RSAPrivateKey { - pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { - match self { - RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => lengthBits, - } - } - pub fn pem(&self) -> &Sequence { - match self { - RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => pem, - } - } - } + impl Eq + for RSAPaddingMode {} - impl Debug - for RSAPrivateKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for RSAPaddingMode { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RSAPaddingMode::PKCS1{} => { - impl DafnyPrint - for RSAPrivateKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPrivateKey.RSAPrivateKey(")?; - DafnyPrint::fmt_print(lengthBits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(pem, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + RSAPaddingMode::OAEP_SHA1{} => { - impl Eq - for RSAPrivateKey {} + }, + RSAPaddingMode::OAEP_SHA256{} => { - impl Hash - for RSAPrivateKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => { - Hash::hash(lengthBits, _state); - Hash::hash(pem, _state) - }, - } - } - } + }, + RSAPaddingMode::OAEP_SHA384{} => { - impl Default - for RSAPrivateKey { - fn default() -> RSAPrivateKey { - RSAPrivateKey::RSAPrivateKey { - lengthBits: Default::default(), - pem: Default::default() - } - } - } + }, + RSAPaddingMode::OAEP_SHA512{} => { - impl AsRef - for &RSAPrivateKey { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum RSAPublicKey { - RSAPublicKey { - lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits, - pem: Sequence - } - } + impl Default + for RSAPaddingMode { + fn default() -> RSAPaddingMode { + RSAPaddingMode::PKCS1 {} + } + } - impl RSAPublicKey { - pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { - match self { - RSAPublicKey::RSAPublicKey{lengthBits, pem, } => lengthBits, - } - } - pub fn pem(&self) -> &Sequence { - match self { - RSAPublicKey::RSAPublicKey{lengthBits, pem, } => pem, - } - } - } + impl AsRef + for RSAPaddingMode { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for RSAPublicKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(633,3) + #[derive(PartialEq, Clone)] + pub enum RSAPrivateKey { + RSAPrivateKey { + lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits, + pem: Sequence + } + } - impl DafnyPrint - for RSAPublicKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RSAPublicKey::RSAPublicKey{lengthBits, pem, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPublicKey.RSAPublicKey(")?; - DafnyPrint::fmt_print(lengthBits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(pem, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl RSAPrivateKey { + /// Returns a borrow of the field lengthBits + pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { + match self { + RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => lengthBits, + } + } + /// Returns a borrow of the field pem + pub fn pem(&self) -> &Sequence { + match self { + RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => pem, + } + } + } - impl Eq - for RSAPublicKey {} + impl Debug + for RSAPrivateKey { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for RSAPublicKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RSAPublicKey::RSAPublicKey{lengthBits, pem, } => { - Hash::hash(lengthBits, _state); - Hash::hash(pem, _state) - }, - } - } - } + impl DafnyPrint + for RSAPrivateKey { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPrivateKey.RSAPrivateKey(")?; + DafnyPrint::fmt_print(lengthBits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(pem, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for RSAPublicKey { - fn default() -> RSAPublicKey { - RSAPublicKey::RSAPublicKey { - lengthBits: Default::default(), - pem: Default::default() - } - } - } + impl Eq + for RSAPrivateKey {} + + impl Hash + for RSAPrivateKey { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RSAPrivateKey::RSAPrivateKey{lengthBits, pem, } => { + Hash::hash(lengthBits, _state); + Hash::hash(pem, _state) + }, + } + } + } - impl AsRef - for &RSAPublicKey { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for RSAPrivateKey { + fn default() -> RSAPrivateKey { + RSAPrivateKey::RSAPrivateKey { + lengthBits: Default::default(), + pem: Default::default() + } + } + } - pub type SymmetricKeyLength = i32; + impl AsRef + for RSAPrivateKey { + fn as_ref(&self) -> &Self { + self + } + } - pub type Uint8Bits = i32; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(637,3) + #[derive(PartialEq, Clone)] + pub enum RSAPublicKey { + RSAPublicKey { + lengthBits: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits, + pem: Sequence + } + } - pub type Uint8Bytes = i32; + impl RSAPublicKey { + /// Returns a borrow of the field lengthBits + pub fn lengthBits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::RSAModulusLengthBits { + match self { + RSAPublicKey::RSAPublicKey{lengthBits, pem, } => lengthBits, + } + } + /// Returns a borrow of the field pem + pub fn pem(&self) -> &Sequence { + match self { + RSAPublicKey::RSAPublicKey{lengthBits, pem, } => pem, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ValidatePublicKeyInput { - ValidatePublicKeyInput { - eccCurve: Rc, - publicKey: Sequence - } - } + impl Debug + for RSAPublicKey { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ValidatePublicKeyInput { - pub fn eccCurve(&self) -> &Rc { - match self { - ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => eccCurve, - } - } - pub fn publicKey(&self) -> &Sequence { - match self { - ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => publicKey, - } - } - } + impl DafnyPrint + for RSAPublicKey { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RSAPublicKey::RSAPublicKey{lengthBits, pem, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.RSAPublicKey.RSAPublicKey(")?; + DafnyPrint::fmt_print(lengthBits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(pem, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ValidatePublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for RSAPublicKey {} + + impl Hash + for RSAPublicKey { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RSAPublicKey::RSAPublicKey{lengthBits, pem, } => { + Hash::hash(lengthBits, _state); + Hash::hash(pem, _state) + }, + } + } + } - impl DafnyPrint - for ValidatePublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ValidatePublicKeyInput.ValidatePublicKeyInput(")?; - DafnyPrint::fmt_print(eccCurve, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for RSAPublicKey { + fn default() -> RSAPublicKey { + RSAPublicKey::RSAPublicKey { + lengthBits: Default::default(), + pem: Default::default() + } + } + } - impl Eq - for ValidatePublicKeyInput {} + impl AsRef + for RSAPublicKey { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ValidatePublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => { - Hash::hash(eccCurve, _state); - Hash::hash(publicKey, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(641,3) + pub type SymmetricKeyLength = i32; - impl Default - for ValidatePublicKeyInput { - fn default() -> ValidatePublicKeyInput { - ValidatePublicKeyInput::ValidatePublicKeyInput { - eccCurve: Default::default(), - publicKey: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(645,3) + pub type Uint8Bits = i32; - impl AsRef - for &ValidatePublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(649,3) + pub type Uint8Bytes = i32; - #[derive(PartialEq, Clone)] - pub enum ValidatePublicKeyOutput { - ValidatePublicKeyOutput { - success: bool - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(653,3) + #[derive(PartialEq, Clone)] + pub enum ValidatePublicKeyInput { + ValidatePublicKeyInput { + eccCurve: Arc, + publicKey: Sequence + } + } - impl ValidatePublicKeyOutput { - pub fn success(&self) -> &bool { - match self { - ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => success, - } - } - } + impl ValidatePublicKeyInput { + /// Returns a borrow of the field eccCurve + pub fn eccCurve(&self) -> &Arc { + match self { + ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => eccCurve, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Sequence { + match self { + ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => publicKey, + } + } + } - impl Debug - for ValidatePublicKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ValidatePublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ValidatePublicKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ValidatePublicKeyOutput.ValidatePublicKeyOutput(")?; - DafnyPrint::fmt_print(success, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ValidatePublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ValidatePublicKeyInput.ValidatePublicKeyInput(")?; + DafnyPrint::fmt_print(eccCurve, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ValidatePublicKeyOutput {} + impl Eq + for ValidatePublicKeyInput {} + + impl Hash + for ValidatePublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidatePublicKeyInput::ValidatePublicKeyInput{eccCurve, publicKey, } => { + Hash::hash(eccCurve, _state); + Hash::hash(publicKey, _state) + }, + } + } + } - impl Hash - for ValidatePublicKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => { - Hash::hash(success, _state) - }, - } - } - } + impl Default + for ValidatePublicKeyInput { + fn default() -> ValidatePublicKeyInput { + ValidatePublicKeyInput::ValidatePublicKeyInput { + eccCurve: Default::default(), + publicKey: Default::default() + } + } + } - impl Default - for ValidatePublicKeyOutput { - fn default() -> ValidatePublicKeyOutput { - ValidatePublicKeyOutput::ValidatePublicKeyOutput { - success: Default::default() - } - } - } + impl AsRef + for ValidatePublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ValidatePublicKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(657,3) + #[derive(PartialEq, Clone)] + pub enum ValidatePublicKeyOutput { + ValidatePublicKeyOutput { + success: bool + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - AwsCryptographicPrimitivesError { - message: Sequence - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::AwsCryptographicPrimitivesError{message, } => message, - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } + impl ValidatePublicKeyOutput { + /// Returns a borrow of the field success + pub fn success(&self) -> &bool { + match self { + ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => success, + } + } + } - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ValidatePublicKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::AwsCryptographicPrimitivesError{message, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.AwsCryptographicPrimitivesError(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ValidatePublicKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.ValidatePublicKeyOutput.ValidatePublicKeyOutput(")?; + DafnyPrint::fmt_print(success, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for Error {} + impl Eq + for ValidatePublicKeyOutput {} - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::AwsCryptographicPrimitivesError{message, } => { - Hash::hash(message, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl Hash + for ValidatePublicKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidatePublicKeyOutput::ValidatePublicKeyOutput{success, } => { + Hash::hash(success, _state) + }, + } + } + } - impl Default - for Error { - fn default() -> Error { - Error::AwsCryptographicPrimitivesError { - message: Default::default() - } - } - } + impl Default + for ValidatePublicKeyOutput { + fn default() -> ValidatePublicKeyOutput { + ValidatePublicKeyOutput::ValidatePublicKeyOutput { + success: Default::default() + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ValidatePublicKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - pub type OpaqueError = Rc; + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(660,3) + #[derive(PartialEq, Clone)] + pub enum Error { + AwsCryptographicPrimitivesError { + message: Sequence + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - pub type DummySubsetType = DafnyInt; + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::AwsCryptographicPrimitivesError{message, } => message, + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::AwsCryptographicPrimitivesError{message, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub mod dbencryptionsdk { - pub mod dynamodb { - pub mod itemencryptor { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::Version; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::integer_range; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient; - pub use ::dafny_runtime::upcast_object; - pub use ::dafny_runtime::cast_object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; - pub use ::dafny_runtime::md; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::InternalLegacyOverride; - pub use crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput; - - pub struct _default {} - - impl _default { - pub fn DefaultDynamoDbItemEncryptorConfig() -> Rc { - Rc::new(DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { - logicalTableName: string_utf16_of("foo"), - partitionKeyName: string_utf16_of("bar"), - sortKeyName: Rc::new(Option::>::None {}), - attributeActionsOnEncrypt: map![], - allowedUnsignedAttributes: Rc::new(Option::::None {}), - allowedUnsignedAttributePrefix: Rc::new(Option::>::None {}), - algorithmSuiteId: Rc::new(Option::>::None {}), - keyring: Rc::new(Option::>::None {}), - cmm: Rc::new(Option::>::None {}), - legacyOverride: Rc::new(Option::>::None {}), - plaintextOverride: Rc::new(Option::>::None {}) - }) - } - pub fn UnreservedPrefix(attr: &Sequence) -> bool { - !(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ReservedPrefix() <= attr.clone()) && !(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ReservedCryptoContextPrefixString() <= attr.clone()) - } - pub fn DynamoDbItemEncryptor(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(matches!(config.keyring().as_ref(), None{ .. }) || matches!(config.cmm().as_ref(), None{ .. }), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Cannot provide both a keyring and a CMM") - }))); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut valueOrError1 = MaybePlacebo::>>>::new(); - valueOrError1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(matches!(config.keyring().as_ref(), Some{ .. }) || matches!(config.cmm().as_ref(), Some{ .. }), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Must provide either a keyring or a CMM") - }))); - if valueOrError1.read().IsFailure() { - res = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return res.read(); - }; - let mut version: Version = crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::VersionFromActions(config.attributeActionsOnEncrypt()); - let mut keyAction: Rc = crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::KeyActionFromVersion(version); - let mut keyActionStr: Sequence = crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::KeyActionStringFromVersion(version); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(config.attributeActionsOnEncrypt().contains(config.partitionKeyName()) && config.attributeActionsOnEncrypt().get(config.partitionKeyName()) == keyAction.clone(), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Partition key attribute action MUST be ").concat(&keyActionStr) - }))); - if valueOrError2.read().IsFailure() { - res = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return res.read(); - }; - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(!matches!(config.sortKeyName().as_ref(), Some{ .. }) || config.attributeActionsOnEncrypt().contains(config.sortKeyName().value()) && config.attributeActionsOnEncrypt().get(config.sortKeyName().value()) == keyAction.clone(), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Sort key attribute action MUST be ").concat(&keyActionStr) - }))); - if valueOrError3.read().IsFailure() { - res = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return res.read(); - }; - let mut attributeNames: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&config.attributeActionsOnEncrypt().keys(), &(Rc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::CharLess(x0, x1)) as Rc _>)); - let mut _hi0: DafnyInt = attributeNames.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut attributeName: Sequence = attributeNames.get(&i); - let mut action: Rc = config.attributeActionsOnEncrypt().get(&attributeName); - if !crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::ForwardCompatibleAttributeAction(&attributeName, &action, config.allowedUnsignedAttributes(), config.allowedUnsignedAttributePrefix()) { - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Failure { - error: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::ExplainNotForwardCompatible(&attributeName, &action, config.allowedUnsignedAttributes(), config.allowedUnsignedAttributePrefix()) - }) - })); - return res.read(); - }; - if !crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::_default::UnreservedPrefix(&attributeName) { - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Failure { - error: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Attribute: ").concat(&attributeName).concat(&string_utf16_of(" is reserved, and may not be configured.")) - }) - })); - return res.read(); - } - } - let mut structuredEncryptionRes = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::_default::StructuredEncryption(&crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::_default::DefaultStructuredEncryptionConfig())); - structuredEncryptionRes = MaybePlacebo::from(_out0.read()); - let mut valueOrError4: Rc, Rc>> = structuredEncryptionRes.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: e.clone() - }) - }) - }) - })); - if valueOrError4.IsFailure() { - res = MaybePlacebo::from(valueOrError4.PropagateFailure::>()); - return res.read(); - }; - let mut structuredEncryptionX: Object = upcast_object::()(valueOrError4.Extract()); - let mut structuredEncryption: Object = cast_object!(structuredEncryptionX.clone(), StructuredEncryptionClient); - let mut cmm = MaybePlacebo::>::new(); - if matches!(config.cmm().as_ref(), Some{ .. }) { - cmm = MaybePlacebo::from(config.cmm().value().clone()); - } else { - let mut keyring: Object = config.keyring().value().clone(); - let mut valueOrError5 = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig())); - valueOrError5 = MaybePlacebo::from(_out1.read()); - if !(!valueOrError5.read().IsFailure()) { - panic!("Halt") - }; - let mut matProv: Object = valueOrError5.read().Extract(); - let mut maybeCmm = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(IAwsCryptographicMaterialProvidersClient::CreateDefaultCryptographicMaterialsManager(md!(matProv.clone()), &Rc::new(CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { - keyring: keyring.clone() - }))); - maybeCmm = MaybePlacebo::from(_out2.read()); - let mut valueOrError6: Rc, Rc>> = maybeCmm.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError6.IsFailure() { - res = MaybePlacebo::from(valueOrError6.PropagateFailure::>()); - return res.read(); - }; - cmm = MaybePlacebo::from(valueOrError6.Extract()); - }; - let mut maybeCmpClient = MaybePlacebo::, Rc>>>::new(); - let mut _out3 = MaybePlacebo::, Rc>>>::new(); - _out3 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig())); - maybeCmpClient = MaybePlacebo::from(_out3.read()); - let mut valueOrError7 = MaybePlacebo::>>, Rc>>>::new(); - let mut _out4 = MaybePlacebo::>>, Rc>>>::new(); - _out4 = MaybePlacebo::from(InternalLegacyOverride::Build(config)); - valueOrError7 = MaybePlacebo::from(_out4.read()); - if valueOrError7.read().IsFailure() { - res = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return res.read(); - }; - let mut internalLegacyOverride: Rc>> = valueOrError7.read().Extract(); - let mut valueOrError8: Rc, Rc>> = maybeCmpClient.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError8.IsFailure() { - res = MaybePlacebo::from(valueOrError8.PropagateFailure::>()); - return res.read(); - }; - let mut cmpClient: Object = valueOrError8.Extract(); - if !(matches!((&internalLegacyOverride).as_ref(), None{ .. }) || matches!(config.plaintextOverride().as_ref(), None{ .. })) { - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Failure { - error: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Cannot configure both a plaintext policy and a legacy config.") - }) - })); - return res.read(); - }; - let mut plaintextOverride = MaybePlacebo::>::new(); - if matches!(config.plaintextOverride().as_ref(), Some{ .. }) { - plaintextOverride = MaybePlacebo::from(config.plaintextOverride().value().clone()); - } else { - plaintextOverride = MaybePlacebo::from(Rc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {})); - }; - let mut internalConfig: Rc = Rc::new(Config::Config { - version: version, - cmpClient: cmpClient.clone(), - logicalTableName: config.logicalTableName().clone(), - partitionKeyName: config.partitionKeyName().clone(), - sortKeyName: config.sortKeyName().clone(), - cmm: cmm.read(), - attributeActionsOnEncrypt: config.attributeActionsOnEncrypt().clone(), - allowedUnsignedAttributes: config.allowedUnsignedAttributes().clone(), - allowedUnsignedAttributePrefix: config.allowedUnsignedAttributePrefix().clone(), - algorithmSuiteId: config.algorithmSuiteId().clone(), - structuredEncryption: structuredEncryption.clone(), - plaintextOverride: plaintextOverride.read(), - internalLegacyOverride: internalLegacyOverride.clone() - }); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient::_ctor(&_nw0, &internalConfig); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::AwsCryptographicPrimitivesError{message, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.AwsCryptographicPrimitivesError(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.primitives.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub struct DynamoDbItemEncryptorClient { - pub r#__i_config: Rc - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::AwsCryptographicPrimitivesError{message, } => { + Hash::hash(message, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl DynamoDbItemEncryptorClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { - UpcastObjectFn!(dyn Any); - } - - impl IDynamoDbItemEncryptorClient - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { - fn EncryptItem(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::EncryptItem(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DecryptItem(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::DecryptItem(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { - UpcastObjectFn!(dyn IDynamoDbItemEncryptorClient); - } - - pub mod types { - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::Map; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; + impl Default + for Error { + fn default() -> Error { + Error::AwsCryptographicPrimitivesError { + message: Default::default() + } + } + } - pub struct _default {} + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - impl _default { - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(695,3) + pub type OpaqueError = Arc; - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + /// ../submodules/MaterialProviders/AwsCryptographyPrimitives/Model/AwsCryptographyPrimitivesTypes.dfy(698,3) + pub type DummySubsetType = DafnyInt; - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } } - } } + } - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + pub mod dbencryptionsdk { + pub mod dynamodb { + pub mod itemencryptor { + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(7,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig; + pub use ::dafny_runtime::string_utf16_of; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::map; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Outcome; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::None; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::Some; + pub use crate::implementation_from_dafny::_StructuredEncryptionHeader_Compile::Version; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::integer_range; + pub use ::dafny_runtime::int; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient; + pub use ::dafny_runtime::upcast_object; + pub use ::dafny_runtime::cast_object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; + pub use ::dafny_runtime::rd; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::InternalLegacyOverride; + pub use crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(24,3) + pub fn DefaultDynamoDbItemEncryptorConfig() -> Arc { + Arc::new(DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { + logicalTableName: string_utf16_of("foo"), + partitionKeyName: string_utf16_of("bar"), + sortKeyName: Arc::new(Option::>::None {}), + attributeActionsOnEncrypt: map![], + allowedUnsignedAttributes: Arc::new(Option::::None {}), + allowedUnsignedAttributePrefix: Arc::new(Option::>::None {}), + algorithmSuiteId: Arc::new(Option::>::None {}), + keyring: Arc::new(Option::>::None {}), + cmm: Arc::new(Option::>::None {}), + legacyOverride: Arc::new(Option::>::None {}), + plaintextOverride: Arc::new(Option::>::None {}) + }) + } + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(41,3) + pub fn UnreservedPrefix(attr: &Sequence) -> bool { + !(crate::implementation_from_dafny::_DynamoDbItemEncryptorUtil_Compile::_default::ReservedPrefix() <= attr.clone()) && !(crate::implementation_from_dafny::_StructuredEncryptionUtil_Compile::_default::ReservedCryptoContextPrefixString() <= attr.clone()) + } + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(47,3) + pub fn DynamoDbItemEncryptor(config: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut valueOrError0: Arc>>; + valueOrError0 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(matches!(config.keyring().as_ref(), None{ .. }) || matches!(config.cmm().as_ref(), None{ .. }), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Cannot provide both a keyring and a CMM") + })); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut valueOrError1: Arc>>; + valueOrError1 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(matches!(config.keyring().as_ref(), Some{ .. }) || matches!(config.cmm().as_ref(), Some{ .. }), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Must provide either a keyring or a CMM") + })); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut version: Version = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::VersionFromActions(config.attributeActionsOnEncrypt()); + let mut keyAction: Arc = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::KeyActionFromVersion(version); + let mut keyActionStr: Sequence = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::KeyActionStringFromVersion(version); + let mut valueOrError2: Arc>>; + valueOrError2 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(config.attributeActionsOnEncrypt().contains(config.partitionKeyName()) && config.attributeActionsOnEncrypt().get(config.partitionKeyName()) == keyAction.clone(), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Partition key attribute action MUST be ").concat(&keyActionStr) + })); + if valueOrError2.IsFailure() { + res = MaybePlacebo::from(valueOrError2.PropagateFailure::>()); + return res.read(); + }; + let mut valueOrError3: Arc>>; + valueOrError3 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(!matches!(config.sortKeyName().as_ref(), Some{ .. }) || config.attributeActionsOnEncrypt().contains(config.sortKeyName().value()) && config.attributeActionsOnEncrypt().get(config.sortKeyName().value()) == keyAction.clone(), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Sort key attribute action MUST be ").concat(&keyActionStr) + })); + if valueOrError3.IsFailure() { + res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); + return res.read(); + }; + let mut attributeNames: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&config.attributeActionsOnEncrypt().keys(), &(Arc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::_DynamoDbItemEncryptorUtil_Compile::_default::CharLess(x0, x1)) as Arc _ + Sync + Send>)); + let mut _hi0: DafnyInt = attributeNames.cardinality(); + for i in integer_range(int!(0), _hi0.clone()) { + let mut attributeName: Sequence = attributeNames.get(&i); + let mut action: Arc = config.attributeActionsOnEncrypt().get(&attributeName); + if !crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::ForwardCompatibleAttributeAction(&attributeName, &action, config.allowedUnsignedAttributes(), config.allowedUnsignedAttributePrefix()) { + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Failure { + error: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::ExplainNotForwardCompatible(&attributeName, &action, config.allowedUnsignedAttributes(), config.allowedUnsignedAttributePrefix()) + }) + })); + return res.read(); + }; + if !crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::_default::UnreservedPrefix(&attributeName) { + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Failure { + error: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Attribute: ").concat(&attributeName).concat(&string_utf16_of(" is reserved, and may not be configured.")) + }) + })); + return res.read(); + } + } + let mut structuredEncryptionRes: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::_default::StructuredEncryption(&crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::_default::DefaultStructuredEncryptionConfig()); + structuredEncryptionRes = _out0.clone(); + let mut valueOrError4: Arc, Arc>> = structuredEncryptionRes.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { + AwsCryptographyDbEncryptionSdkDynamoDb: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkStructuredEncryption { + AwsCryptographyDbEncryptionSdkStructuredEncryption: e.clone() + }) + }) + }) + })); + if valueOrError4.IsFailure() { + res = MaybePlacebo::from(valueOrError4.PropagateFailure::>()); + return res.read(); + }; + let mut structuredEncryptionX: Object = upcast_object::()(valueOrError4.Extract()); + let mut structuredEncryption: Object = cast_object!(structuredEncryptionX.clone(), StructuredEncryptionClient); + let mut cmm = MaybePlacebo::>::new(); + if matches!(config.cmm().as_ref(), Some{ .. }) { + cmm = MaybePlacebo::from(config.cmm().value().clone()); + } else { + let mut keyring: Object = config.keyring().value().clone(); + let mut valueOrError5: Arc, Arc>>; + let mut _out1: Arc, Arc>>; + _out1 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig()); + valueOrError5 = _out1.clone(); + if !(!valueOrError5.IsFailure()) { + panic!("Halt") + }; + let mut matProv: Object = valueOrError5.Extract(); + let mut maybeCmm: Arc, Arc>>; + let mut _out2: Arc, Arc>>; + _out2 = IAwsCryptographicMaterialProvidersClient::CreateDefaultCryptographicMaterialsManager(rd!(matProv.clone()), &Arc::new(CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { + keyring: keyring.clone() + })); + maybeCmm = _out2.clone(); + let mut valueOrError6: Arc, Arc>> = maybeCmm.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: e.clone() + }) + }) + })); + if valueOrError6.IsFailure() { + res = MaybePlacebo::from(valueOrError6.PropagateFailure::>()); + return res.read(); + }; + cmm = MaybePlacebo::from(valueOrError6.Extract()); + }; + let mut maybeCmpClient: Arc, Arc>>; + let mut _out3: Arc, Arc>>; + _out3 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig()); + maybeCmpClient = _out3.clone(); + let mut valueOrError7: Arc>>, Arc>>; + let mut _out4: Arc>>, Arc>>; + _out4 = InternalLegacyOverride::Build(config); + valueOrError7 = _out4.clone(); + if valueOrError7.IsFailure() { + res = MaybePlacebo::from(valueOrError7.PropagateFailure::>()); + return res.read(); + }; + let mut internalLegacyOverride: Arc>> = valueOrError7.Extract(); + let mut valueOrError8: Arc, Arc>> = maybeCmpClient.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: e.clone() + }) + }) + })); + if valueOrError8.IsFailure() { + res = MaybePlacebo::from(valueOrError8.PropagateFailure::>()); + return res.read(); + }; + let mut cmpClient: Object = valueOrError8.Extract(); + if !(matches!((&internalLegacyOverride).as_ref(), None{ .. }) || matches!(config.plaintextOverride().as_ref(), None{ .. })) { + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Failure { + error: Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { + message: string_utf16_of("Cannot configure both a plaintext policy and a legacy config.") + }) + })); + return res.read(); + }; + let mut plaintextOverride: Arc; + if matches!(config.plaintextOverride().as_ref(), Some{ .. }) { + plaintextOverride = config.plaintextOverride().value().clone(); + } else { + plaintextOverride = Arc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {}); + }; + let mut internalConfig: Arc = Arc::new(Config::Config { + version: version, + cmpClient: cmpClient.clone(), + logicalTableName: config.logicalTableName().clone(), + partitionKeyName: config.partitionKeyName().clone(), + sortKeyName: config.sortKeyName().clone(), + cmm: cmm.read(), + attributeActionsOnEncrypt: config.attributeActionsOnEncrypt().clone(), + allowedUnsignedAttributes: config.allowedUnsignedAttributes().clone(), + allowedUnsignedAttributePrefix: config.allowedUnsignedAttributePrefix().clone(), + algorithmSuiteId: config.algorithmSuiteId().clone(), + structuredEncryption: structuredEncryption.clone(), + plaintextOverride: plaintextOverride.clone(), + internalLegacyOverride: internalLegacyOverride.clone() + }); + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient::_ctor(&_nw0, &internalConfig); + client = _nw0.clone(); + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: client.clone() + })); + return res.read(); + } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(222,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(225,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(232,3) + pub struct DynamoDbItemEncryptorClient { + pub __i_config: Arc + } - impl Eq - for DafnyCallEvent {} + impl DynamoDbItemEncryptorClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// dafny/DynamoDbItemEncryptor/src/Index.dfy(241,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(236,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { + UpcastObjectFn!(DynAny); + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl IDynamoDbItemEncryptorClient + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(245,5) + fn EncryptItem(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::EncryptItem(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(265,5) + fn DecryptItem(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile::_default::DecryptItem(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient { + UpcastObjectFn!(dyn IDynamoDbItemEncryptorClient); + } - #[derive(PartialEq, Clone)] - pub enum DecryptItemInput { - DecryptItemInput { - encryptedItem: Map, Rc> - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(10,1) + pub mod types { + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::Map; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyOverride; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey; + pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(169,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl DecryptItemInput { - pub fn encryptedItem(&self) -> &Map, Rc> { - match self { - DecryptItemInput::DecryptItemInput{encryptedItem, } => encryptedItem, - } - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(21,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl Debug - for DecryptItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl DafnyPrint - for DecryptItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptItemInput::DecryptItemInput{encryptedItem, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DecryptItemInput.DecryptItemInput(")?; - DafnyPrint::fmt_print(encryptedItem, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DecryptItemInput {} + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DecryptItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptItemInput::DecryptItemInput{encryptedItem, } => { - Hash::hash(encryptedItem, _state) - }, - } - } - } + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Default - for DecryptItemInput { - fn default() -> DecryptItemInput { - DecryptItemInput::DecryptItemInput { - encryptedItem: Default::default() - } - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl AsRef - for &DecryptItemInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum DecryptItemOutput { - DecryptItemOutput { - plaintextItem: Map, Rc>, - parsedHeader: Rc>> - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(25,3) + #[derive(PartialEq, Clone)] + pub enum DecryptItemInput { + DecryptItemInput { + encryptedItem: Map, Arc> + } + } - impl DecryptItemOutput { - pub fn plaintextItem(&self) -> &Map, Rc> { - match self { - DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => plaintextItem, - } - } - pub fn parsedHeader(&self) -> &Rc>> { - match self { - DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => parsedHeader, - } - } - } + impl DecryptItemInput { + /// Returns a borrow of the field encryptedItem + pub fn encryptedItem(&self) -> &Map, Arc> { + match self { + DecryptItemInput::DecryptItemInput{encryptedItem, } => encryptedItem, + } + } + } - impl Debug - for DecryptItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DecryptItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DecryptItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DecryptItemOutput.DecryptItemOutput(")?; - DafnyPrint::fmt_print(plaintextItem, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DecryptItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptItemInput::DecryptItemInput{encryptedItem, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DecryptItemInput.DecryptItemInput(")?; + DafnyPrint::fmt_print(encryptedItem, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DecryptItemOutput {} + impl Eq + for DecryptItemInput {} - impl Hash - for DecryptItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => { - Hash::hash(plaintextItem, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } + impl Hash + for DecryptItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptItemInput::DecryptItemInput{encryptedItem, } => { + Hash::hash(encryptedItem, _state) + }, + } + } + } - impl Default - for DecryptItemOutput { - fn default() -> DecryptItemOutput { - DecryptItemOutput::DecryptItemOutput { - plaintextItem: Default::default(), - parsedHeader: Default::default() - } - } - } + impl Default + for DecryptItemInput { + fn default() -> DecryptItemInput { + DecryptItemInput::DecryptItemInput { + encryptedItem: Default::default() + } + } + } - impl AsRef - for &DecryptItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DecryptItemInput { + fn as_ref(&self) -> &Self { + self + } + } - pub struct IDynamoDbItemEncryptorClientCallHistory {} + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(28,3) + #[derive(PartialEq, Clone)] + pub enum DecryptItemOutput { + DecryptItemOutput { + plaintextItem: Map, Arc>, + parsedHeader: Arc>> + } + } - impl IDynamoDbItemEncryptorClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl DecryptItemOutput { + /// Returns a borrow of the field plaintextItem + pub fn plaintextItem(&self) -> &Map, Arc> { + match self { + DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => plaintextItem, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc>> { + match self { + DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => parsedHeader, + } + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClientCallHistory { - UpcastObjectFn!(dyn Any); - } + impl Debug + for DecryptItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub trait IDynamoDbItemEncryptorClient: Any + UpcastObject { - fn EncryptItem(&self, input: &Rc) -> Rc, Rc>>; - fn DecryptItem(&self, input: &Rc) -> Rc, Rc>>; - } + impl DafnyPrint + for DecryptItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DecryptItemOutput.DecryptItemOutput(")?; + DafnyPrint::fmt_print(plaintextItem, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DynamoDbItemEncryptorConfig { - DynamoDbItemEncryptorConfig { - logicalTableName: Sequence, - partitionKeyName: Sequence, - sortKeyName: Rc>>, - attributeActionsOnEncrypt: Map, Rc>, - allowedUnsignedAttributes: Rc>, - allowedUnsignedAttributePrefix: Rc>>, - algorithmSuiteId: Rc>>, - keyring: Rc>>, - cmm: Rc>>, - legacyOverride: Rc>>, - plaintextOverride: Rc>> - } - } - - impl DynamoDbItemEncryptorConfig { - pub fn logicalTableName(&self) -> &Sequence { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => logicalTableName, - } - } - pub fn partitionKeyName(&self) -> &Sequence { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => partitionKeyName, - } - } - pub fn sortKeyName(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => sortKeyName, - } - } - pub fn attributeActionsOnEncrypt(&self) -> &Map, Rc> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => attributeActionsOnEncrypt, - } - } - pub fn allowedUnsignedAttributes(&self) -> &Rc> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributes, - } - } - pub fn allowedUnsignedAttributePrefix(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributePrefix, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => algorithmSuiteId, - } - } - pub fn keyring(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => keyring, - } - } - pub fn cmm(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => cmm, - } - } - pub fn legacyOverride(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => legacyOverride, - } - } - pub fn plaintextOverride(&self) -> &Rc>> { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => plaintextOverride, - } - } - } + impl Eq + for DecryptItemOutput {} + + impl Hash + for DecryptItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptItemOutput::DecryptItemOutput{plaintextItem, parsedHeader, } => { + Hash::hash(plaintextItem, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl Debug - for DynamoDbItemEncryptorConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DecryptItemOutput { + fn default() -> DecryptItemOutput { + DecryptItemOutput::DecryptItemOutput { + plaintextItem: Default::default(), + parsedHeader: Default::default() + } + } + } - impl DafnyPrint - for DynamoDbItemEncryptorConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DynamoDbItemEncryptorConfig.DynamoDbItemEncryptorConfig(")?; - DafnyPrint::fmt_print(logicalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partitionKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(sortKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributePrefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyring, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(legacyOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DecryptItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DynamoDbItemEncryptorConfig {} + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(32,3) + pub struct IDynamoDbItemEncryptorClientCallHistory {} - impl Hash - for DynamoDbItemEncryptorConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { - Hash::hash(logicalTableName, _state); - Hash::hash(partitionKeyName, _state); - Hash::hash(sortKeyName, _state); - Hash::hash(attributeActionsOnEncrypt, _state); - Hash::hash(allowedUnsignedAttributes, _state); - Hash::hash(allowedUnsignedAttributePrefix, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(keyring, _state); - Hash::hash(cmm, _state); - Hash::hash(legacyOverride, _state); - Hash::hash(plaintextOverride, _state) - }, - } - } - } + impl IDynamoDbItemEncryptorClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Default - for DynamoDbItemEncryptorConfig { - fn default() -> DynamoDbItemEncryptorConfig { - DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { - logicalTableName: Default::default(), - partitionKeyName: Default::default(), - sortKeyName: Default::default(), - attributeActionsOnEncrypt: Default::default(), - allowedUnsignedAttributes: Default::default(), - allowedUnsignedAttributePrefix: Default::default(), - algorithmSuiteId: Default::default(), - keyring: Default::default(), - cmm: Default::default(), - legacyOverride: Default::default(), - plaintextOverride: Default::default() - } - } - } - - impl AsRef - for &DynamoDbItemEncryptorConfig { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClientCallHistory { + UpcastObjectFn!(DynAny); + } - #[derive(PartialEq, Clone)] - pub enum EncryptItemInput { - EncryptItemInput { - plaintextItem: Map, Rc> - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(40,3) + pub trait IDynamoDbItemEncryptorClient: Any + Sync + Send + UpcastObject { + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(69,5) + fn EncryptItem(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(84,5) + fn DecryptItem(&self, input: &Arc) -> Arc, Arc>>; + } - impl EncryptItemInput { - pub fn plaintextItem(&self) -> &Map, Rc> { - match self { - EncryptItemInput::EncryptItemInput{plaintextItem, } => plaintextItem, - } - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(98,3) + #[derive(PartialEq, Clone)] + pub enum DynamoDbItemEncryptorConfig { + DynamoDbItemEncryptorConfig { + logicalTableName: Sequence, + partitionKeyName: Sequence, + sortKeyName: Arc>>, + attributeActionsOnEncrypt: Map, Arc>, + allowedUnsignedAttributes: Arc>, + allowedUnsignedAttributePrefix: Arc>>, + algorithmSuiteId: Arc>>, + keyring: Arc>>, + cmm: Arc>>, + legacyOverride: Arc>>, + plaintextOverride: Arc>> + } + } - impl Debug - for EncryptItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DynamoDbItemEncryptorConfig { + /// Returns a borrow of the field logicalTableName + pub fn logicalTableName(&self) -> &Sequence { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => logicalTableName, + } + } + /// Returns a borrow of the field partitionKeyName + pub fn partitionKeyName(&self) -> &Sequence { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => partitionKeyName, + } + } + /// Returns a borrow of the field sortKeyName + pub fn sortKeyName(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => sortKeyName, + } + } + /// Returns a borrow of the field attributeActionsOnEncrypt + pub fn attributeActionsOnEncrypt(&self) -> &Map, Arc> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => attributeActionsOnEncrypt, + } + } + /// Returns a borrow of the field allowedUnsignedAttributes + pub fn allowedUnsignedAttributes(&self) -> &Arc> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributes, + } + } + /// Returns a borrow of the field allowedUnsignedAttributePrefix + pub fn allowedUnsignedAttributePrefix(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributePrefix, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field keyring + pub fn keyring(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => keyring, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => cmm, + } + } + /// Returns a borrow of the field legacyOverride + pub fn legacyOverride(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => legacyOverride, + } + } + /// Returns a borrow of the field plaintextOverride + pub fn plaintextOverride(&self) -> &Arc>> { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => plaintextOverride, + } + } + } - impl DafnyPrint - for EncryptItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptItemInput::EncryptItemInput{plaintextItem, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.EncryptItemInput.EncryptItemInput(")?; - DafnyPrint::fmt_print(plaintextItem, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DynamoDbItemEncryptorConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for EncryptItemInput {} + impl DafnyPrint + for DynamoDbItemEncryptorConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.DynamoDbItemEncryptorConfig.DynamoDbItemEncryptorConfig(")?; + DafnyPrint::fmt_print(logicalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partitionKeyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(sortKeyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(allowedUnsignedAttributes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(allowedUnsignedAttributePrefix, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyring, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(legacyOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextOverride, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for EncryptItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptItemInput::EncryptItemInput{plaintextItem, } => { - Hash::hash(plaintextItem, _state) - }, - } - } - } + impl Eq + for DynamoDbItemEncryptorConfig {} + + impl Hash + for DynamoDbItemEncryptorConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig{logicalTableName, partitionKeyName, sortKeyName, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { + Hash::hash(logicalTableName, _state); + Hash::hash(partitionKeyName, _state); + Hash::hash(sortKeyName, _state); + Hash::hash(attributeActionsOnEncrypt, _state); + Hash::hash(allowedUnsignedAttributes, _state); + Hash::hash(allowedUnsignedAttributePrefix, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(keyring, _state); + Hash::hash(cmm, _state); + Hash::hash(legacyOverride, _state); + Hash::hash(plaintextOverride, _state) + }, + } + } + } - impl Default - for EncryptItemInput { - fn default() -> EncryptItemInput { - EncryptItemInput::EncryptItemInput { - plaintextItem: Default::default() - } - } - } + impl Default + for DynamoDbItemEncryptorConfig { + fn default() -> DynamoDbItemEncryptorConfig { + DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { + logicalTableName: Default::default(), + partitionKeyName: Default::default(), + sortKeyName: Default::default(), + attributeActionsOnEncrypt: Default::default(), + allowedUnsignedAttributes: Default::default(), + allowedUnsignedAttributePrefix: Default::default(), + algorithmSuiteId: Default::default(), + keyring: Default::default(), + cmm: Default::default(), + legacyOverride: Default::default(), + plaintextOverride: Default::default() + } + } + } - impl AsRef - for &EncryptItemInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DynamoDbItemEncryptorConfig { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum EncryptItemOutput { - EncryptItemOutput { - encryptedItem: Map, Rc>, - parsedHeader: Rc>> - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(111,3) + #[derive(PartialEq, Clone)] + pub enum EncryptItemInput { + EncryptItemInput { + plaintextItem: Map, Arc> + } + } - impl EncryptItemOutput { - pub fn encryptedItem(&self) -> &Map, Rc> { - match self { - EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => encryptedItem, - } - } - pub fn parsedHeader(&self) -> &Rc>> { - match self { - EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => parsedHeader, - } - } - } + impl EncryptItemInput { + /// Returns a borrow of the field plaintextItem + pub fn plaintextItem(&self) -> &Map, Arc> { + match self { + EncryptItemInput::EncryptItemInput{plaintextItem, } => plaintextItem, + } + } + } - impl Debug - for EncryptItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for EncryptItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for EncryptItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.EncryptItemOutput.EncryptItemOutput(")?; - DafnyPrint::fmt_print(encryptedItem, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for EncryptItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptItemInput::EncryptItemInput{plaintextItem, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.EncryptItemInput.EncryptItemInput(")?; + DafnyPrint::fmt_print(plaintextItem, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for EncryptItemOutput {} + impl Eq + for EncryptItemInput {} - impl Hash - for EncryptItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => { - Hash::hash(encryptedItem, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } + impl Hash + for EncryptItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptItemInput::EncryptItemInput{plaintextItem, } => { + Hash::hash(plaintextItem, _state) + }, + } + } + } - impl Default - for EncryptItemOutput { - fn default() -> EncryptItemOutput { - EncryptItemOutput::EncryptItemOutput { - encryptedItem: Default::default(), - parsedHeader: Default::default() - } - } - } + impl Default + for EncryptItemInput { + fn default() -> EncryptItemInput { + EncryptItemInput::EncryptItemInput { + plaintextItem: Default::default() + } + } + } - impl AsRef - for &EncryptItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for EncryptItemInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ParsedHeader { - ParsedHeader { - attributeActionsOnEncrypt: Map, Rc>, - algorithmSuiteId: Rc, - encryptedDataKeys: Sequence>, - storedEncryptionContext: Map, - encryptionContext: Map, - selectorContext: Map, Rc> - } - } - - impl ParsedHeader { - pub fn attributeActionsOnEncrypt(&self) -> &Map, Rc> { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => attributeActionsOnEncrypt, - } - } - pub fn algorithmSuiteId(&self) -> &Rc { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => algorithmSuiteId, - } - } - pub fn encryptedDataKeys(&self) -> &Sequence> { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => encryptedDataKeys, - } - } - pub fn storedEncryptionContext(&self) -> &Map { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => storedEncryptionContext, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => encryptionContext, - } - } - pub fn selectorContext(&self) -> &Map, Rc> { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => selectorContext, - } - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(114,3) + #[derive(PartialEq, Clone)] + pub enum EncryptItemOutput { + EncryptItemOutput { + encryptedItem: Map, Arc>, + parsedHeader: Arc>> + } + } - impl Debug - for ParsedHeader { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl EncryptItemOutput { + /// Returns a borrow of the field encryptedItem + pub fn encryptedItem(&self) -> &Map, Arc> { + match self { + EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => encryptedItem, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc>> { + match self { + EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => parsedHeader, + } + } + } - impl DafnyPrint - for ParsedHeader { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.ParsedHeader.ParsedHeader(")?; - DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(storedEncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(selectorContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for EncryptItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ParsedHeader {} + impl DafnyPrint + for EncryptItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.EncryptItemOutput.EncryptItemOutput(")?; + DafnyPrint::fmt_print(encryptedItem, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ParsedHeader { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => { - Hash::hash(attributeActionsOnEncrypt, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptedDataKeys, _state); - Hash::hash(storedEncryptionContext, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(selectorContext, _state) - }, - } - } - } + impl Eq + for EncryptItemOutput {} + + impl Hash + for EncryptItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptItemOutput::EncryptItemOutput{encryptedItem, parsedHeader, } => { + Hash::hash(encryptedItem, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl Default - for ParsedHeader { - fn default() -> ParsedHeader { - ParsedHeader::ParsedHeader { - attributeActionsOnEncrypt: Default::default(), - algorithmSuiteId: Default::default(), - encryptedDataKeys: Default::default(), - storedEncryptionContext: Default::default(), - encryptionContext: Default::default(), - selectorContext: Default::default() - } - } - } - - impl AsRef - for &ParsedHeader { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for EncryptItemOutput { + fn default() -> EncryptItemOutput { + EncryptItemOutput::EncryptItemOutput { + encryptedItem: Default::default(), + parsedHeader: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - DynamoDbItemEncryptorException { - message: Sequence - }, - AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: Rc - }, - AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: Rc - }, - AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: Rc - }, - AwsCryptographyPrimitives { - AwsCryptographyPrimitives: Rc - }, - ComAmazonawsDynamodb { - ComAmazonawsDynamodb: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::DynamoDbItemEncryptorException{message, } => message, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkDynamoDb(&self) -> &Rc { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => AwsCryptographyDbEncryptionSdkDynamoDb, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Rc { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyMaterialProviders(&self) -> &Rc { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyPrimitives(&self) -> &Rc { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsDynamodb(&self) -> &Rc { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } + impl AsRef + for EncryptItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(118,3) + #[derive(PartialEq, Clone)] + pub enum ParsedHeader { + ParsedHeader { + attributeActionsOnEncrypt: Map, Arc>, + algorithmSuiteId: Arc, + encryptedDataKeys: Sequence>, + storedEncryptionContext: Map, + encryptionContext: Map, + selectorContext: Map, Arc> + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::DynamoDbItemEncryptorException{message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.DynamoDbItemEncryptorException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDb(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; - DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyPrimitives(")?; - DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.ComAmazonawsDynamodb(")?; - DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ParsedHeader { + /// Returns a borrow of the field attributeActionsOnEncrypt + pub fn attributeActionsOnEncrypt(&self) -> &Map, Arc> { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => attributeActionsOnEncrypt, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptedDataKeys + pub fn encryptedDataKeys(&self) -> &Sequence> { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => encryptedDataKeys, + } + } + /// Returns a borrow of the field storedEncryptionContext + pub fn storedEncryptionContext(&self) -> &Map { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => storedEncryptionContext, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => encryptionContext, + } + } + /// Returns a borrow of the field selectorContext + pub fn selectorContext(&self) -> &Map, Arc> { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => selectorContext, + } + } + } - impl Eq - for Error {} + impl Debug + for ParsedHeader { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::DynamoDbItemEncryptorException{message, } => { - Hash::hash(message, _state) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDb, _state) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - Hash::hash(AwsCryptographyMaterialProviders, _state) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - Hash::hash(AwsCryptographyPrimitives, _state) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - Hash::hash(ComAmazonawsDynamodb, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl DafnyPrint + for ParsedHeader { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.ParsedHeader.ParsedHeader(")?; + DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(storedEncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(selectorContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for Error { - fn default() -> Error { - Error::DynamoDbItemEncryptorException { - message: Default::default() - } - } - } + impl Eq + for ParsedHeader {} + + impl Hash + for ParsedHeader { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ParsedHeader::ParsedHeader{attributeActionsOnEncrypt, algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, selectorContext, } => { + Hash::hash(attributeActionsOnEncrypt, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptedDataKeys, _state); + Hash::hash(storedEncryptionContext, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(selectorContext, _state) + }, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ParsedHeader { + fn default() -> ParsedHeader { + ParsedHeader::ParsedHeader { + attributeActionsOnEncrypt: Default::default(), + algorithmSuiteId: Default::default(), + encryptedDataKeys: Default::default(), + storedEncryptionContext: Default::default(), + encryptionContext: Default::default(), + selectorContext: Default::default() + } + } + } - pub type OpaqueError = Rc; + impl AsRef + for ParsedHeader { + fn as_ref(&self) -> &Self { + self + } + } - pub type DummySubsetType = DafnyInt; + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(126,3) + #[derive(PartialEq, Clone)] + pub enum Error { + DynamoDbItemEncryptorException { + message: Sequence + }, + AwsCryptographyDbEncryptionSdkDynamoDb { + AwsCryptographyDbEncryptionSdkDynamoDb: Arc + }, + AwsCryptographyDbEncryptionSdkStructuredEncryption { + AwsCryptographyDbEncryptionSdkStructuredEncryption: Arc + }, + AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: Arc + }, + AwsCryptographyPrimitives { + AwsCryptographyPrimitives: Arc + }, + ComAmazonawsDynamodb { + ComAmazonawsDynamodb: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::DynamoDbItemEncryptorException{message, } => message, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkDynamoDb for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkDynamoDb(&self) -> &Arc { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => AwsCryptographyDbEncryptionSdkDynamoDb, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkStructuredEncryption for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Arc { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyMaterialProviders for all enum members which have it + pub fn AwsCryptographyMaterialProviders(&self) -> &Arc { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyPrimitives for all enum members which have it + pub fn AwsCryptographyPrimitives(&self) -> &Arc { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsDynamodb for all enum members which have it + pub fn ComAmazonawsDynamodb(&self) -> &Arc { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::DynamoDbItemEncryptorException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - pub mod legacy { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::InternalLegacyOverride; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::_dafny_externs::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::*; - - impl InternalLegacyOverride { - pub fn CreateBuildSuccess(value: &Rc>>) -> Rc>>, Rc>> { - Rc::new(Result::>>, Rc>::Success { - value: value.clone() - }) - } - pub fn CreateBuildFailure(error: &Rc) -> Rc>>, Rc>> { - Rc::new(Result::>>, Rc>::Failure { - error: error.clone() - }) - } - pub fn CreateInternalLegacyOverrideSome(value: &Object) -> Rc>> { - Rc::new(Option::>::Some { - value: value.clone() - }) - } - pub fn CreateInternalLegacyOverrideNone() -> Rc>> { - Rc::new(Option::>::None {}) - } - pub fn CreateEncryptItemSuccess(&self, value: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: value.clone() - }) - } - pub fn CreateEncryptItemFailure(&self, error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - pub fn CreateDecryptItemSuccess(&self, value: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: value.clone() - }) - } - pub fn CreateDecryptItemFailure(&self, error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - pub fn policy(&self) -> Rc { - self.r#__i_policy.clone() - } - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl UpcastObject - for InternalLegacyOverride { - UpcastObjectFn!(dyn Any); - } - } - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::DynamoDbItemEncryptorException{message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.DynamoDbItemEncryptorException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDb(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; + DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.AwsCryptographyPrimitives(")?; + DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.ComAmazonawsDynamodb(")?; + DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.itemencryptor.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub mod transforms { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig; - pub use ::dafny_runtime::map; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::ValidTableConfig; - pub use ::dafny_runtime::Set; - pub use ::dafny_runtime::set; - pub use ::dafny_runtime::DafnyInt; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::r#_SearchableEncryptionInfo_Compile::SearchInfo; - pub use crate::implementation_from_dafny::r#_SearchableEncryptionInfo_Compile::ValidSearchInfo; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::itertools::Itertools; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClient; - pub use ::dafny_runtime::upcast_object; - pub use ::dafny_runtime::cast_object; - pub use ::dafny_runtime::rd; - pub use crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::TableConfig; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::IDynamoDbEncryptionTransformsClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput; - - pub struct _default {} - - impl _default { - pub fn DefaultDynamoDbTablesEncryptionConfig() -> Rc { - Rc::new(DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { - tableEncryptionConfigs: map![] - }) - } - pub fn AddSignedBeaconActions(names: &Sequence>, actions: &Map, Rc>) -> Map, Rc> { - let mut _r0 = names.clone(); - let mut _r1 = actions.clone(); - 'TAIL_CALL_START: loop { - let names = _r0; - let actions = _r1; - if names.cardinality() == int!(0) { - return actions.clone(); - } else { - let mut _in0: Sequence> = names.drop(&int!(1)); - let mut _in1: Map, Rc> = actions.update_index(&names.get(&int!(0)), &Rc::new(CryptoAction::SIGN_ONLY {})); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - continue 'TAIL_CALL_START; - } - } - } - pub fn IsConfigured(config: &Rc, name: &Sequence) -> bool { - config.attributeActionsOnEncrypt().contains(name) || matches!(config.allowedUnsignedAttributes().as_ref(), Some{ .. }) && config.allowedUnsignedAttributes().value().contains(name) || matches!(config.allowedUnsignedAttributePrefix().as_ref(), Some{ .. }) && config.allowedUnsignedAttributePrefix().value().clone() <= name.clone() - } - pub fn DynamoDbEncryptionTransforms(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut internalConfigs: Map, ValidTableConfig> = map![]; - let mut r#_m_k: Map, Rc> = config.tableEncryptionConfigs().clone(); - let mut mKeys: Set> = r#_m_k.keys(); - let mut tableNamesSeq = MaybePlacebo::>>::new(); - let mut _out0 = MaybePlacebo::>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::SortedSets::_default::SetToSequence::>(&mKeys)); - tableNamesSeq = MaybePlacebo::from(_out0.read()); - let mut allLogicalTableNames: Set> = set!{}; - let mut i: DafnyInt = int!(0); - while i.clone() < tableNamesSeq.read().cardinality() { - let mut tableName: Sequence = tableNamesSeq.read().get(&i); - let mut inputConfig: Rc = config.tableEncryptionConfigs().get(&tableName); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(!allLogicalTableNames.contains(inputConfig.logicalTableName()), &crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Duplicate logical table maped to multipule physical tables: ").concat(inputConfig.logicalTableName())))); - if valueOrError0.read().IsFailure() { - res = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return res.read(); - }; - let mut searchR = MaybePlacebo::>>, Rc>>>::new(); - let mut _out1 = MaybePlacebo::>, Rc>>>::new(); - _out1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_SearchConfigToInfo_Compile::_default::Convert(&inputConfig)); - searchR = MaybePlacebo::from(_out1.read()); - let mut valueOrError1 = MaybePlacebo::>>, Rc>>>::new(); - valueOrError1 = MaybePlacebo::from(searchR.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError1.read().IsFailure() { - res = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return res.read(); - }; - let mut search: Rc>> = valueOrError1.read().Extract(); - let mut signedBeacons = MaybePlacebo::>>::new(); - if matches!((&search).as_ref(), None{ .. }) { - signedBeacons = MaybePlacebo::from(seq![] as Sequence>); - } else { - signedBeacons = MaybePlacebo::from(search.value().curr().ListSignedBeacons()); - }; - let mut badBeacons: Sequence> = crate::implementation_from_dafny::r#_Seq_Compile::_default::Filter::>({ - let inputConfig: Rc = inputConfig.clone(); - &({ - let mut inputConfig = inputConfig.clone(); - Rc::new(move |s: &Sequence| -> bool{ - crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::_default::IsConfigured(&inputConfig, s) - }) - }) - }, &signedBeacons.read()); - if int!(0) < badBeacons.cardinality() { - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Signed beacons cannot be configured with CryptoActions or as unauthenticated : ").concat(&crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Join::(&badBeacons, &string_utf16_of(", ")))) - })); - return res.read(); - }; - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(Itertools::unique((&signedBeacons.read()).iter()).all(({ - let mut signedBeacons = signedBeacons.clone(); - Rc::new(move |r#__forall_var_0: Sequence| -> bool{ - let mut k: Sequence = r#__forall_var_0.clone(); - !signedBeacons.read().contains(&k) || crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&k) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Beacon configured with bad name")))); - if valueOrError2.read().IsFailure() { - res = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return res.read(); - }; - let mut newActions: Map, Rc> = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::_default::AddSignedBeaconActions(&signedBeacons.read(), inputConfig.attributeActionsOnEncrypt()); - let mut encryptorConfig: Rc = Rc::new(DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { - logicalTableName: inputConfig.logicalTableName().clone(), - partitionKeyName: inputConfig.partitionKeyName().clone(), - sortKeyName: inputConfig.sortKeyName().clone(), - attributeActionsOnEncrypt: newActions.clone(), - allowedUnsignedAttributes: inputConfig.allowedUnsignedAttributes().clone(), - allowedUnsignedAttributePrefix: inputConfig.allowedUnsignedAttributePrefix().clone(), - algorithmSuiteId: inputConfig.algorithmSuiteId().clone(), - keyring: inputConfig.keyring().clone(), - cmm: inputConfig.cmm().clone(), - legacyOverride: inputConfig.legacyOverride().clone(), - plaintextOverride: inputConfig.plaintextOverride().clone() - }); - let mut itemEncryptorRes = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::_default::DynamoDbItemEncryptor(&encryptorConfig)); - itemEncryptorRes = MaybePlacebo::from(_out2.read()); - let mut valueOrError3: Rc, Rc>> = itemEncryptorRes.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor { - AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor: e.clone() - }) - }) - })); - if valueOrError3.IsFailure() { - res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); - return res.read(); - }; - let mut itemEncryptorX: Object = upcast_object::()(valueOrError3.Extract()); - let mut itemEncryptor: Object = cast_object!(itemEncryptorX.clone(), DynamoDbItemEncryptorClient); - let mut encConfig: Rc = rd!(itemEncryptor.clone()).config().clone(); - let mut internalConfig: ValidTableConfig = Rc::new(TableConfig::TableConfig { - physicalTableName: tableName.clone(), - logicalTableName: inputConfig.logicalTableName().clone(), - partitionKeyName: inputConfig.partitionKeyName().clone(), - sortKeyName: inputConfig.sortKeyName().clone(), - itemEncryptor: itemEncryptor.clone(), - search: search.clone(), - plaintextOverride: inputConfig.plaintextOverride().UnwrapOr(&Rc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {})) - }); - internalConfigs = internalConfigs.update_index(&tableName, &internalConfig); - allLogicalTableNames = allLogicalTableNames.merge(&set!{internalConfig.logicalTableName().clone()}); - i = i.clone() + int!(1); - }; - let mut newConfig: Rc = Rc::new(crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::Config::Config { - tableEncryptionConfigs: internalConfigs.clone() - }); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient::_ctor(&_nw0, &newConfig); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::DynamoDbItemEncryptorException{message, } => { + Hash::hash(message, _state) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDb, _state) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + Hash::hash(AwsCryptographyMaterialProviders, _state) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + Hash::hash(AwsCryptographyPrimitives, _state) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + Hash::hash(ComAmazonawsDynamodb, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - pub struct DynamoDbEncryptionTransformsClient { - pub r#__i_config: Rc - } + impl Default + for Error { + fn default() -> Error { + Error::DynamoDbItemEncryptorException { + message: Default::default() + } + } + } - impl DynamoDbEncryptionTransformsClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { - UpcastObjectFn!(dyn Any); - } - - impl IDynamoDbEncryptionTransformsClient - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { - fn PutItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::PutItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn PutItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::PutItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::GetItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::GetItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchWriteItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchWriteItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchWriteItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchWriteItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchGetItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchGetItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchGetItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchGetItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ScanInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ScanInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ScanOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ScanOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn QueryInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::QueryInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn QueryOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::QueryOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn TransactWriteItemsInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactWriteItemsInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn TransactWriteItemsOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactWriteItemsOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn UpdateItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::UpdateItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn UpdateItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::UpdateItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DeleteItemInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::DeleteItemInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DeleteItemOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::DeleteItemOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn TransactGetItemsInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactGetItemsInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn TransactGetItemsOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactGetItemsOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ExecuteStatementInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteStatementInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ExecuteStatementOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteStatementOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchExecuteStatementInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchExecuteStatementInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn BatchExecuteStatementOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchExecuteStatementOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ExecuteTransactionInputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteTransactionInputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ExecuteTransactionOutputTransform(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteTransactionOutputTransform(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ResolveAttributes(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ResolveAttributes(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { - UpcastObjectFn!(dyn IDynamoDbEncryptionTransformsClient); - } - - pub mod types { - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput; + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - pub struct _default {} + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(165,3) + pub type OpaqueError = Arc; - impl _default { - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } + /// dafny/DynamoDbItemEncryptor/Model/AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorTypes.dfy(168,3) + pub type DummySubsetType = DafnyInt; - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(6,1) + pub mod legacy { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::InternalLegacyOverride; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::_dafny_externs::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::*; + + impl InternalLegacyOverride { + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(30,5) + pub fn CreateBuildSuccess(value: &Arc>>) -> Arc>>, Arc>> { + Arc::new(Result::>>, Arc>::Success { + value: value.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(34,5) + pub fn CreateBuildFailure(error: &Arc) -> Arc>>, Arc>> { + Arc::new(Result::>>, Arc>::Failure { + error: error.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(38,5) + pub fn CreateInternalLegacyOverrideSome(value: &Object) -> Arc>> { + Arc::new(Option::>::Some { + value: value.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(42,5) + pub fn CreateInternalLegacyOverrideNone() -> Arc>> { + Arc::new(Option::>::None {}) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(46,5) + pub fn CreateEncryptItemSuccess(&self, value: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: value.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(50,5) + pub fn CreateEncryptItemFailure(&self, error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(54,5) + pub fn CreateDecryptItemSuccess(&self, value: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: value.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(58,5) + pub fn CreateDecryptItemFailure(&self, error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + /// dafny/DynamoDbItemEncryptor/src/InternalLegacyOverride.dfy(16,5) + pub fn policy(&self) -> Arc { + self.__i_policy.clone() + } + } + + impl UpcastObject + for InternalLegacyOverride { + UpcastObjectFn!(DynAny); + } + } + } } - } - } - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + pub mod transforms { + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(8,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTablesEncryptionConfig; + pub use ::dafny_runtime::map; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; + pub use ::dafny_runtime::int; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbTableEncryptionConfig; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::Some; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::ValidTableConfig; + pub use ::dafny_runtime::Set; + pub use ::dafny_runtime::set; + pub use ::dafny_runtime::DafnyInt; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Outcome; + pub use ::dafny_runtime::string_utf16_of; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use crate::implementation_from_dafny::_SearchableEncryptionInfo_Compile::SearchInfo; + pub use crate::implementation_from_dafny::_SearchableEncryptionInfo_Compile::ValidSearchInfo; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::None; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::itertools::Itertools; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DynamoDbItemEncryptorConfig; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::DynamoDbItemEncryptorClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::IDynamoDbItemEncryptorClient; + pub use ::dafny_runtime::upcast_object; + pub use ::dafny_runtime::cast_object; + pub use ::dafny_runtime::rd; + pub use crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::TableConfig; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::IDynamoDbEncryptionTransformsClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(25,3) + pub fn DefaultDynamoDbTablesEncryptionConfig() -> Arc { + Arc::new(DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { + tableEncryptionConfigs: map![] + }) + } + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(61,3) + pub fn AddSignedBeaconActions(names: &Sequence>, actions: &Map, Arc>) -> Map, Arc> { + let mut _r0 = names.clone(); + let mut _r1 = actions.clone(); + 'TAIL_CALL_START: loop { + let names = _r0; + let actions = _r1; + if names.cardinality() == int!(0) { + return actions.clone(); + } else { + let mut _in0: Sequence> = names.drop(&int!(1)); + let mut _in1: Map, Arc> = actions.update_index(&names.get(&int!(0)), &Arc::new(CryptoAction::SIGN_ONLY {})); + _r0 = _in0.clone(); + _r1 = _in1.clone(); + continue 'TAIL_CALL_START; + } + } + } + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(70,3) + pub fn IsConfigured(config: &Arc, name: &Sequence) -> bool { + config.attributeActionsOnEncrypt().contains(name) || matches!(config.allowedUnsignedAttributes().as_ref(), Some{ .. }) && config.allowedUnsignedAttributes().value().contains(name) || matches!(config.allowedUnsignedAttributePrefix().as_ref(), Some{ .. }) && config.allowedUnsignedAttributePrefix().value().clone() <= name.clone() + } + /// = specification/dynamodb-encryption-client/ddb-table-encryption-config.md#logical-table-name + /// = type=implication + /// # When mapping [DynamoDB Table Names](#dynamodb-table-name) to [logical table name](#logical-table-name) + /// # there MUST a one to one mapping between the two. + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(105,3) + pub fn DynamoDbEncryptionTransforms(config: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut internalConfigs: Map, ValidTableConfig> = map![]; + let mut _m_k: Map, Arc> = config.tableEncryptionConfigs().clone(); + let mut mKeys: Set> = _m_k.keys(); + let mut tableNamesSeq: Sequence>; + let mut _out0: Sequence>; + _out0 = crate::implementation_from_dafny::SortedSets::_default::SetToSequence::>(&mKeys); + tableNamesSeq = _out0.clone(); + let mut allLogicalTableNames: Set> = set!{}; + let mut i: DafnyInt = int!(0); + while i.clone() < tableNamesSeq.cardinality() { + let mut tableName: Sequence = tableNamesSeq.get(&i); + let mut inputConfig: Arc = config.tableEncryptionConfigs().get(&tableName); + let mut valueOrError0: Arc>>; + valueOrError0 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(!allLogicalTableNames.contains(inputConfig.logicalTableName()), &crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Duplicate logical table mapped to multiple physical tables: ").concat(inputConfig.logicalTableName()))); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut searchR: Arc>>, Arc>>; + let mut _out1: Arc>, Arc>>; + _out1 = crate::implementation_from_dafny::_SearchConfigToInfo_Compile::_default::Convert(&inputConfig); + searchR = _out1.clone(); + let mut valueOrError1: Arc>>, Arc>>; + valueOrError1 = searchR.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { + AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() + }) + }) + })); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut search: Arc>> = valueOrError1.Extract(); + let mut signedBeacons: Sequence>; + if matches!((&search).as_ref(), None{ .. }) { + signedBeacons = seq![] as Sequence>; + } else { + signedBeacons = search.value().curr().ListSignedBeacons(); + }; + let mut badBeacons: Sequence> = crate::implementation_from_dafny::_Seq_Compile::_default::Filter::>({ + let inputConfig: Arc = inputConfig.clone(); + &({ + let mut inputConfig = inputConfig.clone(); + Arc::new(move |s: &Sequence| -> bool{ + crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::_default::IsConfigured(&inputConfig, s) + }) + }) + }, &signedBeacons); + if int!(0) < badBeacons.cardinality() { + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Failure { + error: crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Signed beacons cannot be configured with CryptoActions or as unauthenticated : ").concat(&crate::implementation_from_dafny::_StandardLibrary_Compile::_default::Join::(&badBeacons, &string_utf16_of(", ")))) + })); + return res.read(); + }; + let mut valueOrError2: Arc>>; + valueOrError2 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(Itertools::unique((&signedBeacons).iter()).all(({ + let mut signedBeacons = signedBeacons.clone(); + Arc::new(move |__forall_var_0: Sequence| -> bool{ + let mut k: Sequence = __forall_var_0.clone(); + !signedBeacons.contains(&k) || crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&k) + }) + }).as_ref()), &crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::_default::E(&string_utf16_of("Beacon configured with bad name"))); + if valueOrError2.IsFailure() { + res = MaybePlacebo::from(valueOrError2.PropagateFailure::>()); + return res.read(); + }; + let mut newActions: Map, Arc> = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::_default::AddSignedBeaconActions(&signedBeacons, inputConfig.attributeActionsOnEncrypt()); + let mut encryptorConfig: Arc = Arc::new(DynamoDbItemEncryptorConfig::DynamoDbItemEncryptorConfig { + logicalTableName: inputConfig.logicalTableName().clone(), + partitionKeyName: inputConfig.partitionKeyName().clone(), + sortKeyName: inputConfig.sortKeyName().clone(), + attributeActionsOnEncrypt: newActions.clone(), + allowedUnsignedAttributes: inputConfig.allowedUnsignedAttributes().clone(), + allowedUnsignedAttributePrefix: inputConfig.allowedUnsignedAttributePrefix().clone(), + algorithmSuiteId: inputConfig.algorithmSuiteId().clone(), + keyring: inputConfig.keyring().clone(), + cmm: inputConfig.cmm().clone(), + legacyOverride: inputConfig.legacyOverride().clone(), + plaintextOverride: inputConfig.plaintextOverride().clone() + }); + let mut itemEncryptorRes: Arc, Arc>>; + let mut _out2: Arc, Arc>>; + _out2 = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::_default::DynamoDbItemEncryptor(&encryptorConfig); + itemEncryptorRes = _out2.clone(); + let mut valueOrError3: Arc, Arc>> = itemEncryptorRes.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor { + AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor: e.clone() + }) + }) + })); + if valueOrError3.IsFailure() { + res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); + return res.read(); + }; + let mut itemEncryptorX: Object = upcast_object::()(valueOrError3.Extract()); + let mut itemEncryptor: Object = cast_object!(itemEncryptorX.clone(), DynamoDbItemEncryptorClient); + let mut encConfig: Arc = rd!(itemEncryptor.clone()).config().clone(); + let mut internalConfig: ValidTableConfig = Arc::new(TableConfig::TableConfig { + physicalTableName: tableName.clone(), + logicalTableName: inputConfig.logicalTableName().clone(), + partitionKeyName: inputConfig.partitionKeyName().clone(), + sortKeyName: inputConfig.sortKeyName().clone(), + itemEncryptor: itemEncryptor.clone(), + search: search.clone(), + plaintextOverride: inputConfig.plaintextOverride().UnwrapOr(&Arc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {})) + }); + internalConfigs = internalConfigs.update_index(&tableName, &internalConfig); + allLogicalTableNames = allLogicalTableNames.merge(&set!{internalConfig.logicalTableName().clone()}); + i = i.clone() + int!(1); + }; + let mut newConfig: Arc = Arc::new(crate::implementation_from_dafny::_DdbMiddlewareConfig_Compile::Config::Config { + tableEncryptionConfigs: internalConfigs.clone() + }); + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient::_ctor(&_nw0, &newConfig); + client = _nw0.clone(); + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: client.clone() + })); + return res.read(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(899,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(902,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(290,3) + pub struct DynamoDbEncryptionTransformsClient { + pub __i_config: Arc + } - impl Eq - for DafnyCallEvent {} + impl DynamoDbEncryptionTransformsClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// dafny/DynamoDbEncryptionTransforms/src/Index.dfy(299,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(913,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { + UpcastObjectFn!(DynAny); + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl IDynamoDbEncryptionTransformsClient + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(922,5) + fn PutItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::PutItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(942,5) + fn PutItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::PutItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(962,5) + fn GetItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::GetItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(982,5) + fn GetItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::GetItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1002,5) + fn BatchWriteItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchWriteItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1022,5) + fn BatchWriteItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchWriteItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1042,5) + fn BatchGetItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchGetItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1062,5) + fn BatchGetItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchGetItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1082,5) + fn ScanInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ScanInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1102,5) + fn ScanOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ScanOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1122,5) + fn QueryInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::QueryInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1142,5) + fn QueryOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::QueryOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1162,5) + fn TransactWriteItemsInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactWriteItemsInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1182,5) + fn TransactWriteItemsOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactWriteItemsOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1202,5) + fn UpdateItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::UpdateItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1222,5) + fn UpdateItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::UpdateItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1242,5) + fn DeleteItemInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::DeleteItemInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1262,5) + fn DeleteItemOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::DeleteItemOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1282,5) + fn TransactGetItemsInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactGetItemsInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1302,5) + fn TransactGetItemsOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::TransactGetItemsOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1322,5) + fn ExecuteStatementInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteStatementInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1342,5) + fn ExecuteStatementOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteStatementOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1362,5) + fn BatchExecuteStatementInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchExecuteStatementInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1382,5) + fn BatchExecuteStatementOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::BatchExecuteStatementOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1402,5) + fn ExecuteTransactionInputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteTransactionInputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1422,5) + fn ExecuteTransactionOutputTransform(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ExecuteTransactionOutputTransform(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(1442,5) + fn ResolveAttributes(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile::_default::ResolveAttributes(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::DynamoDbEncryptionTransformsClient { + UpcastObjectFn!(dyn IDynamoDbEncryptionTransformsClient); + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementInputTransformInput { - BatchExecuteStatementInputTransformInput { - sdkInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(10,1) + pub mod types { + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchExecuteStatementOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DeleteItemOutput; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteStatementOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ExecuteTransactionOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::GetItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PutItemOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::QueryOutput; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ScanOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemsOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemsOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::UpdateItemOutput; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(738,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl BatchExecuteStatementInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => sdkInput, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(21,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl Debug - for BatchExecuteStatementInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl DafnyPrint - for BatchExecuteStatementInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementInputTransformInput.BatchExecuteStatementInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for BatchExecuteStatementInputTransformInput {} + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for BatchExecuteStatementInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Default - for BatchExecuteStatementInputTransformInput { - fn default() -> BatchExecuteStatementInputTransformInput { - BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl AsRef - for &BatchExecuteStatementInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementInputTransformOutput { - BatchExecuteStatementInputTransformOutput { - transformedInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(25,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementInputTransformInput { + BatchExecuteStatementInputTransformInput { + sdkInput: Arc + } + } - impl BatchExecuteStatementInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl BatchExecuteStatementInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl Debug - for BatchExecuteStatementInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchExecuteStatementInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchExecuteStatementInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementInputTransformOutput.BatchExecuteStatementInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchExecuteStatementInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementInputTransformInput.BatchExecuteStatementInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchExecuteStatementInputTransformOutput {} + impl Eq + for BatchExecuteStatementInputTransformInput {} - impl Hash - for BatchExecuteStatementInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Hash + for BatchExecuteStatementInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Default - for BatchExecuteStatementInputTransformOutput { - fn default() -> BatchExecuteStatementInputTransformOutput { - BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Default + for BatchExecuteStatementInputTransformInput { + fn default() -> BatchExecuteStatementInputTransformInput { + BatchExecuteStatementInputTransformInput::BatchExecuteStatementInputTransformInput { + sdkInput: Default::default() + } + } + } - impl AsRef - for &BatchExecuteStatementInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchExecuteStatementInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementOutputTransformInput { - BatchExecuteStatementOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(28,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementInputTransformOutput { + BatchExecuteStatementInputTransformOutput { + transformedInput: Arc + } + } - impl BatchExecuteStatementOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl BatchExecuteStatementInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl Debug - for BatchExecuteStatementOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchExecuteStatementInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchExecuteStatementOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementOutputTransformInput.BatchExecuteStatementOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchExecuteStatementInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementInputTransformOutput.BatchExecuteStatementInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchExecuteStatementOutputTransformInput {} + impl Eq + for BatchExecuteStatementInputTransformOutput {} - impl Hash - for BatchExecuteStatementOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Hash + for BatchExecuteStatementInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Default - for BatchExecuteStatementOutputTransformInput { - fn default() -> BatchExecuteStatementOutputTransformInput { - BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl Default + for BatchExecuteStatementInputTransformOutput { + fn default() -> BatchExecuteStatementInputTransformOutput { + BatchExecuteStatementInputTransformOutput::BatchExecuteStatementInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl AsRef - for &BatchExecuteStatementOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchExecuteStatementInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementOutputTransformOutput { - BatchExecuteStatementOutputTransformOutput { - transformedOutput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(31,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementOutputTransformInput { + BatchExecuteStatementOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl BatchExecuteStatementOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl BatchExecuteStatementOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl Debug - for BatchExecuteStatementOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchExecuteStatementOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchExecuteStatementOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementOutputTransformOutput.BatchExecuteStatementOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for BatchExecuteStatementOutputTransformOutput {} + impl DafnyPrint + for BatchExecuteStatementOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementOutputTransformInput.BatchExecuteStatementOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for BatchExecuteStatementOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Eq + for BatchExecuteStatementOutputTransformInput {} + + impl Hash + for BatchExecuteStatementOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Default - for BatchExecuteStatementOutputTransformOutput { - fn default() -> BatchExecuteStatementOutputTransformOutput { - BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl Default + for BatchExecuteStatementOutputTransformInput { + fn default() -> BatchExecuteStatementOutputTransformInput { + BatchExecuteStatementOutputTransformInput::BatchExecuteStatementOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl AsRef - for &BatchExecuteStatementOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchExecuteStatementOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchGetItemInputTransformInput { - BatchGetItemInputTransformInput { - sdkInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(35,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementOutputTransformOutput { + BatchExecuteStatementOutputTransformOutput { + transformedOutput: Arc + } + } - impl BatchGetItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl BatchExecuteStatementOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl Debug - for BatchGetItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchExecuteStatementOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchGetItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemInputTransformInput.BatchGetItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchExecuteStatementOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchExecuteStatementOutputTransformOutput.BatchExecuteStatementOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchGetItemInputTransformInput {} + impl Eq + for BatchExecuteStatementOutputTransformOutput {} - impl Hash - for BatchGetItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Hash + for BatchExecuteStatementOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Default - for BatchGetItemInputTransformInput { - fn default() -> BatchGetItemInputTransformInput { - BatchGetItemInputTransformInput::BatchGetItemInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Default + for BatchExecuteStatementOutputTransformOutput { + fn default() -> BatchExecuteStatementOutputTransformOutput { + BatchExecuteStatementOutputTransformOutput::BatchExecuteStatementOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl AsRef - for &BatchGetItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchExecuteStatementOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchGetItemInputTransformOutput { - BatchGetItemInputTransformOutput { - transformedInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(38,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemInputTransformInput { + BatchGetItemInputTransformInput { + sdkInput: Arc + } + } - impl BatchGetItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl BatchGetItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl Debug - for BatchGetItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchGetItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchGetItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemInputTransformOutput.BatchGetItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchGetItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemInputTransformInput.BatchGetItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchGetItemInputTransformOutput {} + impl Eq + for BatchGetItemInputTransformInput {} - impl Hash - for BatchGetItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Hash + for BatchGetItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemInputTransformInput::BatchGetItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Default - for BatchGetItemInputTransformOutput { - fn default() -> BatchGetItemInputTransformOutput { - BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Default + for BatchGetItemInputTransformInput { + fn default() -> BatchGetItemInputTransformInput { + BatchGetItemInputTransformInput::BatchGetItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl AsRef - for &BatchGetItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchGetItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchGetItemOutputTransformInput { - BatchGetItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(41,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemInputTransformOutput { + BatchGetItemInputTransformOutput { + transformedInput: Arc + } + } - impl BatchGetItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl BatchGetItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl Debug - for BatchGetItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchGetItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchGetItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemOutputTransformInput.BatchGetItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchGetItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemInputTransformOutput.BatchGetItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchGetItemOutputTransformInput {} + impl Eq + for BatchGetItemInputTransformOutput {} - impl Hash - for BatchGetItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Hash + for BatchGetItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Default - for BatchGetItemOutputTransformInput { - fn default() -> BatchGetItemOutputTransformInput { - BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl Default + for BatchGetItemInputTransformOutput { + fn default() -> BatchGetItemInputTransformOutput { + BatchGetItemInputTransformOutput::BatchGetItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl AsRef - for &BatchGetItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchGetItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchGetItemOutputTransformOutput { - BatchGetItemOutputTransformOutput { - transformedOutput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(44,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemOutputTransformInput { + BatchGetItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl BatchGetItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl BatchGetItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl Debug - for BatchGetItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchGetItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchGetItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemOutputTransformOutput.BatchGetItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchGetItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemOutputTransformInput.BatchGetItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchGetItemOutputTransformOutput {} + impl Eq + for BatchGetItemOutputTransformInput {} + + impl Hash + for BatchGetItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Hash - for BatchGetItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Default + for BatchGetItemOutputTransformInput { + fn default() -> BatchGetItemOutputTransformInput { + BatchGetItemOutputTransformInput::BatchGetItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Default - for BatchGetItemOutputTransformOutput { - fn default() -> BatchGetItemOutputTransformOutput { - BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl AsRef + for BatchGetItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &BatchGetItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(48,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemOutputTransformOutput { + BatchGetItemOutputTransformOutput { + transformedOutput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemInputTransformInput { - BatchWriteItemInputTransformInput { - sdkInput: Rc - } - } + impl BatchGetItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl BatchWriteItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Debug + for BatchGetItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchWriteItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BatchGetItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchGetItemOutputTransformOutput.BatchGetItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchWriteItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemInputTransformInput.BatchWriteItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BatchGetItemOutputTransformOutput {} - impl Eq - for BatchWriteItemInputTransformInput {} + impl Hash + for BatchGetItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Hash - for BatchWriteItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Default + for BatchGetItemOutputTransformOutput { + fn default() -> BatchGetItemOutputTransformOutput { + BatchGetItemOutputTransformOutput::BatchGetItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Default - for BatchWriteItemInputTransformInput { - fn default() -> BatchWriteItemInputTransformInput { - BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput { - sdkInput: Default::default() - } - } - } + impl AsRef + for BatchGetItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &BatchWriteItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(51,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemInputTransformInput { + BatchWriteItemInputTransformInput { + sdkInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemInputTransformOutput { - BatchWriteItemInputTransformOutput { - transformedInput: Rc - } - } + impl BatchWriteItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl BatchWriteItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Debug + for BatchWriteItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchWriteItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BatchWriteItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemInputTransformInput.BatchWriteItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchWriteItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemInputTransformOutput.BatchWriteItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BatchWriteItemInputTransformInput {} - impl Eq - for BatchWriteItemInputTransformOutput {} + impl Hash + for BatchWriteItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Hash - for BatchWriteItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Default + for BatchWriteItemInputTransformInput { + fn default() -> BatchWriteItemInputTransformInput { + BatchWriteItemInputTransformInput::BatchWriteItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Default - for BatchWriteItemInputTransformOutput { - fn default() -> BatchWriteItemInputTransformOutput { - BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl AsRef + for BatchWriteItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &BatchWriteItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(54,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemInputTransformOutput { + BatchWriteItemInputTransformOutput { + transformedInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemOutputTransformInput { - BatchWriteItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl BatchWriteItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl BatchWriteItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Debug + for BatchWriteItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchWriteItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BatchWriteItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemInputTransformOutput.BatchWriteItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchWriteItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemOutputTransformInput.BatchWriteItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BatchWriteItemInputTransformOutput {} - impl Eq - for BatchWriteItemOutputTransformInput {} + impl Hash + for BatchWriteItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Hash - for BatchWriteItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Default + for BatchWriteItemInputTransformOutput { + fn default() -> BatchWriteItemInputTransformOutput { + BatchWriteItemInputTransformOutput::BatchWriteItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Default - for BatchWriteItemOutputTransformInput { - fn default() -> BatchWriteItemOutputTransformInput { - BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl AsRef + for BatchWriteItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &BatchWriteItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(57,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemOutputTransformInput { + BatchWriteItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemOutputTransformOutput { - BatchWriteItemOutputTransformOutput { - transformedOutput: Rc - } - } + impl BatchWriteItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl BatchWriteItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl Debug + for BatchWriteItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchWriteItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BatchWriteItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemOutputTransformInput.BatchWriteItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchWriteItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemOutputTransformOutput.BatchWriteItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BatchWriteItemOutputTransformInput {} + + impl Hash + for BatchWriteItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Eq - for BatchWriteItemOutputTransformOutput {} + impl Default + for BatchWriteItemOutputTransformInput { + fn default() -> BatchWriteItemOutputTransformInput { + BatchWriteItemOutputTransformInput::BatchWriteItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Hash - for BatchWriteItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl AsRef + for BatchWriteItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for BatchWriteItemOutputTransformOutput { - fn default() -> BatchWriteItemOutputTransformOutput { - BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(61,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemOutputTransformOutput { + BatchWriteItemOutputTransformOutput { + transformedOutput: Arc + } + } - impl AsRef - for &BatchWriteItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl BatchWriteItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteItemInputTransformInput { - DeleteItemInputTransformInput { - sdkInput: Rc - } - } + impl Debug + for BatchWriteItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl DafnyPrint + for BatchWriteItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.BatchWriteItemOutputTransformOutput.BatchWriteItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for BatchWriteItemOutputTransformOutput {} - impl DafnyPrint - for DeleteItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemInputTransformInput.DeleteItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for BatchWriteItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Eq - for DeleteItemInputTransformInput {} + impl Default + for BatchWriteItemOutputTransformOutput { + fn default() -> BatchWriteItemOutputTransformOutput { + BatchWriteItemOutputTransformOutput::BatchWriteItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Hash - for DeleteItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl AsRef + for BatchWriteItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteItemInputTransformInput { - fn default() -> DeleteItemInputTransformInput { - DeleteItemInputTransformInput::DeleteItemInputTransformInput { - sdkInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(64,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemInputTransformInput { + DeleteItemInputTransformInput { + sdkInput: Arc + } + } - impl AsRef - for &DeleteItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl DeleteItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteItemInputTransformOutput { - DeleteItemInputTransformOutput { - transformedInput: Rc - } - } + impl Debug + for DeleteItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl DafnyPrint + for DeleteItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemInputTransformInput.DeleteItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DeleteItemInputTransformInput {} - impl DafnyPrint - for DeleteItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemInputTransformOutput.DeleteItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DeleteItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemInputTransformInput::DeleteItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Eq - for DeleteItemInputTransformOutput {} + impl Default + for DeleteItemInputTransformInput { + fn default() -> DeleteItemInputTransformInput { + DeleteItemInputTransformInput::DeleteItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Hash - for DeleteItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl AsRef + for DeleteItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteItemInputTransformOutput { - fn default() -> DeleteItemInputTransformOutput { - DeleteItemInputTransformOutput::DeleteItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(67,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemInputTransformOutput { + DeleteItemInputTransformOutput { + transformedInput: Arc + } + } - impl AsRef - for &DeleteItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DeleteItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteItemOutputTransformInput { - DeleteItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl Debug + for DeleteItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl DafnyPrint + for DeleteItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemInputTransformOutput.DeleteItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DeleteItemInputTransformOutput {} - impl DafnyPrint - for DeleteItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemOutputTransformInput.DeleteItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DeleteItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemInputTransformOutput::DeleteItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Eq - for DeleteItemOutputTransformInput {} + impl Default + for DeleteItemInputTransformOutput { + fn default() -> DeleteItemInputTransformOutput { + DeleteItemInputTransformOutput::DeleteItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Hash - for DeleteItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl AsRef + for DeleteItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteItemOutputTransformInput { - fn default() -> DeleteItemOutputTransformInput { - DeleteItemOutputTransformInput::DeleteItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(70,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemOutputTransformInput { + DeleteItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl AsRef - for &DeleteItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl DeleteItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteItemOutputTransformOutput { - DeleteItemOutputTransformOutput { - transformedOutput: Rc - } - } + impl Debug + for DeleteItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl DafnyPrint + for DeleteItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemOutputTransformInput.DeleteItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DeleteItemOutputTransformInput {} + + impl Hash + for DeleteItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemOutputTransformInput::DeleteItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl DafnyPrint - for DeleteItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemOutputTransformOutput.DeleteItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DeleteItemOutputTransformInput { + fn default() -> DeleteItemOutputTransformInput { + DeleteItemOutputTransformInput::DeleteItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Eq - for DeleteItemOutputTransformOutput {} + impl AsRef + for DeleteItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DeleteItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(74,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemOutputTransformOutput { + DeleteItemOutputTransformOutput { + transformedOutput: Arc + } + } - impl Default - for DeleteItemOutputTransformOutput { - fn default() -> DeleteItemOutputTransformOutput { - DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl DeleteItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl AsRef - for &DeleteItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DeleteItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub struct IDynamoDbEncryptionTransformsClientCallHistory {} + impl DafnyPrint + for DeleteItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.DeleteItemOutputTransformOutput.DeleteItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl IDynamoDbEncryptionTransformsClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::IDynamoDbEncryptionTransformsClientCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IDynamoDbEncryptionTransformsClient: Any + UpcastObject { - fn PutItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn PutItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn GetItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn GetItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchWriteItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchWriteItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchGetItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchGetItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ScanInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ScanOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn QueryInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn QueryOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn TransactWriteItemsInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn TransactWriteItemsOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteItemInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteItemOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn TransactGetItemsInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn TransactGetItemsOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteStatementInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteStatementOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchExecuteStatementInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn BatchExecuteStatementOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteTransactionInputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteTransactionOutputTransform(&self, input: &Rc) -> Rc, Rc>>; - fn ResolveAttributes(&self, input: &Rc) -> Rc, Rc>>; - } + impl Eq + for DeleteItemOutputTransformOutput {} - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementInputTransformInput { - ExecuteStatementInputTransformInput { - sdkInput: Rc - } - } + impl Hash + for DeleteItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl ExecuteStatementInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Default + for DeleteItemOutputTransformOutput { + fn default() -> DeleteItemOutputTransformOutput { + DeleteItemOutputTransformOutput::DeleteItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Debug - for ExecuteStatementInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DeleteItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ExecuteStatementInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementInputTransformInput.ExecuteStatementInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(77,3) + pub struct IDynamoDbEncryptionTransformsClientCallHistory {} - impl Eq - for ExecuteStatementInputTransformInput {} + impl IDynamoDbEncryptionTransformsClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Hash - for ExecuteStatementInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::IDynamoDbEncryptionTransformsClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl Default - for ExecuteStatementInputTransformInput { - fn default() -> ExecuteStatementInputTransformInput { - ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput { - sdkInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(135,3) + pub trait IDynamoDbEncryptionTransformsClient: Any + Sync + Send + UpcastObject { + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(164,5) + fn PutItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(179,5) + fn PutItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(194,5) + fn GetItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(209,5) + fn GetItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(224,5) + fn BatchWriteItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(239,5) + fn BatchWriteItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(254,5) + fn BatchGetItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(269,5) + fn BatchGetItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(284,5) + fn ScanInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(299,5) + fn ScanOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(314,5) + fn QueryInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(329,5) + fn QueryOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(344,5) + fn TransactWriteItemsInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(359,5) + fn TransactWriteItemsOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(374,5) + fn UpdateItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(389,5) + fn UpdateItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(404,5) + fn DeleteItemInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(419,5) + fn DeleteItemOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(434,5) + fn TransactGetItemsInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(449,5) + fn TransactGetItemsOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(464,5) + fn ExecuteStatementInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(479,5) + fn ExecuteStatementOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(494,5) + fn BatchExecuteStatementInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(509,5) + fn BatchExecuteStatementOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(524,5) + fn ExecuteTransactionInputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(539,5) + fn ExecuteTransactionOutputTransform(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(554,5) + fn ResolveAttributes(&self, input: &Arc) -> Arc, Arc>>; + } - impl AsRef - for &ExecuteStatementInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(568,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementInputTransformInput { + ExecuteStatementInputTransformInput { + sdkInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementInputTransformOutput { - ExecuteStatementInputTransformOutput { - transformedInput: Rc - } - } + impl ExecuteStatementInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl ExecuteStatementInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Debug + for ExecuteStatementInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ExecuteStatementInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ExecuteStatementInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementInputTransformInput.ExecuteStatementInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ExecuteStatementInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementInputTransformOutput.ExecuteStatementInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ExecuteStatementInputTransformInput {} - impl Eq - for ExecuteStatementInputTransformOutput {} + impl Hash + for ExecuteStatementInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Hash - for ExecuteStatementInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Default + for ExecuteStatementInputTransformInput { + fn default() -> ExecuteStatementInputTransformInput { + ExecuteStatementInputTransformInput::ExecuteStatementInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Default - for ExecuteStatementInputTransformOutput { - fn default() -> ExecuteStatementInputTransformOutput { - ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl AsRef + for ExecuteStatementInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ExecuteStatementInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(571,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementInputTransformOutput { + ExecuteStatementInputTransformOutput { + transformedInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementOutputTransformInput { - ExecuteStatementOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl ExecuteStatementInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl ExecuteStatementOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Debug + for ExecuteStatementInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ExecuteStatementOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ExecuteStatementInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementInputTransformOutput.ExecuteStatementInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ExecuteStatementOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementOutputTransformInput.ExecuteStatementOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ExecuteStatementInputTransformOutput {} - impl Eq - for ExecuteStatementOutputTransformInput {} + impl Hash + for ExecuteStatementInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Hash - for ExecuteStatementOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Default + for ExecuteStatementInputTransformOutput { + fn default() -> ExecuteStatementInputTransformOutput { + ExecuteStatementInputTransformOutput::ExecuteStatementInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Default - for ExecuteStatementOutputTransformInput { - fn default() -> ExecuteStatementOutputTransformInput { - ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl AsRef + for ExecuteStatementInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ExecuteStatementOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(574,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementOutputTransformInput { + ExecuteStatementOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementOutputTransformOutput { - ExecuteStatementOutputTransformOutput { - transformedOutput: Rc - } - } + impl ExecuteStatementOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl ExecuteStatementOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl Debug + for ExecuteStatementOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ExecuteStatementOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ExecuteStatementOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementOutputTransformInput.ExecuteStatementOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ExecuteStatementOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementOutputTransformOutput.ExecuteStatementOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ExecuteStatementOutputTransformInput {} + + impl Hash + for ExecuteStatementOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Eq - for ExecuteStatementOutputTransformOutput {} + impl Default + for ExecuteStatementOutputTransformInput { + fn default() -> ExecuteStatementOutputTransformInput { + ExecuteStatementOutputTransformInput::ExecuteStatementOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Hash - for ExecuteStatementOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl AsRef + for ExecuteStatementOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ExecuteStatementOutputTransformOutput { - fn default() -> ExecuteStatementOutputTransformOutput { - ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(578,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementOutputTransformOutput { + ExecuteStatementOutputTransformOutput { + transformedOutput: Arc + } + } - impl AsRef - for &ExecuteStatementOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl ExecuteStatementOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionInputTransformInput { - ExecuteTransactionInputTransformInput { - sdkInput: Rc - } - } + impl Debug + for ExecuteStatementOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExecuteTransactionInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl DafnyPrint + for ExecuteStatementOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteStatementOutputTransformOutput.ExecuteStatementOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ExecuteTransactionInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ExecuteStatementOutputTransformOutput {} - impl DafnyPrint - for ExecuteTransactionInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionInputTransformInput.ExecuteTransactionInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ExecuteStatementOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Eq - for ExecuteTransactionInputTransformInput {} + impl Default + for ExecuteStatementOutputTransformOutput { + fn default() -> ExecuteStatementOutputTransformOutput { + ExecuteStatementOutputTransformOutput::ExecuteStatementOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Hash - for ExecuteTransactionInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl AsRef + for ExecuteStatementOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ExecuteTransactionInputTransformInput { - fn default() -> ExecuteTransactionInputTransformInput { - ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput { - sdkInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(581,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionInputTransformInput { + ExecuteTransactionInputTransformInput { + sdkInput: Arc + } + } - impl AsRef - for &ExecuteTransactionInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl ExecuteTransactionInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => sdkInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionInputTransformOutput { - ExecuteTransactionInputTransformOutput { - transformedInput: Rc - } - } + impl Debug + for ExecuteTransactionInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExecuteTransactionInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl DafnyPrint + for ExecuteTransactionInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionInputTransformInput.ExecuteTransactionInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ExecuteTransactionInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ExecuteTransactionInputTransformInput {} - impl DafnyPrint - for ExecuteTransactionInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionInputTransformOutput.ExecuteTransactionInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ExecuteTransactionInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Eq - for ExecuteTransactionInputTransformOutput {} + impl Default + for ExecuteTransactionInputTransformInput { + fn default() -> ExecuteTransactionInputTransformInput { + ExecuteTransactionInputTransformInput::ExecuteTransactionInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Hash - for ExecuteTransactionInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl AsRef + for ExecuteTransactionInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ExecuteTransactionInputTransformOutput { - fn default() -> ExecuteTransactionInputTransformOutput { - ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput { - transformedInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(584,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionInputTransformOutput { + ExecuteTransactionInputTransformOutput { + transformedInput: Arc + } + } - impl AsRef - for &ExecuteTransactionInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl ExecuteTransactionInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionOutputTransformInput { - ExecuteTransactionOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl Debug + for ExecuteTransactionInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExecuteTransactionOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl DafnyPrint + for ExecuteTransactionInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionInputTransformOutput.ExecuteTransactionInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ExecuteTransactionOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ExecuteTransactionInputTransformOutput {} - impl DafnyPrint - for ExecuteTransactionOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionOutputTransformInput.ExecuteTransactionOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ExecuteTransactionInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Eq - for ExecuteTransactionOutputTransformInput {} + impl Default + for ExecuteTransactionInputTransformOutput { + fn default() -> ExecuteTransactionInputTransformOutput { + ExecuteTransactionInputTransformOutput::ExecuteTransactionInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Hash - for ExecuteTransactionOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl AsRef + for ExecuteTransactionInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ExecuteTransactionOutputTransformInput { - fn default() -> ExecuteTransactionOutputTransformInput { - ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(587,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionOutputTransformInput { + ExecuteTransactionOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl AsRef - for &ExecuteTransactionOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl ExecuteTransactionOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionOutputTransformOutput { - ExecuteTransactionOutputTransformOutput { - transformedOutput: Rc - } - } + impl Debug + for ExecuteTransactionOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExecuteTransactionOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl DafnyPrint + for ExecuteTransactionOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionOutputTransformInput.ExecuteTransactionOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ExecuteTransactionOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ExecuteTransactionOutputTransformInput {} + + impl Hash + for ExecuteTransactionOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl DafnyPrint - for ExecuteTransactionOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionOutputTransformOutput.ExecuteTransactionOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ExecuteTransactionOutputTransformInput { + fn default() -> ExecuteTransactionOutputTransformInput { + ExecuteTransactionOutputTransformInput::ExecuteTransactionOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Eq - for ExecuteTransactionOutputTransformOutput {} + impl AsRef + for ExecuteTransactionOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ExecuteTransactionOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(591,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionOutputTransformOutput { + ExecuteTransactionOutputTransformOutput { + transformedOutput: Arc + } + } - impl Default - for ExecuteTransactionOutputTransformOutput { - fn default() -> ExecuteTransactionOutputTransformOutput { - ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl ExecuteTransactionOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl AsRef - for &ExecuteTransactionOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for ExecuteTransactionOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetItemInputTransformInput { - GetItemInputTransformInput { - sdkInput: Rc - } - } + impl DafnyPrint + for ExecuteTransactionOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ExecuteTransactionOutputTransformOutput.ExecuteTransactionOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Eq + for ExecuteTransactionOutputTransformOutput {} - impl Debug - for GetItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for ExecuteTransactionOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl DafnyPrint - for GetItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemInputTransformInput.GetItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ExecuteTransactionOutputTransformOutput { + fn default() -> ExecuteTransactionOutputTransformOutput { + ExecuteTransactionOutputTransformOutput::ExecuteTransactionOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Eq - for GetItemInputTransformInput {} + impl AsRef + for ExecuteTransactionOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(594,3) + #[derive(PartialEq, Clone)] + pub enum GetItemInputTransformInput { + GetItemInputTransformInput { + sdkInput: Arc + } + } - impl Default - for GetItemInputTransformInput { - fn default() -> GetItemInputTransformInput { - GetItemInputTransformInput::GetItemInputTransformInput { - sdkInput: Default::default() - } - } - } + impl GetItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl AsRef - for &GetItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetItemInputTransformOutput { - GetItemInputTransformOutput { - transformedInput: Rc - } - } + impl DafnyPrint + for GetItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemInputTransformInput.GetItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Eq + for GetItemInputTransformInput {} - impl Debug - for GetItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemInputTransformInput::GetItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl DafnyPrint - for GetItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemInputTransformOutput.GetItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetItemInputTransformInput { + fn default() -> GetItemInputTransformInput { + GetItemInputTransformInput::GetItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Eq - for GetItemInputTransformOutput {} + impl AsRef + for GetItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(597,3) + #[derive(PartialEq, Clone)] + pub enum GetItemInputTransformOutput { + GetItemInputTransformOutput { + transformedInput: Arc + } + } - impl Default - for GetItemInputTransformOutput { - fn default() -> GetItemInputTransformOutput { - GetItemInputTransformOutput::GetItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl GetItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl AsRef - for &GetItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetItemOutputTransformInput { - GetItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl DafnyPrint + for GetItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemInputTransformOutput.GetItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Eq + for GetItemInputTransformOutput {} - impl Debug - for GetItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemInputTransformOutput::GetItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl DafnyPrint - for GetItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemOutputTransformInput.GetItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetItemInputTransformOutput { + fn default() -> GetItemInputTransformOutput { + GetItemInputTransformOutput::GetItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Eq - for GetItemOutputTransformInput {} + impl AsRef + for GetItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(600,3) + #[derive(PartialEq, Clone)] + pub enum GetItemOutputTransformInput { + GetItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl Default - for GetItemOutputTransformInput { - fn default() -> GetItemOutputTransformInput { - GetItemOutputTransformInput::GetItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } - - impl AsRef - for &GetItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl GetItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetItemOutputTransformOutput { - GetItemOutputTransformOutput { - transformedOutput: Rc - } - } + impl Debug + for GetItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl GetItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl DafnyPrint + for GetItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemOutputTransformInput.GetItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for GetItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GetItemOutputTransformInput {} + + impl Hash + for GetItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemOutputTransformInput::GetItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl DafnyPrint - for GetItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemOutputTransformOutput.GetItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetItemOutputTransformInput { + fn default() -> GetItemOutputTransformInput { + GetItemOutputTransformInput::GetItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Eq - for GetItemOutputTransformOutput {} + impl AsRef + for GetItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(604,3) + #[derive(PartialEq, Clone)] + pub enum GetItemOutputTransformOutput { + GetItemOutputTransformOutput { + transformedOutput: Arc + } + } - impl Default - for GetItemOutputTransformOutput { - fn default() -> GetItemOutputTransformOutput { - GetItemOutputTransformOutput::GetItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl GetItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl AsRef - for &GetItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PutItemInputTransformInput { - PutItemInputTransformInput { - sdkInput: Rc - } - } + impl DafnyPrint + for GetItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.GetItemOutputTransformOutput.GetItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PutItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Eq + for GetItemOutputTransformOutput {} - impl Debug - for PutItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemOutputTransformOutput::GetItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl DafnyPrint - for PutItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemInputTransformInput.PutItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetItemOutputTransformOutput { + fn default() -> GetItemOutputTransformOutput { + GetItemOutputTransformOutput::GetItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Eq - for PutItemInputTransformInput {} + impl AsRef + for GetItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for PutItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(607,3) + #[derive(PartialEq, Clone)] + pub enum PutItemInputTransformInput { + PutItemInputTransformInput { + sdkInput: Arc + } + } - impl Default - for PutItemInputTransformInput { - fn default() -> PutItemInputTransformInput { - PutItemInputTransformInput::PutItemInputTransformInput { - sdkInput: Default::default() - } - } - } + impl PutItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl AsRef - for &PutItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for PutItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PutItemInputTransformOutput { - PutItemInputTransformOutput { - transformedInput: Rc - } - } + impl DafnyPrint + for PutItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemInputTransformInput.PutItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PutItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Eq + for PutItemInputTransformInput {} - impl Debug - for PutItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for PutItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemInputTransformInput::PutItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl DafnyPrint - for PutItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemInputTransformOutput.PutItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for PutItemInputTransformInput { + fn default() -> PutItemInputTransformInput { + PutItemInputTransformInput::PutItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Eq - for PutItemInputTransformOutput {} + impl AsRef + for PutItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for PutItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(610,3) + #[derive(PartialEq, Clone)] + pub enum PutItemInputTransformOutput { + PutItemInputTransformOutput { + transformedInput: Arc + } + } - impl Default - for PutItemInputTransformOutput { - fn default() -> PutItemInputTransformOutput { - PutItemInputTransformOutput::PutItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl PutItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl AsRef - for &PutItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for PutItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PutItemOutputTransformInput { - PutItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl DafnyPrint + for PutItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemInputTransformOutput.PutItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PutItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Eq + for PutItemInputTransformOutput {} - impl Debug - for PutItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for PutItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemInputTransformOutput::PutItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl DafnyPrint - for PutItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemOutputTransformInput.PutItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for PutItemInputTransformOutput { + fn default() -> PutItemInputTransformOutput { + PutItemInputTransformOutput::PutItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Eq - for PutItemOutputTransformInput {} + impl AsRef + for PutItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for PutItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(613,3) + #[derive(PartialEq, Clone)] + pub enum PutItemOutputTransformInput { + PutItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl Default - for PutItemOutputTransformInput { - fn default() -> PutItemOutputTransformInput { - PutItemOutputTransformInput::PutItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl PutItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl AsRef - for &PutItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for PutItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PutItemOutputTransformOutput { - PutItemOutputTransformOutput { - transformedOutput: Rc - } - } + impl DafnyPrint + for PutItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemOutputTransformInput.PutItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PutItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl Eq + for PutItemOutputTransformInput {} + + impl Hash + for PutItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemOutputTransformInput::PutItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Debug - for PutItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for PutItemOutputTransformInput { + fn default() -> PutItemOutputTransformInput { + PutItemOutputTransformInput::PutItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl DafnyPrint - for PutItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemOutputTransformOutput.PutItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for PutItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for PutItemOutputTransformOutput {} + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(617,3) + #[derive(PartialEq, Clone)] + pub enum PutItemOutputTransformOutput { + PutItemOutputTransformOutput { + transformedOutput: Arc + } + } - impl Hash - for PutItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl PutItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl Default - for PutItemOutputTransformOutput { - fn default() -> PutItemOutputTransformOutput { - PutItemOutputTransformOutput::PutItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl Debug + for PutItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &PutItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for PutItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.PutItemOutputTransformOutput.PutItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum QueryInputTransformInput { - QueryInputTransformInput { - sdkInput: Rc - } - } + impl Eq + for PutItemOutputTransformOutput {} - impl QueryInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Hash + for PutItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemOutputTransformOutput::PutItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Debug - for QueryInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for PutItemOutputTransformOutput { + fn default() -> PutItemOutputTransformOutput { + PutItemOutputTransformOutput::PutItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl DafnyPrint - for QueryInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryInputTransformInput.QueryInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for PutItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for QueryInputTransformInput {} + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(620,3) + #[derive(PartialEq, Clone)] + pub enum QueryInputTransformInput { + QueryInputTransformInput { + sdkInput: Arc + } + } - impl Hash - for QueryInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl QueryInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl Default - for QueryInputTransformInput { - fn default() -> QueryInputTransformInput { - QueryInputTransformInput::QueryInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Debug + for QueryInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &QueryInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for QueryInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryInputTransformInput.QueryInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum QueryInputTransformOutput { - QueryInputTransformOutput { - transformedInput: Rc - } - } + impl Eq + for QueryInputTransformInput {} - impl QueryInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Hash + for QueryInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryInputTransformInput::QueryInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Debug - for QueryInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for QueryInputTransformInput { + fn default() -> QueryInputTransformInput { + QueryInputTransformInput::QueryInputTransformInput { + sdkInput: Default::default() + } + } + } - impl DafnyPrint - for QueryInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryInputTransformOutput.QueryInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for QueryInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for QueryInputTransformOutput {} + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(623,3) + #[derive(PartialEq, Clone)] + pub enum QueryInputTransformOutput { + QueryInputTransformOutput { + transformedInput: Arc + } + } - impl Hash - for QueryInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl QueryInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl Default - for QueryInputTransformOutput { - fn default() -> QueryInputTransformOutput { - QueryInputTransformOutput::QueryInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Debug + for QueryInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &QueryInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for QueryInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryInputTransformOutput.QueryInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum QueryOutputTransformInput { - QueryOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl Eq + for QueryInputTransformOutput {} - impl QueryOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Hash + for QueryInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryInputTransformOutput::QueryInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Debug - for QueryOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for QueryInputTransformOutput { + fn default() -> QueryInputTransformOutput { + QueryInputTransformOutput::QueryInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl DafnyPrint - for QueryOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryOutputTransformInput.QueryOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for QueryInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for QueryOutputTransformInput {} + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(626,3) + #[derive(PartialEq, Clone)] + pub enum QueryOutputTransformInput { + QueryOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl Hash - for QueryOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl QueryOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl Default - for QueryOutputTransformInput { - fn default() -> QueryOutputTransformInput { - QueryOutputTransformInput::QueryOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl Debug + for QueryOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &QueryOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for QueryOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryOutputTransformInput.QueryOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum QueryOutputTransformOutput { - QueryOutputTransformOutput { - transformedOutput: Rc - } - } + impl Eq + for QueryOutputTransformInput {} + + impl Hash + for QueryOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryOutputTransformInput::QueryOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl QueryOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl Default + for QueryOutputTransformInput { + fn default() -> QueryOutputTransformInput { + QueryOutputTransformInput::QueryOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Debug - for QueryOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for QueryOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for QueryOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryOutputTransformOutput.QueryOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(630,3) + #[derive(PartialEq, Clone)] + pub enum QueryOutputTransformOutput { + QueryOutputTransformOutput { + transformedOutput: Arc + } + } - impl Eq - for QueryOutputTransformOutput {} + impl QueryOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl Hash - for QueryOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Debug + for QueryOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for QueryOutputTransformOutput { - fn default() -> QueryOutputTransformOutput { - QueryOutputTransformOutput::QueryOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl DafnyPrint + for QueryOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.QueryOutputTransformOutput.QueryOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &QueryOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for QueryOutputTransformOutput {} - #[derive(PartialEq, Clone)] - pub enum ResolveAttributesInput { - ResolveAttributesInput { - TableName: Sequence, - Item: Map, Rc>, - Version: Rc> - } - } + impl Hash + for QueryOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryOutputTransformOutput::QueryOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl ResolveAttributesInput { - pub fn TableName(&self) -> &Sequence { - match self { - ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => TableName, - } - } - pub fn Item(&self) -> &Map, Rc> { - match self { - ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => Item, - } - } - pub fn Version(&self) -> &Rc> { - match self { - ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => Version, - } - } - } + impl Default + for QueryOutputTransformOutput { + fn default() -> QueryOutputTransformOutput { + QueryOutputTransformOutput::QueryOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Debug - for ResolveAttributesInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for QueryOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ResolveAttributesInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ResolveAttributesInput.ResolveAttributesInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Version, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(633,3) + #[derive(PartialEq, Clone)] + pub enum ResolveAttributesInput { + ResolveAttributesInput { + TableName: Sequence, + Item: Map, Arc>, + Version: Arc> + } + } - impl Eq - for ResolveAttributesInput {} + impl ResolveAttributesInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => TableName, + } + } + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Map, Arc> { + match self { + ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => Item, + } + } + /// Returns a borrow of the field Version + pub fn Version(&self) -> &Arc> { + match self { + ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => Version, + } + } + } - impl Hash - for ResolveAttributesInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => { - Hash::hash(TableName, _state); - Hash::hash(Item, _state); - Hash::hash(Version, _state) - }, - } - } - } + impl Debug + for ResolveAttributesInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ResolveAttributesInput { - fn default() -> ResolveAttributesInput { - ResolveAttributesInput::ResolveAttributesInput { - TableName: Default::default(), - Item: Default::default(), - Version: Default::default() - } - } - } + impl DafnyPrint + for ResolveAttributesInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ResolveAttributesInput.ResolveAttributesInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Version, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ResolveAttributesInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ResolveAttributesInput {} + + impl Hash + for ResolveAttributesInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ResolveAttributesInput::ResolveAttributesInput{TableName, Item, Version, } => { + Hash::hash(TableName, _state); + Hash::hash(Item, _state); + Hash::hash(Version, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ResolveAttributesOutput { - ResolveAttributesOutput { - VirtualFields: Map, Sequence>, - CompoundBeacons: Map, Sequence> - } - } + impl Default + for ResolveAttributesInput { + fn default() -> ResolveAttributesInput { + ResolveAttributesInput::ResolveAttributesInput { + TableName: Default::default(), + Item: Default::default(), + Version: Default::default() + } + } + } - impl ResolveAttributesOutput { - pub fn VirtualFields(&self) -> &Map, Sequence> { - match self { - ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => VirtualFields, - } - } - pub fn CompoundBeacons(&self) -> &Map, Sequence> { - match self { - ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => CompoundBeacons, - } - } - } + impl AsRef + for ResolveAttributesInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ResolveAttributesOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(638,3) + #[derive(PartialEq, Clone)] + pub enum ResolveAttributesOutput { + ResolveAttributesOutput { + VirtualFields: Map, Sequence>, + CompoundBeacons: Map, Sequence> + } + } - impl DafnyPrint - for ResolveAttributesOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ResolveAttributesOutput.ResolveAttributesOutput(")?; - DafnyPrint::fmt_print(VirtualFields, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CompoundBeacons, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ResolveAttributesOutput { + /// Returns a borrow of the field VirtualFields + pub fn VirtualFields(&self) -> &Map, Sequence> { + match self { + ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => VirtualFields, + } + } + /// Returns a borrow of the field CompoundBeacons + pub fn CompoundBeacons(&self) -> &Map, Sequence> { + match self { + ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => CompoundBeacons, + } + } + } - impl Eq - for ResolveAttributesOutput {} + impl Debug + for ResolveAttributesOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ResolveAttributesOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => { - Hash::hash(VirtualFields, _state); - Hash::hash(CompoundBeacons, _state) - }, - } - } - } + impl DafnyPrint + for ResolveAttributesOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ResolveAttributesOutput.ResolveAttributesOutput(")?; + DafnyPrint::fmt_print(VirtualFields, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CompoundBeacons, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ResolveAttributesOutput { - fn default() -> ResolveAttributesOutput { - ResolveAttributesOutput::ResolveAttributesOutput { - VirtualFields: Default::default(), - CompoundBeacons: Default::default() - } - } - } + impl Eq + for ResolveAttributesOutput {} + + impl Hash + for ResolveAttributesOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ResolveAttributesOutput::ResolveAttributesOutput{VirtualFields, CompoundBeacons, } => { + Hash::hash(VirtualFields, _state); + Hash::hash(CompoundBeacons, _state) + }, + } + } + } - impl AsRef - for &ResolveAttributesOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ResolveAttributesOutput { + fn default() -> ResolveAttributesOutput { + ResolveAttributesOutput::ResolveAttributesOutput { + VirtualFields: Default::default(), + CompoundBeacons: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ScanInputTransformInput { - ScanInputTransformInput { - sdkInput: Rc - } - } + impl AsRef + for ResolveAttributesOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl ScanInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => sdkInput, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(642,3) + #[derive(PartialEq, Clone)] + pub enum ScanInputTransformInput { + ScanInputTransformInput { + sdkInput: Arc + } + } - impl Debug - for ScanInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ScanInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl DafnyPrint - for ScanInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanInputTransformInput.ScanInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ScanInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ScanInputTransformInput {} + impl DafnyPrint + for ScanInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanInputTransformInput.ScanInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ScanInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Eq + for ScanInputTransformInput {} - impl Default - for ScanInputTransformInput { - fn default() -> ScanInputTransformInput { - ScanInputTransformInput::ScanInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Hash + for ScanInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ScanInputTransformInput::ScanInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl AsRef - for &ScanInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ScanInputTransformInput { + fn default() -> ScanInputTransformInput { + ScanInputTransformInput::ScanInputTransformInput { + sdkInput: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ScanInputTransformOutput { - ScanInputTransformOutput { - transformedInput: Rc - } - } + impl AsRef + for ScanInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl ScanInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(645,3) + #[derive(PartialEq, Clone)] + pub enum ScanInputTransformOutput { + ScanInputTransformOutput { + transformedInput: Arc + } + } - impl Debug - for ScanInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ScanInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl DafnyPrint - for ScanInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanInputTransformOutput.ScanInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ScanInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ScanInputTransformOutput {} + impl DafnyPrint + for ScanInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanInputTransformOutput.ScanInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ScanInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Eq + for ScanInputTransformOutput {} - impl Default - for ScanInputTransformOutput { - fn default() -> ScanInputTransformOutput { - ScanInputTransformOutput::ScanInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Hash + for ScanInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ScanInputTransformOutput::ScanInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl AsRef - for &ScanInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ScanInputTransformOutput { + fn default() -> ScanInputTransformOutput { + ScanInputTransformOutput::ScanInputTransformOutput { + transformedInput: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ScanOutputTransformInput { - ScanOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl AsRef + for ScanInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl ScanOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(648,3) + #[derive(PartialEq, Clone)] + pub enum ScanOutputTransformInput { + ScanOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl Debug - for ScanOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ScanOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl DafnyPrint - for ScanOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanOutputTransformInput.ScanOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ScanOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ScanOutputTransformInput {} + impl DafnyPrint + for ScanOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanOutputTransformInput.ScanOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ScanOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Eq + for ScanOutputTransformInput {} + + impl Hash + for ScanOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ScanOutputTransformInput::ScanOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Default - for ScanOutputTransformInput { - fn default() -> ScanOutputTransformInput { - ScanOutputTransformInput::ScanOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl Default + for ScanOutputTransformInput { + fn default() -> ScanOutputTransformInput { + ScanOutputTransformInput::ScanOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl AsRef - for &ScanOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ScanOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ScanOutputTransformOutput { - ScanOutputTransformOutput { - transformedOutput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(652,3) + #[derive(PartialEq, Clone)] + pub enum ScanOutputTransformOutput { + ScanOutputTransformOutput { + transformedOutput: Arc + } + } - impl ScanOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl ScanOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl Debug - for ScanOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ScanOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ScanOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanOutputTransformOutput.ScanOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ScanOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.ScanOutputTransformOutput.ScanOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ScanOutputTransformOutput {} + impl Eq + for ScanOutputTransformOutput {} - impl Hash - for ScanOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Hash + for ScanOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ScanOutputTransformOutput::ScanOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Default - for ScanOutputTransformOutput { - fn default() -> ScanOutputTransformOutput { - ScanOutputTransformOutput::ScanOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl Default + for ScanOutputTransformOutput { + fn default() -> ScanOutputTransformOutput { + ScanOutputTransformOutput::ScanOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl AsRef - for &ScanOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ScanOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum TransactGetItemsInputTransformInput { - TransactGetItemsInputTransformInput { - sdkInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(656,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsInputTransformInput { + TransactGetItemsInputTransformInput { + sdkInput: Arc + } + } - impl TransactGetItemsInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl TransactGetItemsInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl Debug - for TransactGetItemsInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for TransactGetItemsInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for TransactGetItemsInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsInputTransformInput.TransactGetItemsInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for TransactGetItemsInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsInputTransformInput.TransactGetItemsInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for TransactGetItemsInputTransformInput {} + impl Eq + for TransactGetItemsInputTransformInput {} - impl Hash - for TransactGetItemsInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Hash + for TransactGetItemsInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Default - for TransactGetItemsInputTransformInput { - fn default() -> TransactGetItemsInputTransformInput { - TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Default + for TransactGetItemsInputTransformInput { + fn default() -> TransactGetItemsInputTransformInput { + TransactGetItemsInputTransformInput::TransactGetItemsInputTransformInput { + sdkInput: Default::default() + } + } + } - impl AsRef - for &TransactGetItemsInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for TransactGetItemsInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum TransactGetItemsInputTransformOutput { - TransactGetItemsInputTransformOutput { - transformedInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(659,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsInputTransformOutput { + TransactGetItemsInputTransformOutput { + transformedInput: Arc + } + } - impl TransactGetItemsInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl TransactGetItemsInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl Debug - for TransactGetItemsInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for TransactGetItemsInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for TransactGetItemsInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsInputTransformOutput.TransactGetItemsInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for TransactGetItemsInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsInputTransformOutput.TransactGetItemsInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for TransactGetItemsInputTransformOutput {} + impl Eq + for TransactGetItemsInputTransformOutput {} - impl Hash - for TransactGetItemsInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Hash + for TransactGetItemsInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Default - for TransactGetItemsInputTransformOutput { - fn default() -> TransactGetItemsInputTransformOutput { - TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Default + for TransactGetItemsInputTransformOutput { + fn default() -> TransactGetItemsInputTransformOutput { + TransactGetItemsInputTransformOutput::TransactGetItemsInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl AsRef - for &TransactGetItemsInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for TransactGetItemsInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum TransactGetItemsOutputTransformInput { - TransactGetItemsOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(662,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsOutputTransformInput { + TransactGetItemsOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl TransactGetItemsOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl TransactGetItemsOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl Debug - for TransactGetItemsOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for TransactGetItemsOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for TransactGetItemsOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsOutputTransformInput.TransactGetItemsOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for TransactGetItemsOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsOutputTransformInput.TransactGetItemsOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for TransactGetItemsOutputTransformInput {} + impl Eq + for TransactGetItemsOutputTransformInput {} + + impl Hash + for TransactGetItemsOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Hash - for TransactGetItemsOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl Default + for TransactGetItemsOutputTransformInput { + fn default() -> TransactGetItemsOutputTransformInput { + TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Default - for TransactGetItemsOutputTransformInput { - fn default() -> TransactGetItemsOutputTransformInput { - TransactGetItemsOutputTransformInput::TransactGetItemsOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl AsRef + for TransactGetItemsOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &TransactGetItemsOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(666,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsOutputTransformOutput { + TransactGetItemsOutputTransformOutput { + transformedOutput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum TransactGetItemsOutputTransformOutput { - TransactGetItemsOutputTransformOutput { - transformedOutput: Rc - } - } + impl TransactGetItemsOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl TransactGetItemsOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl Debug + for TransactGetItemsOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for TransactGetItemsOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for TransactGetItemsOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsOutputTransformOutput.TransactGetItemsOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for TransactGetItemsOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactGetItemsOutputTransformOutput.TransactGetItemsOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for TransactGetItemsOutputTransformOutput {} - impl Eq - for TransactGetItemsOutputTransformOutput {} + impl Hash + for TransactGetItemsOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Hash - for TransactGetItemsOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Default + for TransactGetItemsOutputTransformOutput { + fn default() -> TransactGetItemsOutputTransformOutput { + TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Default - for TransactGetItemsOutputTransformOutput { - fn default() -> TransactGetItemsOutputTransformOutput { - TransactGetItemsOutputTransformOutput::TransactGetItemsOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl AsRef + for TransactGetItemsOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &TransactGetItemsOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(669,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsInputTransformInput { + TransactWriteItemsInputTransformInput { + sdkInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum TransactWriteItemsInputTransformInput { - TransactWriteItemsInputTransformInput { - sdkInput: Rc - } - } + impl TransactWriteItemsInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl TransactWriteItemsInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => sdkInput, - } - } - } + impl Debug + for TransactWriteItemsInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for TransactWriteItemsInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for TransactWriteItemsInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsInputTransformInput.TransactWriteItemsInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for TransactWriteItemsInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsInputTransformInput.TransactWriteItemsInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for TransactWriteItemsInputTransformInput {} - impl Eq - for TransactWriteItemsInputTransformInput {} + impl Hash + for TransactWriteItemsInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - impl Hash - for TransactWriteItemsInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl Default + for TransactWriteItemsInputTransformInput { + fn default() -> TransactWriteItemsInputTransformInput { + TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput { + sdkInput: Default::default() + } + } + } - impl Default - for TransactWriteItemsInputTransformInput { - fn default() -> TransactWriteItemsInputTransformInput { - TransactWriteItemsInputTransformInput::TransactWriteItemsInputTransformInput { - sdkInput: Default::default() - } - } - } + impl AsRef + for TransactWriteItemsInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &TransactWriteItemsInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(672,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsInputTransformOutput { + TransactWriteItemsInputTransformOutput { + transformedInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum TransactWriteItemsInputTransformOutput { - TransactWriteItemsInputTransformOutput { - transformedInput: Rc - } - } + impl TransactWriteItemsInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl TransactWriteItemsInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl Debug + for TransactWriteItemsInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for TransactWriteItemsInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for TransactWriteItemsInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsInputTransformOutput.TransactWriteItemsInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for TransactWriteItemsInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsInputTransformOutput.TransactWriteItemsInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for TransactWriteItemsInputTransformOutput {} - impl Eq - for TransactWriteItemsInputTransformOutput {} + impl Hash + for TransactWriteItemsInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - impl Hash - for TransactWriteItemsInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl Default + for TransactWriteItemsInputTransformOutput { + fn default() -> TransactWriteItemsInputTransformOutput { + TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl Default - for TransactWriteItemsInputTransformOutput { - fn default() -> TransactWriteItemsInputTransformOutput { - TransactWriteItemsInputTransformOutput::TransactWriteItemsInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl AsRef + for TransactWriteItemsInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &TransactWriteItemsInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(675,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsOutputTransformInput { + TransactWriteItemsOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum TransactWriteItemsOutputTransformInput { - TransactWriteItemsOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl TransactWriteItemsOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl TransactWriteItemsOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl Debug + for TransactWriteItemsOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for TransactWriteItemsOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for TransactWriteItemsOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsOutputTransformInput.TransactWriteItemsOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for TransactWriteItemsOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsOutputTransformInput.TransactWriteItemsOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for TransactWriteItemsOutputTransformInput {} + + impl Hash + for TransactWriteItemsOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl Eq - for TransactWriteItemsOutputTransformInput {} + impl Default + for TransactWriteItemsOutputTransformInput { + fn default() -> TransactWriteItemsOutputTransformInput { + TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - impl Hash - for TransactWriteItemsOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl AsRef + for TransactWriteItemsOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for TransactWriteItemsOutputTransformInput { - fn default() -> TransactWriteItemsOutputTransformInput { - TransactWriteItemsOutputTransformInput::TransactWriteItemsOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(679,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsOutputTransformOutput { + TransactWriteItemsOutputTransformOutput { + transformedOutput: Arc + } + } - impl AsRef - for &TransactWriteItemsOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl TransactWriteItemsOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum TransactWriteItemsOutputTransformOutput { - TransactWriteItemsOutputTransformOutput { - transformedOutput: Rc - } - } + impl Debug + for TransactWriteItemsOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl TransactWriteItemsOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + impl DafnyPrint + for TransactWriteItemsOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsOutputTransformOutput.TransactWriteItemsOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for TransactWriteItemsOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for TransactWriteItemsOutputTransformOutput {} - impl DafnyPrint - for TransactWriteItemsOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.TransactWriteItemsOutputTransformOutput.TransactWriteItemsOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for TransactWriteItemsOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl Eq - for TransactWriteItemsOutputTransformOutput {} + impl Default + for TransactWriteItemsOutputTransformOutput { + fn default() -> TransactWriteItemsOutputTransformOutput { + TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - impl Hash - for TransactWriteItemsOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl AsRef + for TransactWriteItemsOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for TransactWriteItemsOutputTransformOutput { - fn default() -> TransactWriteItemsOutputTransformOutput { - TransactWriteItemsOutputTransformOutput::TransactWriteItemsOutputTransformOutput { - transformedOutput: Default::default() - } - } - } - - impl AsRef - for &TransactWriteItemsOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateItemInputTransformInput { - UpdateItemInputTransformInput { - sdkInput: Rc - } - } - - impl UpdateItemInputTransformInput { - pub fn sdkInput(&self) -> &Rc { - match self { - UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => sdkInput, - } - } - } - - impl Debug - for UpdateItemInputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(682,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemInputTransformInput { + UpdateItemInputTransformInput { + sdkInput: Arc + } + } - impl DafnyPrint - for UpdateItemInputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemInputTransformInput.UpdateItemInputTransformInput(")?; - DafnyPrint::fmt_print(sdkInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl UpdateItemInputTransformInput { + /// Returns a borrow of the field sdkInput + pub fn sdkInput(&self) -> &Arc { + match self { + UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => sdkInput, + } + } + } - impl Eq - for UpdateItemInputTransformInput {} + impl Debug + for UpdateItemInputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for UpdateItemInputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => { - Hash::hash(sdkInput, _state) - }, - } - } - } + impl DafnyPrint + for UpdateItemInputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemInputTransformInput.UpdateItemInputTransformInput(")?; + DafnyPrint::fmt_print(sdkInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for UpdateItemInputTransformInput { - fn default() -> UpdateItemInputTransformInput { - UpdateItemInputTransformInput::UpdateItemInputTransformInput { - sdkInput: Default::default() - } - } - } + impl Eq + for UpdateItemInputTransformInput {} - impl AsRef - for &UpdateItemInputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for UpdateItemInputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemInputTransformInput::UpdateItemInputTransformInput{sdkInput, } => { + Hash::hash(sdkInput, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateItemInputTransformOutput { - UpdateItemInputTransformOutput { - transformedInput: Rc - } - } + impl Default + for UpdateItemInputTransformInput { + fn default() -> UpdateItemInputTransformInput { + UpdateItemInputTransformInput::UpdateItemInputTransformInput { + sdkInput: Default::default() + } + } + } - impl UpdateItemInputTransformOutput { - pub fn transformedInput(&self) -> &Rc { - match self { - UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => transformedInput, - } - } - } + impl AsRef + for UpdateItemInputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for UpdateItemInputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(685,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemInputTransformOutput { + UpdateItemInputTransformOutput { + transformedInput: Arc + } + } - impl DafnyPrint - for UpdateItemInputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemInputTransformOutput.UpdateItemInputTransformOutput(")?; - DafnyPrint::fmt_print(transformedInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl UpdateItemInputTransformOutput { + /// Returns a borrow of the field transformedInput + pub fn transformedInput(&self) -> &Arc { + match self { + UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => transformedInput, + } + } + } - impl Eq - for UpdateItemInputTransformOutput {} + impl Debug + for UpdateItemInputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for UpdateItemInputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => { - Hash::hash(transformedInput, _state) - }, - } - } - } + impl DafnyPrint + for UpdateItemInputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemInputTransformOutput.UpdateItemInputTransformOutput(")?; + DafnyPrint::fmt_print(transformedInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for UpdateItemInputTransformOutput { - fn default() -> UpdateItemInputTransformOutput { - UpdateItemInputTransformOutput::UpdateItemInputTransformOutput { - transformedInput: Default::default() - } - } - } + impl Eq + for UpdateItemInputTransformOutput {} - impl AsRef - for &UpdateItemInputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for UpdateItemInputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemInputTransformOutput::UpdateItemInputTransformOutput{transformedInput, } => { + Hash::hash(transformedInput, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateItemOutputTransformInput { - UpdateItemOutputTransformInput { - sdkOutput: Rc, - originalInput: Rc - } - } + impl Default + for UpdateItemInputTransformOutput { + fn default() -> UpdateItemInputTransformOutput { + UpdateItemInputTransformOutput::UpdateItemInputTransformOutput { + transformedInput: Default::default() + } + } + } - impl UpdateItemOutputTransformInput { - pub fn sdkOutput(&self) -> &Rc { - match self { - UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, - } - } - pub fn originalInput(&self) -> &Rc { - match self { - UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, - } - } - } + impl AsRef + for UpdateItemInputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for UpdateItemOutputTransformInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(688,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemOutputTransformInput { + UpdateItemOutputTransformInput { + sdkOutput: Arc, + originalInput: Arc + } + } - impl DafnyPrint - for UpdateItemOutputTransformInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemOutputTransformInput.UpdateItemOutputTransformInput(")?; - DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(originalInput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl UpdateItemOutputTransformInput { + /// Returns a borrow of the field sdkOutput + pub fn sdkOutput(&self) -> &Arc { + match self { + UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => sdkOutput, + } + } + /// Returns a borrow of the field originalInput + pub fn originalInput(&self) -> &Arc { + match self { + UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => originalInput, + } + } + } - impl Eq - for UpdateItemOutputTransformInput {} + impl Debug + for UpdateItemOutputTransformInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for UpdateItemOutputTransformInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => { - Hash::hash(sdkOutput, _state); - Hash::hash(originalInput, _state) - }, - } - } - } + impl DafnyPrint + for UpdateItemOutputTransformInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemOutputTransformInput.UpdateItemOutputTransformInput(")?; + DafnyPrint::fmt_print(sdkOutput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(originalInput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for UpdateItemOutputTransformInput { - fn default() -> UpdateItemOutputTransformInput { - UpdateItemOutputTransformInput::UpdateItemOutputTransformInput { - sdkOutput: Default::default(), - originalInput: Default::default() - } - } - } + impl Eq + for UpdateItemOutputTransformInput {} + + impl Hash + for UpdateItemOutputTransformInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemOutputTransformInput::UpdateItemOutputTransformInput{sdkOutput, originalInput, } => { + Hash::hash(sdkOutput, _state); + Hash::hash(originalInput, _state) + }, + } + } + } - impl AsRef - for &UpdateItemOutputTransformInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for UpdateItemOutputTransformInput { + fn default() -> UpdateItemOutputTransformInput { + UpdateItemOutputTransformInput::UpdateItemOutputTransformInput { + sdkOutput: Default::default(), + originalInput: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateItemOutputTransformOutput { - UpdateItemOutputTransformOutput { - transformedOutput: Rc - } - } + impl AsRef + for UpdateItemOutputTransformInput { + fn as_ref(&self) -> &Self { + self + } + } - impl UpdateItemOutputTransformOutput { - pub fn transformedOutput(&self) -> &Rc { - match self { - UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => transformedOutput, - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(692,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemOutputTransformOutput { + UpdateItemOutputTransformOutput { + transformedOutput: Arc + } + } - impl Debug - for UpdateItemOutputTransformOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateItemOutputTransformOutput { + /// Returns a borrow of the field transformedOutput + pub fn transformedOutput(&self) -> &Arc { + match self { + UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => transformedOutput, + } + } + } - impl DafnyPrint - for UpdateItemOutputTransformOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemOutputTransformOutput.UpdateItemOutputTransformOutput(")?; - DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateItemOutputTransformOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for UpdateItemOutputTransformOutput {} + impl DafnyPrint + for UpdateItemOutputTransformOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.UpdateItemOutputTransformOutput.UpdateItemOutputTransformOutput(")?; + DafnyPrint::fmt_print(transformedOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for UpdateItemOutputTransformOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => { - Hash::hash(transformedOutput, _state) - }, - } - } - } + impl Eq + for UpdateItemOutputTransformOutput {} - impl Default - for UpdateItemOutputTransformOutput { - fn default() -> UpdateItemOutputTransformOutput { - UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput { - transformedOutput: Default::default() - } - } - } + impl Hash + for UpdateItemOutputTransformOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput{transformedOutput, } => { + Hash::hash(transformedOutput, _state) + }, + } + } + } - impl AsRef - for &UpdateItemOutputTransformOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for UpdateItemOutputTransformOutput { + fn default() -> UpdateItemOutputTransformOutput { + UpdateItemOutputTransformOutput::UpdateItemOutputTransformOutput { + transformedOutput: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - DynamoDbEncryptionTransformsException { - message: Sequence - }, - AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: Rc - }, - AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor { - AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor: Rc - }, - AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: Rc - }, - AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: Rc - }, - ComAmazonawsDynamodb { - ComAmazonawsDynamodb: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => message, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkDynamoDb(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => AwsCryptographyDbEncryptionSdkDynamoDb, - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyMaterialProviders(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsDynamodb(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } + impl AsRef + for UpdateItemOutputTransformOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(695,3) + #[derive(PartialEq, Clone)] + pub enum Error { + DynamoDbEncryptionTransformsException { + message: Sequence + }, + AwsCryptographyDbEncryptionSdkDynamoDb { + AwsCryptographyDbEncryptionSdkDynamoDb: Arc + }, + AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor { + AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor: Arc + }, + AwsCryptographyDbEncryptionSdkStructuredEncryption { + AwsCryptographyDbEncryptionSdkStructuredEncryption: Arc + }, + AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: Arc + }, + ComAmazonawsDynamodb { + ComAmazonawsDynamodb: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.DynamoDbEncryptionTransformsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDb(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; - DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.ComAmazonawsDynamodb(")?; - DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => message, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkDynamoDb for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkDynamoDb(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => AwsCryptographyDbEncryptionSdkDynamoDb, + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkStructuredEncryption for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyMaterialProviders for all enum members which have it + pub fn AwsCryptographyMaterialProviders(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsDynamodb for all enum members which have it + pub fn ComAmazonawsDynamodb(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - impl Eq - for Error {} + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::DynamoDbEncryptionTransformsException{message, } => { - Hash::hash(message, _state) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDb, _state) - }, - Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, _state) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - Hash::hash(AwsCryptographyMaterialProviders, _state) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - Hash::hash(ComAmazonawsDynamodb, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.DynamoDbEncryptionTransformsException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDb(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; + DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.ComAmazonawsDynamodb(")?; + DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.transforms.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for Error { - fn default() -> Error { - Error::DynamoDbEncryptionTransformsException { - message: Default::default() - } - } - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::DynamoDbEncryptionTransformsException{message, } => { + Hash::hash(message, _state) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDb{AwsCryptographyDbEncryptionSdkDynamoDb, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDb, _state) + }, + Error::AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor{AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptor, _state) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + Hash::hash(AwsCryptographyMaterialProviders, _state) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + Hash::hash(ComAmazonawsDynamodb, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for Error { + fn default() -> Error { + Error::DynamoDbEncryptionTransformsException { + message: Default::default() + } + } + } - pub type OpaqueError = Rc; + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - pub type DummySubsetType = DafnyInt; + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(734,3) + pub type OpaqueError = Arc; - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } + /// dafny/DynamoDbEncryptionTransforms/Model/AwsCryptographyDbEncryptionSdkDynamoDbTransformsTypes.dfy(737,3) + pub type DummySubsetType = DafnyInt; - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbEncryptionClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput; + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } + } + } - pub struct _default {} + /// dafny/DynamoDbEncryption/src/Index.dfy(19,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::DynamoDbEncryptionConfig; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error; + pub use crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbEncryptionClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbEncryption/src/Index.dfy(25,3) + pub fn DefaultDynamoDbEncryptionConfig() -> Arc { + Arc::new(DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {}) + } + /// dafny/DynamoDbEncryption/src/Index.dfy(30,3) + pub fn DynamoDbEncryption(config: &Arc) -> Arc, Arc>> { + let mut res: Arc, Arc>>; + let mut internalConfig: Arc = Arc::new(Config::Config {}); + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient::_ctor(&_nw0, &internalConfig); + client = _nw0.clone(); + res = Arc::new(Result::, Arc>::Success { + value: client.clone() + }); + return res.clone(); + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(511,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(514,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl _default { - pub fn DefaultDynamoDbEncryptionConfig() -> Rc { - Rc::new(DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {}) - } - pub fn DynamoDbEncryption(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut internalConfig: Rc = Rc::new(Config::Config {}); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient::_ctor(&_nw0, &internalConfig); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } + /// dafny/DynamoDbEncryption/src/Index.dfy(39,3) + pub struct DynamoDbEncryptionClient { + pub __i_config: Arc + } - pub struct DynamoDbEncryptionClient { - pub r#__i_config: Rc - } + impl DynamoDbEncryptionClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// dafny/DynamoDbEncryption/src/Index.dfy(48,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(525,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl DynamoDbEncryptionClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { + UpcastObjectFn!(DynAny); + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { - UpcastObjectFn!(dyn Any); - } + impl IDynamoDbEncryptionClient + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(534,5) + fn CreateDynamoDbEncryptionBranchKeyIdSupplier(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::_default::CreateDynamoDbEncryptionBranchKeyIdSupplier(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(565,5) + fn GetEncryptedDataKeyDescription(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::_default::GetEncryptedDataKeyDescription(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl IDynamoDbEncryptionClient - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { - fn CreateDynamoDbEncryptionBranchKeyIdSupplier(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::_default::CreateDynamoDbEncryptionBranchKeyIdSupplier(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetEncryptedDataKeyDescription(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile::_default::GetEncryptedDataKeyDescription(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { - UpcastObjectFn!(dyn IDynamoDbEncryptionClient); - } - - pub mod types { - pub use ::dafny_runtime::truncate; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::Sequence; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use ::dafny_runtime::MaybePlacebo; - pub use ::dafny_runtime::md; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CacheType; - - pub struct _default {} - - impl _default { - pub fn IsValid_BeaconBitLength(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(63), i32) < x) - } - pub fn IsValid_BeaconVersionList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) - } - pub fn IsValid_Char(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) - } - pub fn IsValid_CompoundBeaconList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ConstructorList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ConstructorPartList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_EncryptedPartsList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_Prefix(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_SignedPartsList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_StandardBeaconList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_TerminalLocation(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_VersionNumber(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) - } - pub fn IsValid_VirtualFieldList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_VirtualPartList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_VirtualTransformList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } - - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } - - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } - - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::DynamoDbEncryptionClient { + UpcastObjectFn!(dyn IDynamoDbEncryptionClient); + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(10,1) + pub mod types { + pub use ::dafny_runtime::truncate; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::Sequence; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use ::dafny_runtime::rd; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CacheType; + + pub struct _default {} + + impl _default { + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(30,3) + pub fn IsValid_BeaconBitLength(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(63), i32) < x) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(52,3) + pub fn IsValid_BeaconVersionList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(56,3) + pub fn IsValid_Char(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(67,3) + pub fn IsValid_CompoundBeaconList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(74,3) + pub fn IsValid_ConstructorList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(82,3) + pub fn IsValid_ConstructorPartList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(266,3) + pub fn IsValid_EncryptedPartsList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(368,3) + pub fn IsValid_Prefix(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(387,3) + pub fn IsValid_SignedPartsList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(403,3) + pub fn IsValid_StandardBeaconList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(407,3) + pub fn IsValid_TerminalLocation(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(414,3) + pub fn IsValid_VersionNumber(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(422,3) + pub fn IsValid_VirtualFieldList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(430,3) + pub fn IsValid_VirtualPartList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(443,3) + pub fn IsValid_VirtualTransformList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(489,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl Eq - for DafnyCallEvent {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(21,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum AsSet { - AsSet {} - } + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl AsSet {} + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl Debug - for AsSet { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for AsSet { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AsSet::AsSet{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.AsSet.AsSet")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(25,3) + #[derive(PartialEq, Clone)] + pub enum AsSet { + AsSet {} + } - impl AsSet { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(AsSet::AsSet {})].iter() - } - } + impl AsSet {} - impl Eq - for AsSet {} + impl Debug + for AsSet { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for AsSet { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AsSet::AsSet{} => { + impl DafnyPrint + for AsSet { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AsSet::AsSet{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.AsSet.AsSet")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl AsSet { + /// Enumerates all possible values of AsSet + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(AsSet::AsSet {})].iter() + } + } - impl Default - for AsSet { - fn default() -> AsSet { - AsSet::AsSet {} - } - } + impl Eq + for AsSet {} - impl AsRef - for &AsSet { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for AsSet { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AsSet::AsSet{} => { - pub type BeaconBitLength = i32; + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum BeaconKeySource { - single { - single: Rc - }, - multi { - multi: Rc - } - } + impl Default + for AsSet { + fn default() -> AsSet { + AsSet::AsSet {} + } + } - impl BeaconKeySource { - pub fn single(&self) -> &Rc { - match self { - BeaconKeySource::single{single, } => single, - BeaconKeySource::multi{multi, } => panic!("field does not exist on this variant"), - } - } - pub fn multi(&self) -> &Rc { - match self { - BeaconKeySource::single{single, } => panic!("field does not exist on this variant"), - BeaconKeySource::multi{multi, } => multi, - } - } - } + impl AsRef + for AsSet { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for BeaconKeySource { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(29,3) + pub type BeaconBitLength = i32; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(33,3) + #[derive(PartialEq, Clone)] + pub enum BeaconKeySource { + single { + single: Arc + }, + multi { + multi: Arc + } + } - impl DafnyPrint - for BeaconKeySource { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BeaconKeySource::single{single, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconKeySource.single(")?; - DafnyPrint::fmt_print(single, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - BeaconKeySource::multi{multi, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconKeySource.multi(")?; - DafnyPrint::fmt_print(multi, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl BeaconKeySource { + /// Gets the field single for all enum members which have it + pub fn single(&self) -> &Arc { + match self { + BeaconKeySource::single{single, } => single, + BeaconKeySource::multi{multi, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field multi for all enum members which have it + pub fn multi(&self) -> &Arc { + match self { + BeaconKeySource::single{single, } => panic!("field does not exist on this variant"), + BeaconKeySource::multi{multi, } => multi, + } + } + } - impl Eq - for BeaconKeySource {} + impl Debug + for BeaconKeySource { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for BeaconKeySource { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BeaconKeySource::single{single, } => { - Hash::hash(single, _state) - }, - BeaconKeySource::multi{multi, } => { - Hash::hash(multi, _state) - }, - } - } - } + impl DafnyPrint + for BeaconKeySource { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BeaconKeySource::single{single, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconKeySource.single(")?; + DafnyPrint::fmt_print(single, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + BeaconKeySource::multi{multi, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconKeySource.multi(")?; + DafnyPrint::fmt_print(multi, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for BeaconKeySource { - fn default() -> BeaconKeySource { - BeaconKeySource::single { - single: Default::default() - } - } - } + impl Eq + for BeaconKeySource {} + + impl Hash + for BeaconKeySource { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BeaconKeySource::single{single, } => { + Hash::hash(single, _state) + }, + BeaconKeySource::multi{multi, } => { + Hash::hash(multi, _state) + }, + } + } + } - impl AsRef - for &BeaconKeySource { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for BeaconKeySource { + fn default() -> BeaconKeySource { + BeaconKeySource::single { + single: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum BeaconStyle { - partOnly { - partOnly: Rc - }, - shared { - shared: Rc - }, - asSet { - asSet: Rc - }, - sharedSet { - sharedSet: Rc - } - } - - impl BeaconStyle { - pub fn partOnly(&self) -> &Rc { - match self { - BeaconStyle::partOnly{partOnly, } => partOnly, - BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), - BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), - BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), - } - } - pub fn shared(&self) -> &Rc { - match self { - BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), - BeaconStyle::shared{shared, } => shared, - BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), - BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), - } - } - pub fn asSet(&self) -> &Rc { - match self { - BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), - BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), - BeaconStyle::asSet{asSet, } => asSet, - BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), - } - } - pub fn sharedSet(&self) -> &Rc { - match self { - BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), - BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), - BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), - BeaconStyle::sharedSet{sharedSet, } => sharedSet, - } - } - } - - impl Debug - for BeaconStyle { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for BeaconKeySource { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for BeaconStyle { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BeaconStyle::partOnly{partOnly, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.partOnly(")?; - DafnyPrint::fmt_print(partOnly, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - BeaconStyle::shared{shared, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.shared(")?; - DafnyPrint::fmt_print(shared, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - BeaconStyle::asSet{asSet, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.asSet(")?; - DafnyPrint::fmt_print(asSet, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - BeaconStyle::sharedSet{sharedSet, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.sharedSet(")?; - DafnyPrint::fmt_print(sharedSet, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(36,3) + #[derive(PartialEq, Clone)] + pub enum BeaconStyle { + partOnly { + partOnly: Arc + }, + shared { + shared: Arc + }, + asSet { + asSet: Arc + }, + sharedSet { + sharedSet: Arc + } + } - impl Eq - for BeaconStyle {} + impl BeaconStyle { + /// Gets the field partOnly for all enum members which have it + pub fn partOnly(&self) -> &Arc { + match self { + BeaconStyle::partOnly{partOnly, } => partOnly, + BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), + BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), + BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field shared for all enum members which have it + pub fn shared(&self) -> &Arc { + match self { + BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), + BeaconStyle::shared{shared, } => shared, + BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), + BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field asSet for all enum members which have it + pub fn asSet(&self) -> &Arc { + match self { + BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), + BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), + BeaconStyle::asSet{asSet, } => asSet, + BeaconStyle::sharedSet{sharedSet, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field sharedSet for all enum members which have it + pub fn sharedSet(&self) -> &Arc { + match self { + BeaconStyle::partOnly{partOnly, } => panic!("field does not exist on this variant"), + BeaconStyle::shared{shared, } => panic!("field does not exist on this variant"), + BeaconStyle::asSet{asSet, } => panic!("field does not exist on this variant"), + BeaconStyle::sharedSet{sharedSet, } => sharedSet, + } + } + } - impl Hash - for BeaconStyle { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BeaconStyle::partOnly{partOnly, } => { - Hash::hash(partOnly, _state) - }, - BeaconStyle::shared{shared, } => { - Hash::hash(shared, _state) - }, - BeaconStyle::asSet{asSet, } => { - Hash::hash(asSet, _state) - }, - BeaconStyle::sharedSet{sharedSet, } => { - Hash::hash(sharedSet, _state) - }, - } - } - } - - impl Default - for BeaconStyle { - fn default() -> BeaconStyle { - BeaconStyle::partOnly { - partOnly: Default::default() - } - } - } - - impl AsRef - for &BeaconStyle { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum BeaconVersion { - BeaconVersion { - version: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber, - keyStore: Object, - keySource: Rc, - standardBeacons: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeaconList, - compoundBeacons: Rc>, - virtualFields: Rc>, - encryptedParts: Rc>, - signedParts: Rc> - } - } - - impl BeaconVersion { - pub fn version(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => version, - } - } - pub fn keyStore(&self) -> &Object { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => keyStore, - } - } - pub fn keySource(&self) -> &Rc { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => keySource, - } - } - pub fn standardBeacons(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeaconList { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => standardBeacons, - } - } - pub fn compoundBeacons(&self) -> &Rc> { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => compoundBeacons, - } - } - pub fn virtualFields(&self) -> &Rc> { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => virtualFields, - } - } - pub fn encryptedParts(&self) -> &Rc> { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => encryptedParts, - } - } - pub fn signedParts(&self) -> &Rc> { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => signedParts, - } - } - } - - impl Debug - for BeaconVersion { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BeaconStyle { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BeaconVersion { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconVersion.BeaconVersion(")?; - DafnyPrint::fmt_print(version, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyStore, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keySource, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(standardBeacons, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(compoundBeacons, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(virtualFields, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedParts, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signedParts, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BeaconStyle { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BeaconStyle::partOnly{partOnly, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.partOnly(")?; + DafnyPrint::fmt_print(partOnly, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + BeaconStyle::shared{shared, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.shared(")?; + DafnyPrint::fmt_print(shared, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + BeaconStyle::asSet{asSet, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.asSet(")?; + DafnyPrint::fmt_print(asSet, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + BeaconStyle::sharedSet{sharedSet, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconStyle.sharedSet(")?; + DafnyPrint::fmt_print(sharedSet, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BeaconVersion {} + impl Eq + for BeaconStyle {} + + impl Hash + for BeaconStyle { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BeaconStyle::partOnly{partOnly, } => { + Hash::hash(partOnly, _state) + }, + BeaconStyle::shared{shared, } => { + Hash::hash(shared, _state) + }, + BeaconStyle::asSet{asSet, } => { + Hash::hash(asSet, _state) + }, + BeaconStyle::sharedSet{sharedSet, } => { + Hash::hash(sharedSet, _state) + }, + } + } + } - impl Hash - for BeaconVersion { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => { - Hash::hash(version, _state); - Hash::hash(keyStore, _state); - Hash::hash(keySource, _state); - Hash::hash(standardBeacons, _state); - Hash::hash(compoundBeacons, _state); - Hash::hash(virtualFields, _state); - Hash::hash(encryptedParts, _state); - Hash::hash(signedParts, _state) - }, - } - } - } - - impl Default - for BeaconVersion { - fn default() -> BeaconVersion { - BeaconVersion::BeaconVersion { - version: Default::default(), - keyStore: Default::default(), - keySource: Default::default(), - standardBeacons: Default::default(), - compoundBeacons: Default::default(), - virtualFields: Default::default(), - encryptedParts: Default::default(), - signedParts: Default::default() - } - } - } - - impl AsRef - for &BeaconVersion { - fn as_ref(&self) -> Self { - self - } - } - - pub type BeaconVersionList = Sequence>; - - pub type Char = Sequence; - - #[derive(PartialEq, Clone)] - pub enum CompoundBeacon { - CompoundBeacon { - name: Sequence, - split: Sequence, - encrypted: Rc>, - signed: Rc>, - constructors: Rc> - } - } - - impl CompoundBeacon { - pub fn name(&self) -> &Sequence { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => name, - } - } - pub fn split(&self) -> &Sequence { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => split, - } - } - pub fn encrypted(&self) -> &Rc> { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => encrypted, - } - } - pub fn signed(&self) -> &Rc> { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => signed, - } - } - pub fn constructors(&self) -> &Rc> { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => constructors, - } - } - } - - impl Debug - for CompoundBeacon { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for BeaconStyle { + fn default() -> BeaconStyle { + BeaconStyle::partOnly { + partOnly: Default::default() + } + } + } - impl DafnyPrint - for CompoundBeacon { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CompoundBeacon.CompoundBeacon(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(split, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encrypted, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signed, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(constructors, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for BeaconStyle { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for CompoundBeacon {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(41,3) + #[derive(PartialEq, Clone)] + pub enum BeaconVersion { + BeaconVersion { + version: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber, + keyStore: Object, + keySource: Arc, + standardBeacons: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeaconList, + compoundBeacons: Arc>, + virtualFields: Arc>, + encryptedParts: Arc>, + signedParts: Arc> + } + } - impl Hash - for CompoundBeacon { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => { - Hash::hash(name, _state); - Hash::hash(split, _state); - Hash::hash(encrypted, _state); - Hash::hash(signed, _state); - Hash::hash(constructors, _state) - }, - } - } - } + impl BeaconVersion { + /// Returns a borrow of the field version + pub fn version(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => version, + } + } + /// Returns a borrow of the field keyStore + pub fn keyStore(&self) -> &Object { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => keyStore, + } + } + /// Returns a borrow of the field keySource + pub fn keySource(&self) -> &Arc { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => keySource, + } + } + /// Returns a borrow of the field standardBeacons + pub fn standardBeacons(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::StandardBeaconList { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => standardBeacons, + } + } + /// Returns a borrow of the field compoundBeacons + pub fn compoundBeacons(&self) -> &Arc> { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => compoundBeacons, + } + } + /// Returns a borrow of the field virtualFields + pub fn virtualFields(&self) -> &Arc> { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => virtualFields, + } + } + /// Returns a borrow of the field encryptedParts + pub fn encryptedParts(&self) -> &Arc> { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => encryptedParts, + } + } + /// Returns a borrow of the field signedParts + pub fn signedParts(&self) -> &Arc> { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => signedParts, + } + } + } - impl Default - for CompoundBeacon { - fn default() -> CompoundBeacon { - CompoundBeacon::CompoundBeacon { - name: Default::default(), - split: Default::default(), - encrypted: Default::default(), - signed: Default::default(), - constructors: Default::default() - } - } - } + impl Debug + for BeaconVersion { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &CompoundBeacon { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for BeaconVersion { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.BeaconVersion.BeaconVersion(")?; + DafnyPrint::fmt_print(version, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyStore, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keySource, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(standardBeacons, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(compoundBeacons, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(virtualFields, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedParts, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signedParts, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type CompoundBeaconList = Sequence>; + impl Eq + for BeaconVersion {} + + impl Hash + for BeaconVersion { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BeaconVersion::BeaconVersion{version, keyStore, keySource, standardBeacons, compoundBeacons, virtualFields, encryptedParts, signedParts, } => { + Hash::hash(version, _state); + Hash::hash(keyStore, _state); + Hash::hash(keySource, _state); + Hash::hash(standardBeacons, _state); + Hash::hash(compoundBeacons, _state); + Hash::hash(virtualFields, _state); + Hash::hash(encryptedParts, _state); + Hash::hash(signedParts, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum Constructor { - Constructor { - parts: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPartList - } - } + impl Default + for BeaconVersion { + fn default() -> BeaconVersion { + BeaconVersion::BeaconVersion { + version: Default::default(), + keyStore: Default::default(), + keySource: Default::default(), + standardBeacons: Default::default(), + compoundBeacons: Default::default(), + virtualFields: Default::default(), + encryptedParts: Default::default(), + signedParts: Default::default() + } + } + } - impl Constructor { - pub fn parts(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPartList { - match self { - Constructor::Constructor{parts, } => parts, - } - } - } + impl AsRef + for BeaconVersion { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for Constructor { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(51,3) + pub type BeaconVersionList = Sequence>; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(55,3) + pub type Char = Sequence; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(59,3) + #[derive(PartialEq, Clone)] + pub enum CompoundBeacon { + CompoundBeacon { + name: Sequence, + split: Sequence, + encrypted: Arc>, + signed: Arc>, + constructors: Arc> + } + } - impl DafnyPrint - for Constructor { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Constructor::Constructor{parts, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Constructor.Constructor(")?; - DafnyPrint::fmt_print(parts, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CompoundBeacon { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => name, + } + } + /// Returns a borrow of the field split + pub fn split(&self) -> &Sequence { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => split, + } + } + /// Returns a borrow of the field encrypted + pub fn encrypted(&self) -> &Arc> { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => encrypted, + } + } + /// Returns a borrow of the field signed + pub fn signed(&self) -> &Arc> { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => signed, + } + } + /// Returns a borrow of the field constructors + pub fn constructors(&self) -> &Arc> { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => constructors, + } + } + } - impl Eq - for Constructor {} + impl Debug + for CompoundBeacon { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for Constructor { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Constructor::Constructor{parts, } => { - Hash::hash(parts, _state) - }, - } - } - } + impl DafnyPrint + for CompoundBeacon { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CompoundBeacon.CompoundBeacon(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(split, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encrypted, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signed, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(constructors, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for Constructor { - fn default() -> Constructor { - Constructor::Constructor { - parts: Default::default() - } - } - } + impl Eq + for CompoundBeacon {} + + impl Hash + for CompoundBeacon { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CompoundBeacon::CompoundBeacon{name, split, encrypted, signed, constructors, } => { + Hash::hash(name, _state); + Hash::hash(split, _state); + Hash::hash(encrypted, _state); + Hash::hash(signed, _state); + Hash::hash(constructors, _state) + }, + } + } + } - impl AsRef - for &Constructor { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CompoundBeacon { + fn default() -> CompoundBeacon { + CompoundBeacon::CompoundBeacon { + name: Default::default(), + split: Default::default(), + encrypted: Default::default(), + signed: Default::default(), + constructors: Default::default() + } + } + } - pub type ConstructorList = Sequence>; + impl AsRef + for CompoundBeacon { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ConstructorPart { - ConstructorPart { - name: Sequence, - required: bool - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(66,3) + pub type CompoundBeaconList = Sequence>; - impl ConstructorPart { - pub fn name(&self) -> &Sequence { - match self { - ConstructorPart::ConstructorPart{name, required, } => name, - } - } - pub fn required(&self) -> &bool { - match self { - ConstructorPart::ConstructorPart{name, required, } => required, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(70,3) + #[derive(PartialEq, Clone)] + pub enum Constructor { + Constructor { + parts: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPartList + } + } - impl Debug - for ConstructorPart { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Constructor { + /// Returns a borrow of the field parts + pub fn parts(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ConstructorPartList { + match self { + Constructor::Constructor{parts, } => parts, + } + } + } - impl DafnyPrint - for ConstructorPart { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConstructorPart::ConstructorPart{name, required, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.ConstructorPart.ConstructorPart(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(required, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for Constructor { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ConstructorPart {} + impl DafnyPrint + for Constructor { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Constructor::Constructor{parts, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Constructor.Constructor(")?; + DafnyPrint::fmt_print(parts, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ConstructorPart { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConstructorPart::ConstructorPart{name, required, } => { - Hash::hash(name, _state); - Hash::hash(required, _state) - }, - } - } - } + impl Eq + for Constructor {} - impl Default - for ConstructorPart { - fn default() -> ConstructorPart { - ConstructorPart::ConstructorPart { - name: Default::default(), - required: Default::default() - } - } - } + impl Hash + for Constructor { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Constructor::Constructor{parts, } => { + Hash::hash(parts, _state) + }, + } + } + } - impl AsRef - for &ConstructorPart { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for Constructor { + fn default() -> Constructor { + Constructor::Constructor { + parts: Default::default() + } + } + } - pub type ConstructorPartList = Sequence>; + impl AsRef + for Constructor { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - ddbKeyBranchKeyIdSupplier: Object - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(73,3) + pub type ConstructorList = Sequence>; - impl CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - pub fn ddbKeyBranchKeyIdSupplier(&self) -> &Object { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => ddbKeyBranchKeyIdSupplier, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(77,3) + #[derive(PartialEq, Clone)] + pub enum ConstructorPart { + ConstructorPart { + name: Sequence, + required: bool + } + } - impl Debug - for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ConstructorPart { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + ConstructorPart::ConstructorPart{name, required, } => name, + } + } + /// Returns a borrow of the field required + pub fn required(&self) -> &bool { + match self { + ConstructorPart::ConstructorPart{name, required, } => required, + } + } + } - impl DafnyPrint - for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CreateDynamoDbEncryptionBranchKeyIdSupplierInput.CreateDynamoDbEncryptionBranchKeyIdSupplierInput(")?; - DafnyPrint::fmt_print(ddbKeyBranchKeyIdSupplier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ConstructorPart { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateDynamoDbEncryptionBranchKeyIdSupplierInput {} + impl DafnyPrint + for ConstructorPart { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConstructorPart::ConstructorPart{name, required, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.ConstructorPart.ConstructorPart(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(required, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => { - Hash::hash(ddbKeyBranchKeyIdSupplier, _state) - }, - } - } - } + impl Eq + for ConstructorPart {} + + impl Hash + for ConstructorPart { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConstructorPart::ConstructorPart{name, required, } => { + Hash::hash(name, _state); + Hash::hash(required, _state) + }, + } + } + } - impl Default - for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - fn default() -> CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - ddbKeyBranchKeyIdSupplier: Default::default() - } - } - } + impl Default + for ConstructorPart { + fn default() -> ConstructorPart { + ConstructorPart::ConstructorPart { + name: Default::default(), + required: Default::default() + } + } + } - impl AsRef - for &CreateDynamoDbEncryptionBranchKeyIdSupplierInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ConstructorPart { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - branchKeyIdSupplier: Object - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(81,3) + pub type ConstructorPartList = Sequence>; - impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - pub fn branchKeyIdSupplier(&self) -> &Object { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => branchKeyIdSupplier, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(85,3) + #[derive(PartialEq, Clone)] + pub enum CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + ddbKeyBranchKeyIdSupplier: Object + } + } - impl Debug - for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + /// Returns a borrow of the field ddbKeyBranchKeyIdSupplier + pub fn ddbKeyBranchKeyIdSupplier(&self) -> &Object { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => ddbKeyBranchKeyIdSupplier, + } + } + } - impl DafnyPrint - for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CreateDynamoDbEncryptionBranchKeyIdSupplierOutput.CreateDynamoDbEncryptionBranchKeyIdSupplierOutput(")?; - DafnyPrint::fmt_print(branchKeyIdSupplier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput {} + impl DafnyPrint + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CreateDynamoDbEncryptionBranchKeyIdSupplierInput.CreateDynamoDbEncryptionBranchKeyIdSupplierInput(")?; + DafnyPrint::fmt_print(ddbKeyBranchKeyIdSupplier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => { - Hash::hash(branchKeyIdSupplier, _state) - }, - } - } - } + impl Eq + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput {} - impl Default - for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - fn default() -> CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - branchKeyIdSupplier: Default::default() - } - } - } + impl Hash + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput{ddbKeyBranchKeyIdSupplier, } => { + Hash::hash(ddbKeyBranchKeyIdSupplier, _state) + }, + } + } + } - impl AsRef - for &CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + fn default() -> CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + CreateDynamoDbEncryptionBranchKeyIdSupplierInput::CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + ddbKeyBranchKeyIdSupplier: Default::default() + } + } + } - pub struct IDynamoDbEncryptionClientCallHistory {} + impl AsRef + for CreateDynamoDbEncryptionBranchKeyIdSupplierInput { + fn as_ref(&self) -> &Self { + self + } + } - impl IDynamoDbEncryptionClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(88,3) + #[derive(PartialEq, Clone)] + pub enum CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + branchKeyIdSupplier: Object + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbEncryptionClientCallHistory { - UpcastObjectFn!(dyn Any); - } + impl CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + /// Returns a borrow of the field branchKeyIdSupplier + pub fn branchKeyIdSupplier(&self) -> &Object { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => branchKeyIdSupplier, + } + } + } - pub trait IDynamoDbEncryptionClient: Any + UpcastObject { - fn CreateDynamoDbEncryptionBranchKeyIdSupplier(&self, input: &Rc) -> Rc, Rc>>; - fn GetEncryptedDataKeyDescription(&self, input: &Rc) -> Rc, Rc>>; - } + impl Debug + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DynamoDbEncryptionConfig { - DynamoDbEncryptionConfig {} - } + impl DafnyPrint + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.CreateDynamoDbEncryptionBranchKeyIdSupplierOutput.CreateDynamoDbEncryptionBranchKeyIdSupplierOutput(")?; + DafnyPrint::fmt_print(branchKeyIdSupplier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DynamoDbEncryptionConfig {} + impl Eq + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput {} - impl Debug - for DynamoDbEncryptionConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput{branchKeyIdSupplier, } => { + Hash::hash(branchKeyIdSupplier, _state) + }, + } + } + } - impl DafnyPrint - for DynamoDbEncryptionConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DynamoDbEncryptionConfig::DynamoDbEncryptionConfig{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbEncryptionConfig.DynamoDbEncryptionConfig")?; - Ok(()) - }, - } - } - } + impl Default + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + fn default() -> CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + branchKeyIdSupplier: Default::default() + } + } + } - impl DynamoDbEncryptionConfig { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {})].iter() - } - } + impl AsRef + for CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DynamoDbEncryptionConfig {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(91,3) + pub struct IDynamoDbEncryptionClientCallHistory {} - impl Hash - for DynamoDbEncryptionConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DynamoDbEncryptionConfig::DynamoDbEncryptionConfig{} => { + impl IDynamoDbEncryptionClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbEncryptionClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl Default - for DynamoDbEncryptionConfig { - fn default() -> DynamoDbEncryptionConfig { - DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {} - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(99,3) + pub trait IDynamoDbEncryptionClient: Any + Sync + Send + UpcastObject { + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(128,5) + fn CreateDynamoDbEncryptionBranchKeyIdSupplier(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(154,5) + fn GetEncryptedDataKeyDescription(&self, input: &Arc) -> Arc, Arc>>; + } - impl AsRef - for &DynamoDbEncryptionConfig { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(168,3) + #[derive(PartialEq, Clone)] + pub enum DynamoDbEncryptionConfig { + DynamoDbEncryptionConfig {} + } - pub struct IDynamoDbKeyBranchKeyIdSupplierCallHistory {} + impl DynamoDbEncryptionConfig {} - impl IDynamoDbKeyBranchKeyIdSupplierCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplierCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IDynamoDbKeyBranchKeyIdSupplier: Any + UpcastObject { - fn GetBranchKeyIdFromDdbKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplier::r#_GetBranchKeyIdFromDdbKey_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_GetBranchKeyIdFromDdbKey_k(&self, input: &Rc) -> Rc, Rc>>; - } - - #[derive(PartialEq, Clone)] - pub enum DynamoDbTableEncryptionConfig { - DynamoDbTableEncryptionConfig { - logicalTableName: Sequence, - partitionKeyName: Sequence, - sortKeyName: Rc>>, - search: Rc>>, - attributeActionsOnEncrypt: Map, Rc>, - allowedUnsignedAttributes: Rc>, - allowedUnsignedAttributePrefix: Rc>>, - algorithmSuiteId: Rc>>, - keyring: Rc>>, - cmm: Rc>>, - legacyOverride: Rc>>, - plaintextOverride: Rc>> - } - } - - impl DynamoDbTableEncryptionConfig { - pub fn logicalTableName(&self) -> &Sequence { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => logicalTableName, - } - } - pub fn partitionKeyName(&self) -> &Sequence { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => partitionKeyName, - } - } - pub fn sortKeyName(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => sortKeyName, - } - } - pub fn search(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => search, - } - } - pub fn attributeActionsOnEncrypt(&self) -> &Map, Rc> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => attributeActionsOnEncrypt, - } - } - pub fn allowedUnsignedAttributes(&self) -> &Rc> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributes, - } - } - pub fn allowedUnsignedAttributePrefix(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributePrefix, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => algorithmSuiteId, - } - } - pub fn keyring(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => keyring, - } - } - pub fn cmm(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => cmm, - } - } - pub fn legacyOverride(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => legacyOverride, - } - } - pub fn plaintextOverride(&self) -> &Rc>> { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => plaintextOverride, - } - } - } - - impl Debug - for DynamoDbTableEncryptionConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DynamoDbEncryptionConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DynamoDbTableEncryptionConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbTableEncryptionConfig.DynamoDbTableEncryptionConfig(")?; - DafnyPrint::fmt_print(logicalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partitionKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(sortKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(search, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributePrefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyring, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(legacyOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DynamoDbEncryptionConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DynamoDbEncryptionConfig::DynamoDbEncryptionConfig{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbEncryptionConfig.DynamoDbEncryptionConfig")?; + Ok(()) + }, + } + } + } - impl Eq - for DynamoDbTableEncryptionConfig {} + impl DynamoDbEncryptionConfig { + /// Enumerates all possible values of DynamoDbEncryptionConfig + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {})].iter() + } + } - impl Hash - for DynamoDbTableEncryptionConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { - Hash::hash(logicalTableName, _state); - Hash::hash(partitionKeyName, _state); - Hash::hash(sortKeyName, _state); - Hash::hash(search, _state); - Hash::hash(attributeActionsOnEncrypt, _state); - Hash::hash(allowedUnsignedAttributes, _state); - Hash::hash(allowedUnsignedAttributePrefix, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(keyring, _state); - Hash::hash(cmm, _state); - Hash::hash(legacyOverride, _state); - Hash::hash(plaintextOverride, _state) - }, - } - } - } - - impl Default - for DynamoDbTableEncryptionConfig { - fn default() -> DynamoDbTableEncryptionConfig { - DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig { - logicalTableName: Default::default(), - partitionKeyName: Default::default(), - sortKeyName: Default::default(), - search: Default::default(), - attributeActionsOnEncrypt: Default::default(), - allowedUnsignedAttributes: Default::default(), - allowedUnsignedAttributePrefix: Default::default(), - algorithmSuiteId: Default::default(), - keyring: Default::default(), - cmm: Default::default(), - legacyOverride: Default::default(), - plaintextOverride: Default::default() - } - } - } - - impl AsRef - for &DynamoDbTableEncryptionConfig { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DynamoDbTablesEncryptionConfig { - DynamoDbTablesEncryptionConfig { - tableEncryptionConfigs: Map, Rc> - } - } - - impl DynamoDbTablesEncryptionConfig { - pub fn tableEncryptionConfigs(&self) -> &Map, Rc> { - match self { - DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => tableEncryptionConfigs, - } - } - } - - impl Debug - for DynamoDbTablesEncryptionConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DynamoDbEncryptionConfig {} - impl DafnyPrint - for DynamoDbTablesEncryptionConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbTablesEncryptionConfig.DynamoDbTablesEncryptionConfig(")?; - DafnyPrint::fmt_print(tableEncryptionConfigs, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DynamoDbEncryptionConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DynamoDbEncryptionConfig::DynamoDbEncryptionConfig{} => { - impl Eq - for DynamoDbTablesEncryptionConfig {} + }, + } + } + } - impl Hash - for DynamoDbTablesEncryptionConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => { - Hash::hash(tableEncryptionConfigs, _state) - }, - } - } - } + impl Default + for DynamoDbEncryptionConfig { + fn default() -> DynamoDbEncryptionConfig { + DynamoDbEncryptionConfig::DynamoDbEncryptionConfig {} + } + } - impl Default - for DynamoDbTablesEncryptionConfig { - fn default() -> DynamoDbTablesEncryptionConfig { - DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { - tableEncryptionConfigs: Default::default() - } - } - } + impl AsRef + for DynamoDbEncryptionConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DynamoDbTablesEncryptionConfig { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(171,3) + pub struct IDynamoDbKeyBranchKeyIdSupplierCallHistory {} - #[derive(PartialEq, Clone)] - pub enum EncryptedDataKeyDescription { - EncryptedDataKeyDescription { - keyProviderId: Sequence, - keyProviderInfo: Rc>>, - branchKeyId: Rc>>, - branchKeyVersion: Rc>> - } - } + impl IDynamoDbKeyBranchKeyIdSupplierCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl EncryptedDataKeyDescription { - pub fn keyProviderId(&self) -> &Sequence { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => keyProviderId, - } - } - pub fn keyProviderInfo(&self) -> &Rc>> { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => keyProviderInfo, - } - } - pub fn branchKeyId(&self) -> &Rc>> { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => branchKeyId, - } - } - pub fn branchKeyVersion(&self) -> &Rc>> { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => branchKeyVersion, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplierCallHistory { + UpcastObjectFn!(DynAny); + } - impl Debug - for EncryptedDataKeyDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(177,3) + pub trait IDynamoDbKeyBranchKeyIdSupplier: Any + Sync + Send + UpcastObject { + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(206,5) + fn GetBranchKeyIdFromDdbKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::IDynamoDbKeyBranchKeyIdSupplier::_GetBranchKeyIdFromDdbKey_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(223,5) + fn _GetBranchKeyIdFromDdbKey_k(&self, input: &Arc) -> Arc, Arc>>; + } - impl DafnyPrint - for EncryptedDataKeyDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.EncryptedDataKeyDescription.EncryptedDataKeyDescription(")?; - DafnyPrint::fmt_print(keyProviderId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyProviderInfo, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(236,3) + #[derive(PartialEq, Clone)] + pub enum DynamoDbTableEncryptionConfig { + DynamoDbTableEncryptionConfig { + logicalTableName: Sequence, + partitionKeyName: Sequence, + sortKeyName: Arc>>, + search: Arc>>, + attributeActionsOnEncrypt: Map, Arc>, + allowedUnsignedAttributes: Arc>, + allowedUnsignedAttributePrefix: Arc>>, + algorithmSuiteId: Arc>>, + keyring: Arc>>, + cmm: Arc>>, + legacyOverride: Arc>>, + plaintextOverride: Arc>> + } + } - impl Eq - for EncryptedDataKeyDescription {} + impl DynamoDbTableEncryptionConfig { + /// Returns a borrow of the field logicalTableName + pub fn logicalTableName(&self) -> &Sequence { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => logicalTableName, + } + } + /// Returns a borrow of the field partitionKeyName + pub fn partitionKeyName(&self) -> &Sequence { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => partitionKeyName, + } + } + /// Returns a borrow of the field sortKeyName + pub fn sortKeyName(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => sortKeyName, + } + } + /// Returns a borrow of the field search + pub fn search(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => search, + } + } + /// Returns a borrow of the field attributeActionsOnEncrypt + pub fn attributeActionsOnEncrypt(&self) -> &Map, Arc> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => attributeActionsOnEncrypt, + } + } + /// Returns a borrow of the field allowedUnsignedAttributes + pub fn allowedUnsignedAttributes(&self) -> &Arc> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributes, + } + } + /// Returns a borrow of the field allowedUnsignedAttributePrefix + pub fn allowedUnsignedAttributePrefix(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => allowedUnsignedAttributePrefix, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field keyring + pub fn keyring(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => keyring, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => cmm, + } + } + /// Returns a borrow of the field legacyOverride + pub fn legacyOverride(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => legacyOverride, + } + } + /// Returns a borrow of the field plaintextOverride + pub fn plaintextOverride(&self) -> &Arc>> { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => plaintextOverride, + } + } + } - impl Hash - for EncryptedDataKeyDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => { - Hash::hash(keyProviderId, _state); - Hash::hash(keyProviderInfo, _state); - Hash::hash(branchKeyId, _state); - Hash::hash(branchKeyVersion, _state) - }, - } - } - } + impl Debug + for DynamoDbTableEncryptionConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for EncryptedDataKeyDescription { - fn default() -> EncryptedDataKeyDescription { - EncryptedDataKeyDescription::EncryptedDataKeyDescription { - keyProviderId: Default::default(), - keyProviderInfo: Default::default(), - branchKeyId: Default::default(), - branchKeyVersion: Default::default() - } - } - } + impl DafnyPrint + for DynamoDbTableEncryptionConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbTableEncryptionConfig.DynamoDbTableEncryptionConfig(")?; + DafnyPrint::fmt_print(logicalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partitionKeyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(sortKeyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(search, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(allowedUnsignedAttributes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(allowedUnsignedAttributePrefix, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyring, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(legacyOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextOverride, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &EncryptedDataKeyDescription { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for DynamoDbTableEncryptionConfig {} + + impl Hash + for DynamoDbTableEncryptionConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig{logicalTableName, partitionKeyName, sortKeyName, search, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, keyring, cmm, legacyOverride, plaintextOverride, } => { + Hash::hash(logicalTableName, _state); + Hash::hash(partitionKeyName, _state); + Hash::hash(sortKeyName, _state); + Hash::hash(search, _state); + Hash::hash(attributeActionsOnEncrypt, _state); + Hash::hash(allowedUnsignedAttributes, _state); + Hash::hash(allowedUnsignedAttributePrefix, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(keyring, _state); + Hash::hash(cmm, _state); + Hash::hash(legacyOverride, _state); + Hash::hash(plaintextOverride, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum EncryptedPart { - EncryptedPart { - name: Sequence, - prefix: Sequence - } - } + impl Default + for DynamoDbTableEncryptionConfig { + fn default() -> DynamoDbTableEncryptionConfig { + DynamoDbTableEncryptionConfig::DynamoDbTableEncryptionConfig { + logicalTableName: Default::default(), + partitionKeyName: Default::default(), + sortKeyName: Default::default(), + search: Default::default(), + attributeActionsOnEncrypt: Default::default(), + allowedUnsignedAttributes: Default::default(), + allowedUnsignedAttributePrefix: Default::default(), + algorithmSuiteId: Default::default(), + keyring: Default::default(), + cmm: Default::default(), + legacyOverride: Default::default(), + plaintextOverride: Default::default() + } + } + } - impl EncryptedPart { - pub fn name(&self) -> &Sequence { - match self { - EncryptedPart::EncryptedPart{name, prefix, } => name, - } - } - pub fn prefix(&self) -> &Sequence { - match self { - EncryptedPart::EncryptedPart{name, prefix, } => prefix, - } - } - } + impl AsRef + for DynamoDbTableEncryptionConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for EncryptedPart { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(251,3) + #[derive(PartialEq, Clone)] + pub enum DynamoDbTablesEncryptionConfig { + DynamoDbTablesEncryptionConfig { + tableEncryptionConfigs: Map, Arc> + } + } - impl DafnyPrint - for EncryptedPart { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptedPart::EncryptedPart{name, prefix, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.EncryptedPart.EncryptedPart(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(prefix, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DynamoDbTablesEncryptionConfig { + /// Returns a borrow of the field tableEncryptionConfigs + pub fn tableEncryptionConfigs(&self) -> &Map, Arc> { + match self { + DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => tableEncryptionConfigs, + } + } + } - impl Eq - for EncryptedPart {} + impl Debug + for DynamoDbTablesEncryptionConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for EncryptedPart { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptedPart::EncryptedPart{name, prefix, } => { - Hash::hash(name, _state); - Hash::hash(prefix, _state) - }, - } - } - } + impl DafnyPrint + for DynamoDbTablesEncryptionConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.DynamoDbTablesEncryptionConfig.DynamoDbTablesEncryptionConfig(")?; + DafnyPrint::fmt_print(tableEncryptionConfigs, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for EncryptedPart { - fn default() -> EncryptedPart { - EncryptedPart::EncryptedPart { - name: Default::default(), - prefix: Default::default() - } - } - } + impl Eq + for DynamoDbTablesEncryptionConfig {} - impl AsRef - for &EncryptedPart { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for DynamoDbTablesEncryptionConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig{tableEncryptionConfigs, } => { + Hash::hash(tableEncryptionConfigs, _state) + }, + } + } + } - pub type EncryptedPartsList = Sequence>; + impl Default + for DynamoDbTablesEncryptionConfig { + fn default() -> DynamoDbTablesEncryptionConfig { + DynamoDbTablesEncryptionConfig::DynamoDbTablesEncryptionConfig { + tableEncryptionConfigs: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyIdFromDdbKeyInput { - GetBranchKeyIdFromDdbKeyInput { - ddbKey: Map, Rc> - } - } + impl AsRef + for DynamoDbTablesEncryptionConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl GetBranchKeyIdFromDdbKeyInput { - pub fn ddbKey(&self) -> &Map, Rc> { - match self { - GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => ddbKey, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(254,3) + #[derive(PartialEq, Clone)] + pub enum EncryptedDataKeyDescription { + EncryptedDataKeyDescription { + keyProviderId: Sequence, + keyProviderInfo: Arc>>, + branchKeyId: Arc>>, + branchKeyVersion: Arc>> + } + } - impl Debug - for GetBranchKeyIdFromDdbKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl EncryptedDataKeyDescription { + /// Returns a borrow of the field keyProviderId + pub fn keyProviderId(&self) -> &Sequence { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => keyProviderId, + } + } + /// Returns a borrow of the field keyProviderInfo + pub fn keyProviderInfo(&self) -> &Arc>> { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => keyProviderInfo, + } + } + /// Returns a borrow of the field branchKeyId + pub fn branchKeyId(&self) -> &Arc>> { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => branchKeyId, + } + } + /// Returns a borrow of the field branchKeyVersion + pub fn branchKeyVersion(&self) -> &Arc>> { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => branchKeyVersion, + } + } + } - impl DafnyPrint - for GetBranchKeyIdFromDdbKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetBranchKeyIdFromDdbKeyInput.GetBranchKeyIdFromDdbKeyInput(")?; - DafnyPrint::fmt_print(ddbKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for EncryptedDataKeyDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GetBranchKeyIdFromDdbKeyInput {} + impl DafnyPrint + for EncryptedDataKeyDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.EncryptedDataKeyDescription.EncryptedDataKeyDescription(")?; + DafnyPrint::fmt_print(keyProviderId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyProviderInfo, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GetBranchKeyIdFromDdbKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => { - Hash::hash(ddbKey, _state) - }, - } - } - } + impl Eq + for EncryptedDataKeyDescription {} + + impl Hash + for EncryptedDataKeyDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptedDataKeyDescription::EncryptedDataKeyDescription{keyProviderId, keyProviderInfo, branchKeyId, branchKeyVersion, } => { + Hash::hash(keyProviderId, _state); + Hash::hash(keyProviderInfo, _state); + Hash::hash(branchKeyId, _state); + Hash::hash(branchKeyVersion, _state) + }, + } + } + } - impl Default - for GetBranchKeyIdFromDdbKeyInput { - fn default() -> GetBranchKeyIdFromDdbKeyInput { - GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput { - ddbKey: Default::default() - } - } - } + impl Default + for EncryptedDataKeyDescription { + fn default() -> EncryptedDataKeyDescription { + EncryptedDataKeyDescription::EncryptedDataKeyDescription { + keyProviderId: Default::default(), + keyProviderInfo: Default::default(), + branchKeyId: Default::default(), + branchKeyVersion: Default::default() + } + } + } - impl AsRef - for &GetBranchKeyIdFromDdbKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for EncryptedDataKeyDescription { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyIdFromDdbKeyOutput { - GetBranchKeyIdFromDdbKeyOutput { - branchKeyId: Sequence - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(261,3) + #[derive(PartialEq, Clone)] + pub enum EncryptedPart { + EncryptedPart { + name: Sequence, + prefix: Sequence + } + } - impl GetBranchKeyIdFromDdbKeyOutput { - pub fn branchKeyId(&self) -> &Sequence { - match self { - GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => branchKeyId, - } - } - } + impl EncryptedPart { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + EncryptedPart::EncryptedPart{name, prefix, } => name, + } + } + /// Returns a borrow of the field prefix + pub fn prefix(&self) -> &Sequence { + match self { + EncryptedPart::EncryptedPart{name, prefix, } => prefix, + } + } + } - impl Debug - for GetBranchKeyIdFromDdbKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for EncryptedPart { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetBranchKeyIdFromDdbKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetBranchKeyIdFromDdbKeyOutput.GetBranchKeyIdFromDdbKeyOutput(")?; - DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for EncryptedPart { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptedPart::EncryptedPart{name, prefix, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.EncryptedPart.EncryptedPart(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(prefix, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetBranchKeyIdFromDdbKeyOutput {} + impl Eq + for EncryptedPart {} + + impl Hash + for EncryptedPart { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptedPart::EncryptedPart{name, prefix, } => { + Hash::hash(name, _state); + Hash::hash(prefix, _state) + }, + } + } + } - impl Hash - for GetBranchKeyIdFromDdbKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => { - Hash::hash(branchKeyId, _state) - }, - } - } - } + impl Default + for EncryptedPart { + fn default() -> EncryptedPart { + EncryptedPart::EncryptedPart { + name: Default::default(), + prefix: Default::default() + } + } + } - impl Default - for GetBranchKeyIdFromDdbKeyOutput { - fn default() -> GetBranchKeyIdFromDdbKeyOutput { - GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput { - branchKeyId: Default::default() - } - } - } + impl AsRef + for EncryptedPart { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GetBranchKeyIdFromDdbKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(265,3) + pub type EncryptedPartsList = Sequence>; - #[derive(PartialEq, Clone)] - pub enum GetEncryptedDataKeyDescriptionInput { - GetEncryptedDataKeyDescriptionInput { - input: Rc - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(269,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyIdFromDdbKeyInput { + GetBranchKeyIdFromDdbKeyInput { + ddbKey: Map, Arc> + } + } - impl GetEncryptedDataKeyDescriptionInput { - pub fn input(&self) -> &Rc { - match self { - GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => input, - } - } - } + impl GetBranchKeyIdFromDdbKeyInput { + /// Returns a borrow of the field ddbKey + pub fn ddbKey(&self) -> &Map, Arc> { + match self { + GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => ddbKey, + } + } + } - impl Debug - for GetEncryptedDataKeyDescriptionInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetBranchKeyIdFromDdbKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetEncryptedDataKeyDescriptionInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionInput.GetEncryptedDataKeyDescriptionInput(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetBranchKeyIdFromDdbKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetBranchKeyIdFromDdbKeyInput.GetBranchKeyIdFromDdbKeyInput(")?; + DafnyPrint::fmt_print(ddbKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetEncryptedDataKeyDescriptionInput {} + impl Eq + for GetBranchKeyIdFromDdbKeyInput {} - impl Hash - for GetEncryptedDataKeyDescriptionInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => { - Hash::hash(input, _state) - }, - } - } - } + impl Hash + for GetBranchKeyIdFromDdbKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput{ddbKey, } => { + Hash::hash(ddbKey, _state) + }, + } + } + } - impl Default - for GetEncryptedDataKeyDescriptionInput { - fn default() -> GetEncryptedDataKeyDescriptionInput { - GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput { - input: Default::default() - } - } - } + impl Default + for GetBranchKeyIdFromDdbKeyInput { + fn default() -> GetBranchKeyIdFromDdbKeyInput { + GetBranchKeyIdFromDdbKeyInput::GetBranchKeyIdFromDdbKeyInput { + ddbKey: Default::default() + } + } + } - impl AsRef - for &GetEncryptedDataKeyDescriptionInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetBranchKeyIdFromDdbKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetEncryptedDataKeyDescriptionOutput { - GetEncryptedDataKeyDescriptionOutput { - EncryptedDataKeyDescriptionOutput: Sequence> - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(272,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyIdFromDdbKeyOutput { + GetBranchKeyIdFromDdbKeyOutput { + branchKeyId: Sequence + } + } - impl GetEncryptedDataKeyDescriptionOutput { - pub fn EncryptedDataKeyDescriptionOutput(&self) -> &Sequence> { - match self { - GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => EncryptedDataKeyDescriptionOutput, - } - } - } + impl GetBranchKeyIdFromDdbKeyOutput { + /// Returns a borrow of the field branchKeyId + pub fn branchKeyId(&self) -> &Sequence { + match self { + GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => branchKeyId, + } + } + } - impl Debug - for GetEncryptedDataKeyDescriptionOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetBranchKeyIdFromDdbKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetEncryptedDataKeyDescriptionOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionOutput.GetEncryptedDataKeyDescriptionOutput(")?; - DafnyPrint::fmt_print(EncryptedDataKeyDescriptionOutput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetBranchKeyIdFromDdbKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetBranchKeyIdFromDdbKeyOutput.GetBranchKeyIdFromDdbKeyOutput(")?; + DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetEncryptedDataKeyDescriptionOutput {} + impl Eq + for GetBranchKeyIdFromDdbKeyOutput {} - impl Hash - for GetEncryptedDataKeyDescriptionOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => { - Hash::hash(EncryptedDataKeyDescriptionOutput, _state) - }, - } - } - } + impl Hash + for GetBranchKeyIdFromDdbKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput{branchKeyId, } => { + Hash::hash(branchKeyId, _state) + }, + } + } + } - impl Default - for GetEncryptedDataKeyDescriptionOutput { - fn default() -> GetEncryptedDataKeyDescriptionOutput { - GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { - EncryptedDataKeyDescriptionOutput: Default::default() - } - } - } + impl Default + for GetBranchKeyIdFromDdbKeyOutput { + fn default() -> GetBranchKeyIdFromDdbKeyOutput { + GetBranchKeyIdFromDdbKeyOutput::GetBranchKeyIdFromDdbKeyOutput { + branchKeyId: Default::default() + } + } + } - impl AsRef - for &GetEncryptedDataKeyDescriptionOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetBranchKeyIdFromDdbKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetEncryptedDataKeyDescriptionUnion { - header { - header: Sequence - }, - item { - item: Map, Rc> - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(275,3) + #[derive(PartialEq, Clone)] + pub enum GetEncryptedDataKeyDescriptionInput { + GetEncryptedDataKeyDescriptionInput { + input: Arc + } + } - impl GetEncryptedDataKeyDescriptionUnion { - pub fn header(&self) -> &Sequence { - match self { - GetEncryptedDataKeyDescriptionUnion::header{header, } => header, - GetEncryptedDataKeyDescriptionUnion::item{item, } => panic!("field does not exist on this variant"), - } - } - pub fn item(&self) -> &Map, Rc> { - match self { - GetEncryptedDataKeyDescriptionUnion::header{header, } => panic!("field does not exist on this variant"), - GetEncryptedDataKeyDescriptionUnion::item{item, } => item, - } - } - } + impl GetEncryptedDataKeyDescriptionInput { + /// Returns a borrow of the field input + pub fn input(&self) -> &Arc { + match self { + GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => input, + } + } + } - impl Debug - for GetEncryptedDataKeyDescriptionUnion { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetEncryptedDataKeyDescriptionInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetEncryptedDataKeyDescriptionUnion { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetEncryptedDataKeyDescriptionUnion::header{header, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionUnion.header(")?; - DafnyPrint::fmt_print(header, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - GetEncryptedDataKeyDescriptionUnion::item{item, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionUnion.item(")?; - DafnyPrint::fmt_print(item, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetEncryptedDataKeyDescriptionInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionInput.GetEncryptedDataKeyDescriptionInput(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetEncryptedDataKeyDescriptionUnion {} + impl Eq + for GetEncryptedDataKeyDescriptionInput {} - impl Hash - for GetEncryptedDataKeyDescriptionUnion { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetEncryptedDataKeyDescriptionUnion::header{header, } => { - Hash::hash(header, _state) - }, - GetEncryptedDataKeyDescriptionUnion::item{item, } => { - Hash::hash(item, _state) - }, - } - } - } + impl Hash + for GetEncryptedDataKeyDescriptionInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput{input, } => { + Hash::hash(input, _state) + }, + } + } + } - impl Default - for GetEncryptedDataKeyDescriptionUnion { - fn default() -> GetEncryptedDataKeyDescriptionUnion { - GetEncryptedDataKeyDescriptionUnion::header { - header: Default::default() - } - } - } + impl Default + for GetEncryptedDataKeyDescriptionInput { + fn default() -> GetEncryptedDataKeyDescriptionInput { + GetEncryptedDataKeyDescriptionInput::GetEncryptedDataKeyDescriptionInput { + input: Default::default() + } + } + } - impl AsRef - for &GetEncryptedDataKeyDescriptionUnion { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetEncryptedDataKeyDescriptionInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetPrefix { - GetPrefix { - length: i32 - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(278,3) + #[derive(PartialEq, Clone)] + pub enum GetEncryptedDataKeyDescriptionOutput { + GetEncryptedDataKeyDescriptionOutput { + EncryptedDataKeyDescriptionOutput: Sequence> + } + } - impl GetPrefix { - pub fn length(&self) -> &i32 { - match self { - GetPrefix::GetPrefix{length, } => length, - } - } - } + impl GetEncryptedDataKeyDescriptionOutput { + /// Returns a borrow of the field EncryptedDataKeyDescriptionOutput + pub fn EncryptedDataKeyDescriptionOutput(&self) -> &Sequence> { + match self { + GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => EncryptedDataKeyDescriptionOutput, + } + } + } - impl Debug - for GetPrefix { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetEncryptedDataKeyDescriptionOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetPrefix { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetPrefix::GetPrefix{length, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetPrefix.GetPrefix(")?; - DafnyPrint::fmt_print(length, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetEncryptedDataKeyDescriptionOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionOutput.GetEncryptedDataKeyDescriptionOutput(")?; + DafnyPrint::fmt_print(EncryptedDataKeyDescriptionOutput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetPrefix {} + impl Eq + for GetEncryptedDataKeyDescriptionOutput {} - impl Hash - for GetPrefix { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetPrefix::GetPrefix{length, } => { - Hash::hash(length, _state) - }, - } - } - } + impl Hash + for GetEncryptedDataKeyDescriptionOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput{EncryptedDataKeyDescriptionOutput, } => { + Hash::hash(EncryptedDataKeyDescriptionOutput, _state) + }, + } + } + } - impl Default - for GetPrefix { - fn default() -> GetPrefix { - GetPrefix::GetPrefix { - length: Default::default() - } - } - } + impl Default + for GetEncryptedDataKeyDescriptionOutput { + fn default() -> GetEncryptedDataKeyDescriptionOutput { + GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { + EncryptedDataKeyDescriptionOutput: Default::default() + } + } + } - impl AsRef - for &GetPrefix { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetEncryptedDataKeyDescriptionOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetSegment { - GetSegment { - split: Sequence, - index: i32 - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(281,3) + #[derive(PartialEq, Clone)] + pub enum GetEncryptedDataKeyDescriptionUnion { + header { + header: Sequence + }, + item { + item: Map, Arc> + } + } - impl GetSegment { - pub fn split(&self) -> &Sequence { - match self { - GetSegment::GetSegment{split, index, } => split, - } - } - pub fn index(&self) -> &i32 { - match self { - GetSegment::GetSegment{split, index, } => index, - } - } - } + impl GetEncryptedDataKeyDescriptionUnion { + /// Gets the field header for all enum members which have it + pub fn header(&self) -> &Sequence { + match self { + GetEncryptedDataKeyDescriptionUnion::header{header, } => header, + GetEncryptedDataKeyDescriptionUnion::item{item, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field item for all enum members which have it + pub fn item(&self) -> &Map, Arc> { + match self { + GetEncryptedDataKeyDescriptionUnion::header{header, } => panic!("field does not exist on this variant"), + GetEncryptedDataKeyDescriptionUnion::item{item, } => item, + } + } + } - impl Debug - for GetSegment { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetEncryptedDataKeyDescriptionUnion { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetSegment { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetSegment::GetSegment{split, index, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSegment.GetSegment(")?; - DafnyPrint::fmt_print(split, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(index, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetEncryptedDataKeyDescriptionUnion { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetEncryptedDataKeyDescriptionUnion::header{header, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionUnion.header(")?; + DafnyPrint::fmt_print(header, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + GetEncryptedDataKeyDescriptionUnion::item{item, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetEncryptedDataKeyDescriptionUnion.item(")?; + DafnyPrint::fmt_print(item, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetSegment {} + impl Eq + for GetEncryptedDataKeyDescriptionUnion {} + + impl Hash + for GetEncryptedDataKeyDescriptionUnion { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetEncryptedDataKeyDescriptionUnion::header{header, } => { + Hash::hash(header, _state) + }, + GetEncryptedDataKeyDescriptionUnion::item{item, } => { + Hash::hash(item, _state) + }, + } + } + } - impl Hash - for GetSegment { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetSegment::GetSegment{split, index, } => { - Hash::hash(split, _state); - Hash::hash(index, _state) - }, - } - } - } + impl Default + for GetEncryptedDataKeyDescriptionUnion { + fn default() -> GetEncryptedDataKeyDescriptionUnion { + GetEncryptedDataKeyDescriptionUnion::header { + header: Default::default() + } + } + } - impl Default - for GetSegment { - fn default() -> GetSegment { - GetSegment::GetSegment { - split: Default::default(), - index: Default::default() - } - } - } + impl AsRef + for GetEncryptedDataKeyDescriptionUnion { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GetSegment { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(284,3) + #[derive(PartialEq, Clone)] + pub enum GetPrefix { + GetPrefix { + length: i32 + } + } - #[derive(PartialEq, Clone)] - pub enum GetSegments { - GetSegments { - split: Sequence, - low: i32, - high: i32 - } - } - - impl GetSegments { - pub fn split(&self) -> &Sequence { - match self { - GetSegments::GetSegments{split, low, high, } => split, - } - } - pub fn low(&self) -> &i32 { - match self { - GetSegments::GetSegments{split, low, high, } => low, - } - } - pub fn high(&self) -> &i32 { - match self { - GetSegments::GetSegments{split, low, high, } => high, - } - } - } - - impl Debug - for GetSegments { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for GetSegments { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetSegments::GetSegments{split, low, high, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSegments.GetSegments(")?; - DafnyPrint::fmt_print(split, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(low, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(high, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl GetPrefix { + /// Returns a borrow of the field length + pub fn length(&self) -> &i32 { + match self { + GetPrefix::GetPrefix{length, } => length, + } + } + } - impl Eq - for GetSegments {} + impl Debug + for GetPrefix { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for GetSegments { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetSegments::GetSegments{split, low, high, } => { - Hash::hash(split, _state); - Hash::hash(low, _state); - Hash::hash(high, _state) - }, - } - } - } + impl DafnyPrint + for GetPrefix { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetPrefix::GetPrefix{length, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetPrefix.GetPrefix(")?; + DafnyPrint::fmt_print(length, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for GetSegments { - fn default() -> GetSegments { - GetSegments::GetSegments { - split: Default::default(), - low: Default::default(), - high: Default::default() - } - } - } + impl Eq + for GetPrefix {} - impl AsRef - for &GetSegments { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for GetPrefix { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetPrefix::GetPrefix{length, } => { + Hash::hash(length, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetSubstring { - GetSubstring { - low: i32, - high: i32 - } - } + impl Default + for GetPrefix { + fn default() -> GetPrefix { + GetPrefix::GetPrefix { + length: Default::default() + } + } + } - impl GetSubstring { - pub fn low(&self) -> &i32 { - match self { - GetSubstring::GetSubstring{low, high, } => low, - } - } - pub fn high(&self) -> &i32 { - match self { - GetSubstring::GetSubstring{low, high, } => high, - } - } - } + impl AsRef + for GetPrefix { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for GetSubstring { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(287,3) + #[derive(PartialEq, Clone)] + pub enum GetSegment { + GetSegment { + split: Sequence, + index: i32 + } + } - impl DafnyPrint - for GetSubstring { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetSubstring::GetSubstring{low, high, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSubstring.GetSubstring(")?; - DafnyPrint::fmt_print(low, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(high, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl GetSegment { + /// Returns a borrow of the field split + pub fn split(&self) -> &Sequence { + match self { + GetSegment::GetSegment{split, index, } => split, + } + } + /// Returns a borrow of the field index + pub fn index(&self) -> &i32 { + match self { + GetSegment::GetSegment{split, index, } => index, + } + } + } - impl Eq - for GetSubstring {} + impl Debug + for GetSegment { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for GetSubstring { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetSubstring::GetSubstring{low, high, } => { - Hash::hash(low, _state); - Hash::hash(high, _state) - }, - } - } - } + impl DafnyPrint + for GetSegment { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetSegment::GetSegment{split, index, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSegment.GetSegment(")?; + DafnyPrint::fmt_print(split, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(index, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for GetSubstring { - fn default() -> GetSubstring { - GetSubstring::GetSubstring { - low: Default::default(), - high: Default::default() - } - } - } + impl Eq + for GetSegment {} + + impl Hash + for GetSegment { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetSegment::GetSegment{split, index, } => { + Hash::hash(split, _state); + Hash::hash(index, _state) + }, + } + } + } - impl AsRef - for &GetSubstring { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for GetSegment { + fn default() -> GetSegment { + GetSegment::GetSegment { + split: Default::default(), + index: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetSuffix { - GetSuffix { - length: i32 - } - } + impl AsRef + for GetSegment { + fn as_ref(&self) -> &Self { + self + } + } - impl GetSuffix { - pub fn length(&self) -> &i32 { - match self { - GetSuffix::GetSuffix{length, } => length, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(291,3) + #[derive(PartialEq, Clone)] + pub enum GetSegments { + GetSegments { + split: Sequence, + low: i32, + high: i32 + } + } - impl Debug - for GetSuffix { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GetSegments { + /// Returns a borrow of the field split + pub fn split(&self) -> &Sequence { + match self { + GetSegments::GetSegments{split, low, high, } => split, + } + } + /// Returns a borrow of the field low + pub fn low(&self) -> &i32 { + match self { + GetSegments::GetSegments{split, low, high, } => low, + } + } + /// Returns a borrow of the field high + pub fn high(&self) -> &i32 { + match self { + GetSegments::GetSegments{split, low, high, } => high, + } + } + } - impl DafnyPrint - for GetSuffix { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetSuffix::GetSuffix{length, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSuffix.GetSuffix(")?; - DafnyPrint::fmt_print(length, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GetSegments { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GetSuffix {} + impl DafnyPrint + for GetSegments { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetSegments::GetSegments{split, low, high, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSegments.GetSegments(")?; + DafnyPrint::fmt_print(split, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(low, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(high, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GetSuffix { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetSuffix::GetSuffix{length, } => { - Hash::hash(length, _state) - }, - } - } - } + impl Eq + for GetSegments {} + + impl Hash + for GetSegments { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetSegments::GetSegments{split, low, high, } => { + Hash::hash(split, _state); + Hash::hash(low, _state); + Hash::hash(high, _state) + }, + } + } + } - impl Default - for GetSuffix { - fn default() -> GetSuffix { - GetSuffix::GetSuffix { - length: Default::default() - } - } - } + impl Default + for GetSegments { + fn default() -> GetSegments { + GetSegments::GetSegments { + split: Default::default(), + low: Default::default(), + high: Default::default() + } + } + } - impl AsRef - for &GetSuffix { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetSegments { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum Insert { - Insert { - literal: Sequence - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(296,3) + #[derive(PartialEq, Clone)] + pub enum GetSubstring { + GetSubstring { + low: i32, + high: i32 + } + } - impl Insert { - pub fn literal(&self) -> &Sequence { - match self { - Insert::Insert{literal, } => literal, - } - } - } + impl GetSubstring { + /// Returns a borrow of the field low + pub fn low(&self) -> &i32 { + match self { + GetSubstring::GetSubstring{low, high, } => low, + } + } + /// Returns a borrow of the field high + pub fn high(&self) -> &i32 { + match self { + GetSubstring::GetSubstring{low, high, } => high, + } + } + } - impl Debug - for Insert { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetSubstring { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for Insert { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Insert::Insert{literal, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Insert.Insert(")?; - DafnyPrint::fmt_print(literal, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetSubstring { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetSubstring::GetSubstring{low, high, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSubstring.GetSubstring(")?; + DafnyPrint::fmt_print(low, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(high, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for Insert {} + impl Eq + for GetSubstring {} + + impl Hash + for GetSubstring { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetSubstring::GetSubstring{low, high, } => { + Hash::hash(low, _state); + Hash::hash(high, _state) + }, + } + } + } - impl Hash - for Insert { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Insert::Insert{literal, } => { - Hash::hash(literal, _state) - }, - } - } - } + impl Default + for GetSubstring { + fn default() -> GetSubstring { + GetSubstring::GetSubstring { + low: Default::default(), + high: Default::default() + } + } + } - impl Default - for Insert { - fn default() -> Insert { - Insert::Insert { - literal: Default::default() - } - } - } + impl AsRef + for GetSubstring { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &Insert { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(300,3) + #[derive(PartialEq, Clone)] + pub enum GetSuffix { + GetSuffix { + length: i32 + } + } - pub struct ILegacyDynamoDbEncryptorCallHistory {} + impl GetSuffix { + /// Returns a borrow of the field length + pub fn length(&self) -> &i32 { + match self { + GetSuffix::GetSuffix{length, } => length, + } + } + } - impl ILegacyDynamoDbEncryptorCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl Debug + for GetSuffix { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ILegacyDynamoDbEncryptorCallHistory { - UpcastObjectFn!(dyn Any); - } + impl DafnyPrint + for GetSuffix { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetSuffix::GetSuffix{length, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.GetSuffix.GetSuffix(")?; + DafnyPrint::fmt_print(length, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub trait ILegacyDynamoDbEncryptor: Any + UpcastObject {} + impl Eq + for GetSuffix {} - #[derive(PartialEq, Clone)] - pub enum LegacyOverride { - LegacyOverride { - policy: Rc, - encryptor: Object, - attributeActionsOnEncrypt: Map, Rc>, - defaultAttributeFlag: Rc>> - } - } + impl Hash + for GetSuffix { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetSuffix::GetSuffix{length, } => { + Hash::hash(length, _state) + }, + } + } + } - impl LegacyOverride { - pub fn policy(&self) -> &Rc { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => policy, - } - } - pub fn encryptor(&self) -> &Object { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => encryptor, - } - } - pub fn attributeActionsOnEncrypt(&self) -> &Map, Rc> { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => attributeActionsOnEncrypt, - } - } - pub fn defaultAttributeFlag(&self) -> &Rc>> { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => defaultAttributeFlag, - } - } - } + impl Default + for GetSuffix { + fn default() -> GetSuffix { + GetSuffix::GetSuffix { + length: Default::default() + } + } + } - impl Debug - for LegacyOverride { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GetSuffix { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for LegacyOverride { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyOverride.LegacyOverride(")?; - DafnyPrint::fmt_print(policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptor, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(defaultAttributeFlag, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(303,3) + #[derive(PartialEq, Clone)] + pub enum Insert { + Insert { + literal: Sequence + } + } - impl Eq - for LegacyOverride {} + impl Insert { + /// Returns a borrow of the field literal + pub fn literal(&self) -> &Sequence { + match self { + Insert::Insert{literal, } => literal, + } + } + } - impl Hash - for LegacyOverride { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => { - Hash::hash(policy, _state); - Hash::hash(encryptor, _state); - Hash::hash(attributeActionsOnEncrypt, _state); - Hash::hash(defaultAttributeFlag, _state) - }, - } - } - } + impl Debug + for Insert { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for LegacyOverride { - fn default() -> LegacyOverride { - LegacyOverride::LegacyOverride { - policy: Default::default(), - encryptor: Default::default(), - attributeActionsOnEncrypt: Default::default(), - defaultAttributeFlag: Default::default() - } - } - } + impl DafnyPrint + for Insert { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Insert::Insert{literal, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Insert.Insert(")?; + DafnyPrint::fmt_print(literal, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &LegacyOverride { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for Insert {} - #[derive(PartialEq, Clone)] - pub enum LegacyPolicy { - FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, - FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, - FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT {} - } + impl Hash + for Insert { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Insert::Insert{literal, } => { + Hash::hash(literal, _state) + }, + } + } + } - impl LegacyPolicy {} + impl Default + for Insert { + fn default() -> Insert { + Insert::Insert { + literal: Default::default() + } + } + } - impl Debug - for LegacyPolicy { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for Insert { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for LegacyPolicy { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORCE__LEGACY__ENCRYPT__ALLOW__LEGACY__DECRYPT")?; - Ok(()) - }, - LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORBID__LEGACY__ENCRYPT__ALLOW__LEGACY__DECRYPT")?; - Ok(()) - }, - LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORBID__LEGACY__ENCRYPT__FORBID__LEGACY__DECRYPT")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(306,3) + pub struct ILegacyDynamoDbEncryptorCallHistory {} - impl LegacyPolicy { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}), Rc::new(LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}), Rc::new(LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT {})].iter() - } - } + impl ILegacyDynamoDbEncryptorCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Eq - for LegacyPolicy {} + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::ILegacyDynamoDbEncryptorCallHistory { + UpcastObjectFn!(DynAny); + } - impl Hash - for LegacyPolicy { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(312,3) + pub trait ILegacyDynamoDbEncryptor: Any + Sync + Send + UpcastObject {} + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(341,3) + #[derive(PartialEq, Clone)] + pub enum LegacyOverride { + LegacyOverride { + policy: Arc, + encryptor: Object, + attributeActionsOnEncrypt: Map, Arc>, + defaultAttributeFlag: Arc>> + } + } - }, - LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { + impl LegacyOverride { + /// Returns a borrow of the field policy + pub fn policy(&self) -> &Arc { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => policy, + } + } + /// Returns a borrow of the field encryptor + pub fn encryptor(&self) -> &Object { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => encryptor, + } + } + /// Returns a borrow of the field attributeActionsOnEncrypt + pub fn attributeActionsOnEncrypt(&self) -> &Map, Arc> { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => attributeActionsOnEncrypt, + } + } + /// Returns a borrow of the field defaultAttributeFlag + pub fn defaultAttributeFlag(&self) -> &Arc>> { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => defaultAttributeFlag, + } + } + } - }, - LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT{} => { + impl Debug + for LegacyOverride { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for LegacyOverride { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyOverride.LegacyOverride(")?; + DafnyPrint::fmt_print(policy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptor, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(defaultAttributeFlag, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for LegacyPolicy { - fn default() -> LegacyPolicy { - LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {} - } - } + impl Eq + for LegacyOverride {} + + impl Hash + for LegacyOverride { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + LegacyOverride::LegacyOverride{policy, encryptor, attributeActionsOnEncrypt, defaultAttributeFlag, } => { + Hash::hash(policy, _state); + Hash::hash(encryptor, _state); + Hash::hash(attributeActionsOnEncrypt, _state); + Hash::hash(defaultAttributeFlag, _state) + }, + } + } + } - impl AsRef - for &LegacyPolicy { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for LegacyOverride { + fn default() -> LegacyOverride { + LegacyOverride::LegacyOverride { + policy: Default::default(), + encryptor: Default::default(), + attributeActionsOnEncrypt: Default::default(), + defaultAttributeFlag: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Lower { - Lower {} - } + impl AsRef + for LegacyOverride { + fn as_ref(&self) -> &Self { + self + } + } - impl Lower {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(347,3) + #[derive(PartialEq, Clone)] + pub enum LegacyPolicy { + FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, + FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}, + FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT {} + } - impl Debug - for Lower { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl LegacyPolicy {} - impl DafnyPrint - for Lower { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Lower::Lower{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Lower.Lower")?; - Ok(()) - }, - } - } - } + impl Debug + for LegacyPolicy { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Lower { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(Lower::Lower {})].iter() - } - } + impl DafnyPrint + for LegacyPolicy { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORCE__LEGACY__ENCRYPT__ALLOW__LEGACY__DECRYPT")?; + Ok(()) + }, + LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORBID__LEGACY__ENCRYPT__ALLOW__LEGACY__DECRYPT")?; + Ok(()) + }, + LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.LegacyPolicy.FORBID__LEGACY__ENCRYPT__FORBID__LEGACY__DECRYPT")?; + Ok(()) + }, + } + } + } - impl Eq - for Lower {} + impl LegacyPolicy { + /// Enumerates all possible values of LegacyPolicy + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}), Arc::new(LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {}), Arc::new(LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT {})].iter() + } + } - impl Hash - for Lower { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Lower::Lower{} => { + impl Eq + for LegacyPolicy {} - }, - } - } - } + impl Hash + for LegacyPolicy { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { - impl Default - for Lower { - fn default() -> Lower { - Lower::Lower {} - } - } + }, + LegacyPolicy::FORBID_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{} => { - impl AsRef - for &Lower { - fn as_ref(&self) -> Self { - self - } - } + }, + LegacyPolicy::FORBID_LEGACY_ENCRYPT_FORBID_LEGACY_DECRYPT{} => { - #[derive(PartialEq, Clone)] - pub enum MultiKeyStore { - MultiKeyStore { - keyFieldName: Sequence, - cacheTTL: i32, - cache: Rc>> - } - } + }, + } + } + } - impl MultiKeyStore { - pub fn keyFieldName(&self) -> &Sequence { - match self { - MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, } => keyFieldName, - } - } - pub fn cacheTTL(&self) -> &i32 { - match self { - MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, } => cacheTTL, - } - } - pub fn cache(&self) -> &Rc>> { - match self { - MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, } => cache, - } - } - } + impl Default + for LegacyPolicy { + fn default() -> LegacyPolicy { + LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT {} + } + } - impl Debug - for MultiKeyStore { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for LegacyPolicy { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for MultiKeyStore { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.MultiKeyStore.MultiKeyStore(")?; - DafnyPrint::fmt_print(keyFieldName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cacheTTL, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cache, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(351,3) + #[derive(PartialEq, Clone)] + pub enum Lower { + Lower {} + } - impl Eq - for MultiKeyStore {} + impl Lower {} - impl Hash - for MultiKeyStore { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, } => { - Hash::hash(keyFieldName, _state); - Hash::hash(cacheTTL, _state); - Hash::hash(cache, _state) - }, - } - } - } + impl Debug + for Lower { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for MultiKeyStore { - fn default() -> MultiKeyStore { - MultiKeyStore::MultiKeyStore { - keyFieldName: Default::default(), - cacheTTL: Default::default(), - cache: Default::default() - } - } - } + impl DafnyPrint + for Lower { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Lower::Lower{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Lower.Lower")?; + Ok(()) + }, + } + } + } - impl AsRef - for &MultiKeyStore { - fn as_ref(&self) -> Self { - self - } - } + impl Lower { + /// Enumerates all possible values of Lower + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(Lower::Lower {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum PartOnly { - PartOnly {} - } + impl Eq + for Lower {} - impl PartOnly {} + impl Hash + for Lower { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Lower::Lower{} => { - impl Debug - for PartOnly { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for PartOnly { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PartOnly::PartOnly{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PartOnly.PartOnly")?; - Ok(()) - }, - } - } - } + impl Default + for Lower { + fn default() -> Lower { + Lower::Lower {} + } + } - impl PartOnly { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(PartOnly::PartOnly {})].iter() - } - } + impl AsRef + for Lower { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for PartOnly {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(354,3) + #[derive(PartialEq, Clone)] + pub enum MultiKeyStore { + MultiKeyStore { + keyFieldName: Sequence, + cacheTTL: i32, + cache: Arc>>, + partitionId: Arc>> + } + } - impl Hash - for PartOnly { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PartOnly::PartOnly{} => { + impl MultiKeyStore { + /// Returns a borrow of the field keyFieldName + pub fn keyFieldName(&self) -> &Sequence { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => keyFieldName, + } + } + /// Returns a borrow of the field cacheTTL + pub fn cacheTTL(&self) -> &i32 { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => cacheTTL, + } + } + /// Returns a borrow of the field cache + pub fn cache(&self) -> &Arc>> { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => cache, + } + } + /// Returns a borrow of the field partitionId + pub fn partitionId(&self) -> &Arc>> { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => partitionId, + } + } + } - }, - } - } - } + impl Debug + for MultiKeyStore { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for PartOnly { - fn default() -> PartOnly { - PartOnly::PartOnly {} - } - } + impl DafnyPrint + for MultiKeyStore { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.MultiKeyStore.MultiKeyStore(")?; + DafnyPrint::fmt_print(keyFieldName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cacheTTL, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cache, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partitionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &PartOnly { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for MultiKeyStore {} + + impl Hash + for MultiKeyStore { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + MultiKeyStore::MultiKeyStore{keyFieldName, cacheTTL, cache, partitionId, } => { + Hash::hash(keyFieldName, _state); + Hash::hash(cacheTTL, _state); + Hash::hash(cache, _state); + Hash::hash(partitionId, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PlaintextOverride { - FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, - FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, - FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {} - } + impl Default + for MultiKeyStore { + fn default() -> MultiKeyStore { + MultiKeyStore::MultiKeyStore { + keyFieldName: Default::default(), + cacheTTL: Default::default(), + cache: Default::default(), + partitionId: Default::default() + } + } + } - impl PlaintextOverride {} + impl AsRef + for MultiKeyStore { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for PlaintextOverride { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(360,3) + #[derive(PartialEq, Clone)] + pub enum PartOnly { + PartOnly {} + } - impl DafnyPrint - for PlaintextOverride { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORCE__PLAINTEXT__WRITE__ALLOW__PLAINTEXT__READ")?; - Ok(()) - }, - PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORBID__PLAINTEXT__WRITE__ALLOW__PLAINTEXT__READ")?; - Ok(()) - }, - PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORBID__PLAINTEXT__WRITE__FORBID__PLAINTEXT__READ")?; - Ok(()) - }, - } - } - } + impl PartOnly {} - impl PlaintextOverride { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}), Rc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}), Rc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {})].iter() - } - } + impl Debug + for PartOnly { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for PlaintextOverride {} + impl DafnyPrint + for PartOnly { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PartOnly::PartOnly{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PartOnly.PartOnly")?; + Ok(()) + }, + } + } + } - impl Hash - for PlaintextOverride { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { + impl PartOnly { + /// Enumerates all possible values of PartOnly + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(PartOnly::PartOnly {})].iter() + } + } - }, - PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { + impl Eq + for PartOnly {} - }, - PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ{} => { + impl Hash + for PartOnly { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PartOnly::PartOnly{} => { - }, - } - } - } + }, + } + } + } - impl Default - for PlaintextOverride { - fn default() -> PlaintextOverride { - PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {} - } - } + impl Default + for PartOnly { + fn default() -> PartOnly { + PartOnly::PartOnly {} + } + } - impl AsRef - for &PlaintextOverride { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for PartOnly { + fn as_ref(&self) -> &Self { + self + } + } - pub type Prefix = Sequence; + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(363,3) + #[derive(PartialEq, Clone)] + pub enum PlaintextOverride { + FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, + FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}, + FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {} + } - #[derive(PartialEq, Clone)] - pub enum SearchConfig { - SearchConfig { - versions: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersionList, - writeVersion: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber - } - } + impl PlaintextOverride {} - impl SearchConfig { - pub fn versions(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersionList { - match self { - SearchConfig::SearchConfig{versions, writeVersion, } => versions, - } - } - pub fn writeVersion(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber { - match self { - SearchConfig::SearchConfig{versions, writeVersion, } => writeVersion, - } - } - } + impl Debug + for PlaintextOverride { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for SearchConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for PlaintextOverride { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORCE__PLAINTEXT__WRITE__ALLOW__PLAINTEXT__READ")?; + Ok(()) + }, + PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORBID__PLAINTEXT__WRITE__ALLOW__PLAINTEXT__READ")?; + Ok(()) + }, + PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.PlaintextOverride.FORBID__PLAINTEXT__WRITE__FORBID__PLAINTEXT__READ")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for SearchConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SearchConfig::SearchConfig{versions, writeVersion, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SearchConfig.SearchConfig(")?; - DafnyPrint::fmt_print(versions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(writeVersion, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl PlaintextOverride { + /// Enumerates all possible values of PlaintextOverride + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}), Arc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {}), Arc::new(PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ {})].iter() + } + } - impl Eq - for SearchConfig {} + impl Eq + for PlaintextOverride {} - impl Hash - for SearchConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SearchConfig::SearchConfig{versions, writeVersion, } => { - Hash::hash(versions, _state); - Hash::hash(writeVersion, _state) - }, - } - } - } + impl Hash + for PlaintextOverride { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { - impl Default - for SearchConfig { - fn default() -> SearchConfig { - SearchConfig::SearchConfig { - versions: Default::default(), - writeVersion: Default::default() - } - } - } + }, + PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{} => { - impl AsRef - for &SearchConfig { - fn as_ref(&self) -> Self { - self - } - } + }, + PlaintextOverride::FORBID_PLAINTEXT_WRITE_FORBID_PLAINTEXT_READ{} => { - #[derive(PartialEq, Clone)] - pub enum Shared { - Shared { - other: Sequence - } - } + }, + } + } + } - impl Shared { - pub fn other(&self) -> &Sequence { - match self { - Shared::Shared{other, } => other, - } - } - } + impl Default + for PlaintextOverride { + fn default() -> PlaintextOverride { + PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ {} + } + } - impl Debug - for Shared { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for PlaintextOverride { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for Shared { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Shared::Shared{other, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Shared.Shared(")?; - DafnyPrint::fmt_print(other, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(367,3) + pub type Prefix = Sequence; - impl Eq - for Shared {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(371,3) + #[derive(PartialEq, Clone)] + pub enum SearchConfig { + SearchConfig { + versions: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersionList, + writeVersion: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber + } + } - impl Hash - for Shared { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Shared::Shared{other, } => { - Hash::hash(other, _state) - }, - } - } - } + impl SearchConfig { + /// Returns a borrow of the field versions + pub fn versions(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconVersionList { + match self { + SearchConfig::SearchConfig{versions, writeVersion, } => versions, + } + } + /// Returns a borrow of the field writeVersion + pub fn writeVersion(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VersionNumber { + match self { + SearchConfig::SearchConfig{versions, writeVersion, } => writeVersion, + } + } + } - impl Default - for Shared { - fn default() -> Shared { - Shared::Shared { - other: Default::default() - } - } - } + impl Debug + for SearchConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &Shared { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for SearchConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SearchConfig::SearchConfig{versions, writeVersion, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SearchConfig.SearchConfig(")?; + DafnyPrint::fmt_print(versions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(writeVersion, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum SharedSet { - SharedSet { - other: Sequence - } - } + impl Eq + for SearchConfig {} + + impl Hash + for SearchConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SearchConfig::SearchConfig{versions, writeVersion, } => { + Hash::hash(versions, _state); + Hash::hash(writeVersion, _state) + }, + } + } + } - impl SharedSet { - pub fn other(&self) -> &Sequence { - match self { - SharedSet::SharedSet{other, } => other, - } - } - } + impl Default + for SearchConfig { + fn default() -> SearchConfig { + SearchConfig::SearchConfig { + versions: Default::default(), + writeVersion: Default::default() + } + } + } - impl Debug - for SharedSet { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for SearchConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for SharedSet { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SharedSet::SharedSet{other, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SharedSet.SharedSet(")?; - DafnyPrint::fmt_print(other, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(375,3) + #[derive(PartialEq, Clone)] + pub enum Shared { + Shared { + other: Sequence + } + } - impl Eq - for SharedSet {} + impl Shared { + /// Returns a borrow of the field other + pub fn other(&self) -> &Sequence { + match self { + Shared::Shared{other, } => other, + } + } + } - impl Hash - for SharedSet { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SharedSet::SharedSet{other, } => { - Hash::hash(other, _state) - }, - } - } - } + impl Debug + for Shared { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for SharedSet { - fn default() -> SharedSet { - SharedSet::SharedSet { - other: Default::default() - } - } - } + impl DafnyPrint + for Shared { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Shared::Shared{other, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Shared.Shared(")?; + DafnyPrint::fmt_print(other, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &SharedSet { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for Shared {} - #[derive(PartialEq, Clone)] - pub enum SignedPart { - SignedPart { - name: Sequence, - prefix: Sequence, - loc: Rc>> - } - } + impl Hash + for Shared { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Shared::Shared{other, } => { + Hash::hash(other, _state) + }, + } + } + } - impl SignedPart { - pub fn name(&self) -> &Sequence { - match self { - SignedPart::SignedPart{name, prefix, loc, } => name, - } - } - pub fn prefix(&self) -> &Sequence { - match self { - SignedPart::SignedPart{name, prefix, loc, } => prefix, - } - } - pub fn loc(&self) -> &Rc>> { - match self { - SignedPart::SignedPart{name, prefix, loc, } => loc, - } - } - } + impl Default + for Shared { + fn default() -> Shared { + Shared::Shared { + other: Default::default() + } + } + } - impl Debug - for SignedPart { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for Shared { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for SignedPart { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SignedPart::SignedPart{name, prefix, loc, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SignedPart.SignedPart(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(prefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(loc, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(378,3) + #[derive(PartialEq, Clone)] + pub enum SharedSet { + SharedSet { + other: Sequence + } + } - impl Eq - for SignedPart {} + impl SharedSet { + /// Returns a borrow of the field other + pub fn other(&self) -> &Sequence { + match self { + SharedSet::SharedSet{other, } => other, + } + } + } - impl Hash - for SignedPart { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SignedPart::SignedPart{name, prefix, loc, } => { - Hash::hash(name, _state); - Hash::hash(prefix, _state); - Hash::hash(loc, _state) - }, - } - } - } + impl Debug + for SharedSet { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for SignedPart { - fn default() -> SignedPart { - SignedPart::SignedPart { - name: Default::default(), - prefix: Default::default(), - loc: Default::default() - } - } - } + impl DafnyPrint + for SharedSet { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SharedSet::SharedSet{other, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SharedSet.SharedSet(")?; + DafnyPrint::fmt_print(other, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &SignedPart { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for SharedSet {} - pub type SignedPartsList = Sequence>; + impl Hash + for SharedSet { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SharedSet::SharedSet{other, } => { + Hash::hash(other, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum SingleKeyStore { - SingleKeyStore { - keyId: Sequence, - cacheTTL: i32 - } - } + impl Default + for SharedSet { + fn default() -> SharedSet { + SharedSet::SharedSet { + other: Default::default() + } + } + } - impl SingleKeyStore { - pub fn keyId(&self) -> &Sequence { - match self { - SingleKeyStore::SingleKeyStore{keyId, cacheTTL, } => keyId, - } - } - pub fn cacheTTL(&self) -> &i32 { - match self { - SingleKeyStore::SingleKeyStore{keyId, cacheTTL, } => cacheTTL, - } - } - } + impl AsRef + for SharedSet { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for SingleKeyStore { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(381,3) + #[derive(PartialEq, Clone)] + pub enum SignedPart { + SignedPart { + name: Sequence, + prefix: Sequence, + loc: Arc>> + } + } - impl DafnyPrint - for SingleKeyStore { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SingleKeyStore::SingleKeyStore{keyId, cacheTTL, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SingleKeyStore.SingleKeyStore(")?; - DafnyPrint::fmt_print(keyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cacheTTL, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl SignedPart { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + SignedPart::SignedPart{name, prefix, loc, } => name, + } + } + /// Returns a borrow of the field prefix + pub fn prefix(&self) -> &Sequence { + match self { + SignedPart::SignedPart{name, prefix, loc, } => prefix, + } + } + /// Returns a borrow of the field loc + pub fn loc(&self) -> &Arc>> { + match self { + SignedPart::SignedPart{name, prefix, loc, } => loc, + } + } + } - impl Eq - for SingleKeyStore {} + impl Debug + for SignedPart { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for SingleKeyStore { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SingleKeyStore::SingleKeyStore{keyId, cacheTTL, } => { - Hash::hash(keyId, _state); - Hash::hash(cacheTTL, _state) - }, - } - } - } - - impl Default - for SingleKeyStore { - fn default() -> SingleKeyStore { - SingleKeyStore::SingleKeyStore { - keyId: Default::default(), - cacheTTL: Default::default() - } - } - } - - impl AsRef - for &SingleKeyStore { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum StandardBeacon { - StandardBeacon { - name: Sequence, - length: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconBitLength, - loc: Rc>>, - style: Rc>> - } - } - - impl StandardBeacon { - pub fn name(&self) -> &Sequence { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => name, - } - } - pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconBitLength { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => length, - } - } - pub fn loc(&self) -> &Rc>> { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => loc, - } - } - pub fn style(&self) -> &Rc>> { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => style, - } - } - } - - impl Debug - for StandardBeacon { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for SignedPart { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SignedPart::SignedPart{name, prefix, loc, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SignedPart.SignedPart(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(prefix, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(loc, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for StandardBeacon { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.StandardBeacon.StandardBeacon(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(length, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(loc, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(style, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for SignedPart {} + + impl Hash + for SignedPart { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SignedPart::SignedPart{name, prefix, loc, } => { + Hash::hash(name, _state); + Hash::hash(prefix, _state); + Hash::hash(loc, _state) + }, + } + } + } - impl Eq - for StandardBeacon {} + impl Default + for SignedPart { + fn default() -> SignedPart { + SignedPart::SignedPart { + name: Default::default(), + prefix: Default::default(), + loc: Default::default() + } + } + } - impl Hash - for StandardBeacon { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StandardBeacon::StandardBeacon{name, length, loc, style, } => { - Hash::hash(name, _state); - Hash::hash(length, _state); - Hash::hash(loc, _state); - Hash::hash(style, _state) - }, - } - } - } + impl AsRef + for SignedPart { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for StandardBeacon { - fn default() -> StandardBeacon { - StandardBeacon::StandardBeacon { - name: Default::default(), - length: Default::default(), - loc: Default::default(), - style: Default::default() - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(386,3) + pub type SignedPartsList = Sequence>; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(390,3) + #[derive(PartialEq, Clone)] + pub enum SingleKeyStore { + SingleKeyStore { + keyId: Sequence, + cacheTTL: i32, + cache: Arc>>, + partitionId: Arc>> + } + } - impl AsRef - for &StandardBeacon { - fn as_ref(&self) -> Self { - self - } - } - - pub type StandardBeaconList = Sequence>; + impl SingleKeyStore { + /// Returns a borrow of the field keyId + pub fn keyId(&self) -> &Sequence { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => keyId, + } + } + /// Returns a borrow of the field cacheTTL + pub fn cacheTTL(&self) -> &i32 { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => cacheTTL, + } + } + /// Returns a borrow of the field cache + pub fn cache(&self) -> &Arc>> { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => cache, + } + } + /// Returns a borrow of the field partitionId + pub fn partitionId(&self) -> &Arc>> { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => partitionId, + } + } + } - pub type TerminalLocation = Sequence; + impl Debug + for SingleKeyStore { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum Upper { - Upper {} - } + impl DafnyPrint + for SingleKeyStore { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.SingleKeyStore.SingleKeyStore(")?; + DafnyPrint::fmt_print(keyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cacheTTL, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cache, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partitionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Upper {} + impl Eq + for SingleKeyStore {} + + impl Hash + for SingleKeyStore { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SingleKeyStore::SingleKeyStore{keyId, cacheTTL, cache, partitionId, } => { + Hash::hash(keyId, _state); + Hash::hash(cacheTTL, _state); + Hash::hash(cache, _state); + Hash::hash(partitionId, _state) + }, + } + } + } - impl Debug - for Upper { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for SingleKeyStore { + fn default() -> SingleKeyStore { + SingleKeyStore::SingleKeyStore { + keyId: Default::default(), + cacheTTL: Default::default(), + cache: Default::default(), + partitionId: Default::default() + } + } + } - impl DafnyPrint - for Upper { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Upper::Upper{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Upper.Upper")?; - Ok(()) - }, - } - } - } + impl AsRef + for SingleKeyStore { + fn as_ref(&self) -> &Self { + self + } + } - impl Upper { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(Upper::Upper {})].iter() - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(396,3) + #[derive(PartialEq, Clone)] + pub enum StandardBeacon { + StandardBeacon { + name: Sequence, + length: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconBitLength, + loc: Arc>>, + style: Arc>> + } + } - impl Eq - for Upper {} + impl StandardBeacon { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => name, + } + } + /// Returns a borrow of the field length + pub fn length(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::BeaconBitLength { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => length, + } + } + /// Returns a borrow of the field loc + pub fn loc(&self) -> &Arc>> { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => loc, + } + } + /// Returns a borrow of the field style + pub fn style(&self) -> &Arc>> { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => style, + } + } + } - impl Hash - for Upper { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Upper::Upper{} => { + impl Debug + for StandardBeacon { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for StandardBeacon { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.StandardBeacon.StandardBeacon(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(length, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(loc, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(style, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for Upper { - fn default() -> Upper { - Upper::Upper {} - } - } + impl Eq + for StandardBeacon {} + + impl Hash + for StandardBeacon { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StandardBeacon::StandardBeacon{name, length, loc, style, } => { + Hash::hash(name, _state); + Hash::hash(length, _state); + Hash::hash(loc, _state); + Hash::hash(style, _state) + }, + } + } + } - impl AsRef - for &Upper { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for StandardBeacon { + fn default() -> StandardBeacon { + StandardBeacon::StandardBeacon { + name: Default::default(), + length: Default::default(), + loc: Default::default(), + style: Default::default() + } + } + } - pub type VersionNumber = i32; + impl AsRef + for StandardBeacon { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum VirtualField { - VirtualField { - name: Sequence, - parts: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPartList - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(402,3) + pub type StandardBeaconList = Sequence>; - impl VirtualField { - pub fn name(&self) -> &Sequence { - match self { - VirtualField::VirtualField{name, parts, } => name, - } - } - pub fn parts(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPartList { - match self { - VirtualField::VirtualField{name, parts, } => parts, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(406,3) + pub type TerminalLocation = Sequence; - impl Debug - for VirtualField { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(410,3) + #[derive(PartialEq, Clone)] + pub enum Upper { + Upper {} + } - impl DafnyPrint - for VirtualField { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VirtualField::VirtualField{name, parts, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualField.VirtualField(")?; - DafnyPrint::fmt_print(name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parts, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Upper {} - impl Eq - for VirtualField {} + impl Debug + for Upper { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for VirtualField { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VirtualField::VirtualField{name, parts, } => { - Hash::hash(name, _state); - Hash::hash(parts, _state) - }, - } - } - } + impl DafnyPrint + for Upper { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Upper::Upper{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Upper.Upper")?; + Ok(()) + }, + } + } + } - impl Default - for VirtualField { - fn default() -> VirtualField { - VirtualField::VirtualField { - name: Default::default(), - parts: Default::default() - } - } - } + impl Upper { + /// Enumerates all possible values of Upper + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(Upper::Upper {})].iter() + } + } - impl AsRef - for &VirtualField { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for Upper {} - pub type VirtualFieldList = Sequence>; + impl Hash + for Upper { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Upper::Upper{} => { - #[derive(PartialEq, Clone)] - pub enum VirtualPart { - VirtualPart { - loc: Sequence, - trans: Rc> - } - } + }, + } + } + } - impl VirtualPart { - pub fn loc(&self) -> &Sequence { - match self { - VirtualPart::VirtualPart{loc, trans, } => loc, - } - } - pub fn trans(&self) -> &Rc> { - match self { - VirtualPart::VirtualPart{loc, trans, } => trans, - } - } - } + impl Default + for Upper { + fn default() -> Upper { + Upper::Upper {} + } + } - impl Debug - for VirtualPart { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for Upper { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for VirtualPart { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VirtualPart::VirtualPart{loc, trans, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualPart.VirtualPart(")?; - DafnyPrint::fmt_print(loc, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(trans, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(413,3) + pub type VersionNumber = i32; - impl Eq - for VirtualPart {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(417,3) + #[derive(PartialEq, Clone)] + pub enum VirtualField { + VirtualField { + name: Sequence, + parts: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPartList + } + } - impl Hash - for VirtualPart { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VirtualPart::VirtualPart{loc, trans, } => { - Hash::hash(loc, _state); - Hash::hash(trans, _state) - }, - } - } - } + impl VirtualField { + /// Returns a borrow of the field name + pub fn name(&self) -> &Sequence { + match self { + VirtualField::VirtualField{name, parts, } => name, + } + } + /// Returns a borrow of the field parts + pub fn parts(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::VirtualPartList { + match self { + VirtualField::VirtualField{name, parts, } => parts, + } + } + } - impl Default - for VirtualPart { - fn default() -> VirtualPart { - VirtualPart::VirtualPart { - loc: Default::default(), - trans: Default::default() - } - } - } + impl Debug + for VirtualField { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &VirtualPart { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for VirtualField { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + VirtualField::VirtualField{name, parts, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualField.VirtualField(")?; + DafnyPrint::fmt_print(name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parts, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type VirtualPartList = Sequence>; + impl Eq + for VirtualField {} + + impl Hash + for VirtualField { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + VirtualField::VirtualField{name, parts, } => { + Hash::hash(name, _state); + Hash::hash(parts, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum VirtualTransform { - upper { - upper: Rc - }, - lower { - lower: Rc - }, - insert { - insert: Rc - }, - prefix { - prefix: Rc - }, - suffix { - suffix: Rc - }, - substring { - substring: Rc - }, - segment { - segment: Rc - }, - segments { - segments: Rc - } - } - - impl VirtualTransform { - pub fn upper(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => upper, - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn lower(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => lower, - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn insert(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => insert, - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn prefix(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => prefix, - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn suffix(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => suffix, - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn substring(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => substring, - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn segment(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => segment, - VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), - } - } - pub fn segments(&self) -> &Rc { - match self { - VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), - VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), - VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), - VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), - VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), - VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), - VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), - VirtualTransform::segments{segments, } => segments, - } - } - } - - impl Debug - for VirtualTransform { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for VirtualField { + fn default() -> VirtualField { + VirtualField::VirtualField { + name: Default::default(), + parts: Default::default() + } + } + } - impl DafnyPrint - for VirtualTransform { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VirtualTransform::upper{upper, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.upper(")?; - DafnyPrint::fmt_print(upper, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::lower{lower, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.lower(")?; - DafnyPrint::fmt_print(lower, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::insert{insert, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.insert(")?; - DafnyPrint::fmt_print(insert, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::prefix{prefix, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.prefix(")?; - DafnyPrint::fmt_print(prefix, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::suffix{suffix, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.suffix(")?; - DafnyPrint::fmt_print(suffix, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::substring{substring, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.substring(")?; - DafnyPrint::fmt_print(substring, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::segment{segment, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.segment(")?; - DafnyPrint::fmt_print(segment, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - VirtualTransform::segments{segments, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.segments(")?; - DafnyPrint::fmt_print(segments, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for VirtualField { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for VirtualTransform {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(421,3) + pub type VirtualFieldList = Sequence>; - impl Hash - for VirtualTransform { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VirtualTransform::upper{upper, } => { - Hash::hash(upper, _state) - }, - VirtualTransform::lower{lower, } => { - Hash::hash(lower, _state) - }, - VirtualTransform::insert{insert, } => { - Hash::hash(insert, _state) - }, - VirtualTransform::prefix{prefix, } => { - Hash::hash(prefix, _state) - }, - VirtualTransform::suffix{suffix, } => { - Hash::hash(suffix, _state) - }, - VirtualTransform::substring{substring, } => { - Hash::hash(substring, _state) - }, - VirtualTransform::segment{segment, } => { - Hash::hash(segment, _state) - }, - VirtualTransform::segments{segments, } => { - Hash::hash(segments, _state) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(425,3) + #[derive(PartialEq, Clone)] + pub enum VirtualPart { + VirtualPart { + loc: Sequence, + trans: Arc> + } + } - impl Default - for VirtualTransform { - fn default() -> VirtualTransform { - VirtualTransform::upper { - upper: Default::default() - } - } - } + impl VirtualPart { + /// Returns a borrow of the field loc + pub fn loc(&self) -> &Sequence { + match self { + VirtualPart::VirtualPart{loc, trans, } => loc, + } + } + /// Returns a borrow of the field trans + pub fn trans(&self) -> &Arc> { + match self { + VirtualPart::VirtualPart{loc, trans, } => trans, + } + } + } - impl AsRef - for &VirtualTransform { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for VirtualPart { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type VirtualTransformList = Sequence>; + impl DafnyPrint + for VirtualPart { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + VirtualPart::VirtualPart{loc, trans, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualPart.VirtualPart(")?; + DafnyPrint::fmt_print(loc, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(trans, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - DynamoDbEncryptionException { - message: Sequence - }, - AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: Rc - }, - AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: Rc - }, - AwsCryptographyKeyStore { - AwsCryptographyKeyStore: Rc - }, - AwsCryptographyPrimitives { - AwsCryptographyPrimitives: Rc - }, - ComAmazonawsDynamodb { - ComAmazonawsDynamodb: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::DynamoDbEncryptionException{message, } => message, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyMaterialProviders(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyKeyStore(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => AwsCryptographyKeyStore, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyPrimitives(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsDynamodb(&self) -> &Rc { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } - - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for VirtualPart {} + + impl Hash + for VirtualPart { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + VirtualPart::VirtualPart{loc, trans, } => { + Hash::hash(loc, _state); + Hash::hash(trans, _state) + }, + } + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::DynamoDbEncryptionException{message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.DynamoDbEncryptionException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; - DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; - DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyKeyStore(")?; - DafnyPrint::fmt_print(AwsCryptographyKeyStore, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyPrimitives(")?; - DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.ComAmazonawsDynamodb(")?; - DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for VirtualPart { + fn default() -> VirtualPart { + VirtualPart::VirtualPart { + loc: Default::default(), + trans: Default::default() + } + } + } - impl Eq - for Error {} + impl AsRef + for VirtualPart { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::DynamoDbEncryptionException{message, } => { - Hash::hash(message, _state) - }, - Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { - Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - Hash::hash(AwsCryptographyMaterialProviders, _state) - }, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { - Hash::hash(AwsCryptographyKeyStore, _state) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - Hash::hash(AwsCryptographyPrimitives, _state) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - Hash::hash(ComAmazonawsDynamodb, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(429,3) + pub type VirtualPartList = Sequence>; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(433,3) + #[derive(PartialEq, Clone)] + pub enum VirtualTransform { + upper { + upper: Arc + }, + lower { + lower: Arc + }, + insert { + insert: Arc + }, + prefix { + prefix: Arc + }, + suffix { + suffix: Arc + }, + substring { + substring: Arc + }, + segment { + segment: Arc + }, + segments { + segments: Arc + } + } - impl Default - for Error { - fn default() -> Error { - Error::DynamoDbEncryptionException { - message: Default::default() - } - } - } + impl VirtualTransform { + /// Gets the field upper for all enum members which have it + pub fn upper(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => upper, + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field lower for all enum members which have it + pub fn lower(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => lower, + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field insert for all enum members which have it + pub fn insert(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => insert, + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field prefix for all enum members which have it + pub fn prefix(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => prefix, + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field suffix for all enum members which have it + pub fn suffix(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => suffix, + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field substring for all enum members which have it + pub fn substring(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => substring, + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field segment for all enum members which have it + pub fn segment(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => segment, + VirtualTransform::segments{segments, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field segments for all enum members which have it + pub fn segments(&self) -> &Arc { + match self { + VirtualTransform::upper{upper, } => panic!("field does not exist on this variant"), + VirtualTransform::lower{lower, } => panic!("field does not exist on this variant"), + VirtualTransform::insert{insert, } => panic!("field does not exist on this variant"), + VirtualTransform::prefix{prefix, } => panic!("field does not exist on this variant"), + VirtualTransform::suffix{suffix, } => panic!("field does not exist on this variant"), + VirtualTransform::substring{substring, } => panic!("field does not exist on this variant"), + VirtualTransform::segment{segment, } => panic!("field does not exist on this variant"), + VirtualTransform::segments{segments, } => segments, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for VirtualTransform { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type OpaqueError = Rc; + impl DafnyPrint + for VirtualTransform { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + VirtualTransform::upper{upper, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.upper(")?; + DafnyPrint::fmt_print(upper, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::lower{lower, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.lower(")?; + DafnyPrint::fmt_print(lower, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::insert{insert, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.insert(")?; + DafnyPrint::fmt_print(insert, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::prefix{prefix, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.prefix(")?; + DafnyPrint::fmt_print(prefix, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::suffix{suffix, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.suffix(")?; + DafnyPrint::fmt_print(suffix, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::substring{substring, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.substring(")?; + DafnyPrint::fmt_print(substring, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::segment{segment, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.segment(")?; + DafnyPrint::fmt_print(segment, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + VirtualTransform::segments{segments, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.VirtualTransform.segments(")?; + DafnyPrint::fmt_print(segments, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type DummySubsetType = DafnyInt; + impl Eq + for VirtualTransform {} + + impl Hash + for VirtualTransform { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + VirtualTransform::upper{upper, } => { + Hash::hash(upper, _state) + }, + VirtualTransform::lower{lower, } => { + Hash::hash(lower, _state) + }, + VirtualTransform::insert{insert, } => { + Hash::hash(insert, _state) + }, + VirtualTransform::prefix{prefix, } => { + Hash::hash(prefix, _state) + }, + VirtualTransform::suffix{suffix, } => { + Hash::hash(suffix, _state) + }, + VirtualTransform::substring{substring, } => { + Hash::hash(substring, _state) + }, + VirtualTransform::segment{segment, } => { + Hash::hash(segment, _state) + }, + VirtualTransform::segments{segments, } => { + Hash::hash(segments, _state) + }, + } + } + } - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } + impl Default + for VirtualTransform { + fn default() -> VirtualTransform { + VirtualTransform::upper { + upper: Default::default() + } + } + } - pub mod structuredencryption { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; - pub use crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput; + impl AsRef + for VirtualTransform { + fn as_ref(&self) -> &Self { + self + } + } - pub struct _default {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(442,3) + pub type VirtualTransformList = Sequence>; + + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(446,3) + #[derive(PartialEq, Clone)] + pub enum Error { + DynamoDbEncryptionException { + message: Sequence + }, + AwsCryptographyDbEncryptionSdkStructuredEncryption { + AwsCryptographyDbEncryptionSdkStructuredEncryption: Arc + }, + AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: Arc + }, + AwsCryptographyKeyStore { + AwsCryptographyKeyStore: Arc + }, + AwsCryptographyPrimitives { + AwsCryptographyPrimitives: Arc + }, + ComAmazonawsDynamodb { + ComAmazonawsDynamodb: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - impl _default { - pub fn DefaultStructuredEncryptionConfig() -> Rc { - Rc::new(StructuredEncryptionConfig::StructuredEncryptionConfig {}) - } - pub fn StructuredEncryption(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut maybePrimitives = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::AtomicPrimitives(&crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::DefaultCryptoConfig())); - maybePrimitives = MaybePlacebo::from(_out0.read()); - let mut valueOrError0: Rc, Rc>> = maybePrimitives.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyPrimitives { - AwsCryptographyPrimitives: e.clone() - }) - }) - })); - if valueOrError0.IsFailure() { - res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); - return res.read(); - }; - let mut primitives: Object = valueOrError0.Extract(); - let mut maybeMatProv = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig())); - maybeMatProv = MaybePlacebo::from(_out1.read()); - let mut valueOrError1: Rc, Rc>> = maybeMatProv.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError1.IsFailure() { - res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); - return res.read(); - }; - let mut matProv: Object = valueOrError1.Extract(); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient::_ctor(&_nw0, &Rc::new(Config::Config { - primitives: primitives.clone(), - materialProviders: matProv.clone() - })); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::DynamoDbEncryptionException{message, } => message, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyDbEncryptionSdkStructuredEncryption for all enum members which have it + pub fn AwsCryptographyDbEncryptionSdkStructuredEncryption(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => AwsCryptographyDbEncryptionSdkStructuredEncryption, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyMaterialProviders for all enum members which have it + pub fn AwsCryptographyMaterialProviders(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyKeyStore for all enum members which have it + pub fn AwsCryptographyKeyStore(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => AwsCryptographyKeyStore, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyPrimitives for all enum members which have it + pub fn AwsCryptographyPrimitives(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsDynamodb for all enum members which have it + pub fn ComAmazonawsDynamodb(&self) -> &Arc { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::DynamoDbEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - pub struct StructuredEncryptionClient { - pub r#__i_config: Rc - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl StructuredEncryptionClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::DynamoDbEncryptionException{message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.DynamoDbEncryptionException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyDbEncryptionSdkStructuredEncryption(")?; + DafnyPrint::fmt_print(AwsCryptographyDbEncryptionSdkStructuredEncryption, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; + DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyKeyStore(")?; + DafnyPrint::fmt_print(AwsCryptographyKeyStore, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.AwsCryptographyPrimitives(")?; + DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.ComAmazonawsDynamodb(")?; + DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.dynamodb.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { - UpcastObjectFn!(dyn Any); - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::DynamoDbEncryptionException{message, } => { + Hash::hash(message, _state) + }, + Error::AwsCryptographyDbEncryptionSdkStructuredEncryption{AwsCryptographyDbEncryptionSdkStructuredEncryption, } => { + Hash::hash(AwsCryptographyDbEncryptionSdkStructuredEncryption, _state) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + Hash::hash(AwsCryptographyMaterialProviders, _state) + }, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { + Hash::hash(AwsCryptographyKeyStore, _state) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + Hash::hash(AwsCryptographyPrimitives, _state) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + Hash::hash(ComAmazonawsDynamodb, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl IStructuredEncryptionClient - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { - fn EncryptStructure(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::EncryptStructure(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DecryptStructure(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::DecryptStructure(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn EncryptPathStructure(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::EncryptPathStructure(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn DecryptPathStructure(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::DecryptPathStructure(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn ResolveAuthActions(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::ResolveAuthActions(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { - UpcastObjectFn!(dyn IStructuredEncryptionClient); - } - - pub mod types { - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::SequenceIter; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - - pub struct _default {} - - impl _default { - pub fn IsValid_TerminalTypeId(x: &Sequence) -> bool { - !(x.cardinality() < int!(2)) && !(int!(2) < x.cardinality()) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } - - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } - - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } - - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for Error { + fn default() -> Error { + Error::DynamoDbEncryptionException { + message: Default::default() + } + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DafnyCallEvent {} + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(485,3) + pub type OpaqueError = Arc; - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + /// dafny/DynamoDbEncryption/Model/AwsCryptographyDbEncryptionSdkDynamoDbTypes.dfy(488,3) + pub type DummySubsetType = DafnyInt; - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } + } } - } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + pub mod structuredencryption { + /// dafny/StructuredEncryption/src/Index.dfy(6,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredEncryptionConfig; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; + pub use crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput; + + pub struct _default {} + + impl _default { + /// dafny/StructuredEncryption/src/Index.dfy(15,3) + pub fn DefaultStructuredEncryptionConfig() -> Arc { + Arc::new(StructuredEncryptionConfig::StructuredEncryptionConfig {}) + } + /// dafny/StructuredEncryption/src/Index.dfy(20,3) + pub fn StructuredEncryption(config: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut maybePrimitives: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::AtomicPrimitives(&crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::DefaultCryptoConfig()); + maybePrimitives = _out0.clone(); + let mut valueOrError0: Arc, Arc>> = maybePrimitives.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyPrimitives { + AwsCryptographyPrimitives: e.clone() + }) + }) + })); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut primitives: Object = valueOrError0.Extract(); + let mut maybeMatProv: Arc, Arc>>; + let mut _out1: Arc, Arc>>; + _out1 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::MaterialProviders(&crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::_default::DefaultMaterialProvidersConfig()); + maybeMatProv = _out1.clone(); + let mut valueOrError1: Arc, Arc>> = maybeMatProv.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: e.clone() + }) + }) + })); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut matProv: Object = valueOrError1.Extract(); + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient::_ctor(&_nw0, &Arc::new(Config::Config { + primitives: primitives.clone(), + materialProviders: matProv.clone() + })); + client = _nw0.clone(); + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: client.clone() + })); + return res.read(); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(315,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(318,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - #[derive(PartialEq, Clone)] - pub enum AuthenticateAction { - SIGN {}, - DO_NOT_SIGN {} - } + /// dafny/StructuredEncryption/src/Index.dfy(36,3) + pub struct StructuredEncryptionClient { + pub __i_config: Arc + } - impl AuthenticateAction {} + impl StructuredEncryptionClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// dafny/StructuredEncryption/src/Index.dfy(45,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(329,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl Debug - for AuthenticateAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { + UpcastObjectFn!(DynAny); + } - impl DafnyPrint - for AuthenticateAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AuthenticateAction::SIGN{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthenticateAction.SIGN")?; - Ok(()) - }, - AuthenticateAction::DO_NOT_SIGN{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthenticateAction.DO__NOT__SIGN")?; - Ok(()) - }, - } - } - } + impl IStructuredEncryptionClient + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(338,5) + fn EncryptStructure(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::EncryptStructure(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(362,5) + fn DecryptStructure(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::DecryptStructure(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(386,5) + fn EncryptPathStructure(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::EncryptPathStructure(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(410,5) + fn DecryptPathStructure(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::DecryptPathStructure(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(434,5) + fn ResolveAuthActions(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile::_default::ResolveAuthActions(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl AuthenticateAction { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(AuthenticateAction::SIGN {}), Rc::new(AuthenticateAction::DO_NOT_SIGN {})].iter() - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient { + UpcastObjectFn!(dyn IStructuredEncryptionClient); + } - impl Eq - for AuthenticateAction {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(7,1) + pub mod types { + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::SequenceIter; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptedDataKey; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + + pub struct _default {} + + impl _default { + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(249,3) + pub fn IsValid_TerminalTypeId(x: &Sequence) -> bool { + !(x.cardinality() < int!(2)) && !(int!(2) < x.cardinality()) + } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(293,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl Hash - for AuthenticateAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AuthenticateAction::SIGN{} => { + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(15,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - }, - AuthenticateAction::DO_NOT_SIGN{} => { + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - }, - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for AuthenticateAction { - fn default() -> AuthenticateAction { - AuthenticateAction::SIGN {} - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &AuthenticateAction { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum AuthItem { - AuthItem { - key: Sequence>, - data: Rc, - action: Rc - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl AuthItem { - pub fn key(&self) -> &Sequence> { - match self { - AuthItem::AuthItem{key, data, action, } => key, - } - } - pub fn data(&self) -> &Rc { - match self { - AuthItem::AuthItem{key, data, action, } => data, - } - } - pub fn action(&self) -> &Rc { - match self { - AuthItem::AuthItem{key, data, action, } => action, - } - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for AuthItem { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(19,3) + #[derive(PartialEq, Clone)] + pub enum AuthenticateAction { + SIGN {}, + DO_NOT_SIGN {} + } - impl DafnyPrint - for AuthItem { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AuthItem::AuthItem{key, data, action, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthItem.AuthItem(")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(data, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(action, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AuthenticateAction {} - impl Eq - for AuthItem {} + impl Debug + for AuthenticateAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for AuthItem { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AuthItem::AuthItem{key, data, action, } => { - Hash::hash(key, _state); - Hash::hash(data, _state); - Hash::hash(action, _state) - }, - } - } - } + impl DafnyPrint + for AuthenticateAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AuthenticateAction::SIGN{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthenticateAction.SIGN")?; + Ok(()) + }, + AuthenticateAction::DO_NOT_SIGN{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthenticateAction.DO__NOT__SIGN")?; + Ok(()) + }, + } + } + } - impl Default - for AuthItem { - fn default() -> AuthItem { - AuthItem::AuthItem { - key: Default::default(), - data: Default::default(), - action: Default::default() - } - } - } + impl AuthenticateAction { + /// Enumerates all possible values of AuthenticateAction + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(AuthenticateAction::SIGN {}), Arc::new(AuthenticateAction::DO_NOT_SIGN {})].iter() + } + } - impl AsRef - for &AuthItem { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for AuthenticateAction {} - #[derive(PartialEq, Clone)] - pub enum CryptoAction { - ENCRYPT_AND_SIGN {}, - SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}, - SIGN_ONLY {}, - DO_NOTHING {} - } + impl Hash + for AuthenticateAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AuthenticateAction::SIGN{} => { - impl CryptoAction {} + }, + AuthenticateAction::DO_NOT_SIGN{} => { - impl Debug - for CryptoAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for CryptoAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CryptoAction::ENCRYPT_AND_SIGN{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.ENCRYPT__AND__SIGN")?; - Ok(()) - }, - CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.SIGN__AND__INCLUDE__IN__ENCRYPTION__CONTEXT")?; - Ok(()) - }, - CryptoAction::SIGN_ONLY{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.SIGN__ONLY")?; - Ok(()) - }, - CryptoAction::DO_NOTHING{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.DO__NOTHING")?; - Ok(()) - }, - } - } - } + impl Default + for AuthenticateAction { + fn default() -> AuthenticateAction { + AuthenticateAction::SIGN {} + } + } - impl CryptoAction { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CryptoAction::ENCRYPT_AND_SIGN {}), Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}), Rc::new(CryptoAction::SIGN_ONLY {}), Rc::new(CryptoAction::DO_NOTHING {})].iter() - } - } + impl AsRef + for AuthenticateAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for CryptoAction {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(23,3) + #[derive(PartialEq, Clone)] + pub enum AuthItem { + AuthItem { + key: Sequence>, + data: Arc, + action: Arc + } + } - impl Hash - for CryptoAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CryptoAction::ENCRYPT_AND_SIGN{} => { + impl AuthItem { + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence> { + match self { + AuthItem::AuthItem{key, data, action, } => key, + } + } + /// Returns a borrow of the field data + pub fn data(&self) -> &Arc { + match self { + AuthItem::AuthItem{key, data, action, } => data, + } + } + /// Returns a borrow of the field action + pub fn action(&self) -> &Arc { + match self { + AuthItem::AuthItem{key, data, action, } => action, + } + } + } - }, - CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT{} => { + impl Debug + for AuthItem { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - CryptoAction::SIGN_ONLY{} => { + impl DafnyPrint + for AuthItem { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AuthItem::AuthItem{key, data, action, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.AuthItem.AuthItem(")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(data, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(action, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - CryptoAction::DO_NOTHING{} => { + impl Eq + for AuthItem {} + + impl Hash + for AuthItem { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AuthItem::AuthItem{key, data, action, } => { + Hash::hash(key, _state); + Hash::hash(data, _state); + Hash::hash(action, _state) + }, + } + } + } - }, - } - } - } + impl Default + for AuthItem { + fn default() -> AuthItem { + AuthItem::AuthItem { + key: Default::default(), + data: Default::default(), + action: Default::default() + } + } + } - impl Default - for CryptoAction { - fn default() -> CryptoAction { - CryptoAction::ENCRYPT_AND_SIGN {} - } - } + impl AsRef + for AuthItem { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CryptoAction { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(29,3) + #[derive(PartialEq, Clone)] + pub enum CryptoAction { + ENCRYPT_AND_SIGN {}, + SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}, + SIGN_ONLY {}, + DO_NOTHING {} + } - #[derive(PartialEq, Clone)] - pub enum CryptoItem { - CryptoItem { - key: Sequence>, - data: Rc, - action: Rc - } - } + impl CryptoAction {} - impl CryptoItem { - pub fn key(&self) -> &Sequence> { - match self { - CryptoItem::CryptoItem{key, data, action, } => key, - } - } - pub fn data(&self) -> &Rc { - match self { - CryptoItem::CryptoItem{key, data, action, } => data, - } - } - pub fn action(&self) -> &Rc { - match self { - CryptoItem::CryptoItem{key, data, action, } => action, - } - } - } + impl Debug + for CryptoAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for CryptoItem { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CryptoAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CryptoAction::ENCRYPT_AND_SIGN{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.ENCRYPT__AND__SIGN")?; + Ok(()) + }, + CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.SIGN__AND__INCLUDE__IN__ENCRYPTION__CONTEXT")?; + Ok(()) + }, + CryptoAction::SIGN_ONLY{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.SIGN__ONLY")?; + Ok(()) + }, + CryptoAction::DO_NOTHING{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoAction.DO__NOTHING")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for CryptoItem { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CryptoItem::CryptoItem{key, data, action, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoItem.CryptoItem(")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(data, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(action, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CryptoAction { + /// Enumerates all possible values of CryptoAction + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CryptoAction::ENCRYPT_AND_SIGN {}), Arc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}), Arc::new(CryptoAction::SIGN_ONLY {}), Arc::new(CryptoAction::DO_NOTHING {})].iter() + } + } - impl Eq - for CryptoItem {} + impl Eq + for CryptoAction {} - impl Hash - for CryptoItem { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CryptoItem::CryptoItem{key, data, action, } => { - Hash::hash(key, _state); - Hash::hash(data, _state); - Hash::hash(action, _state) - }, - } - } - } + impl Hash + for CryptoAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CryptoAction::ENCRYPT_AND_SIGN{} => { - impl Default - for CryptoItem { - fn default() -> CryptoItem { - CryptoItem::CryptoItem { - key: Default::default(), - data: Default::default(), - action: Default::default() - } - } - } + }, + CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT{} => { - impl AsRef - for &CryptoItem { - fn as_ref(&self) -> Self { - self - } - } + }, + CryptoAction::SIGN_ONLY{} => { - #[derive(PartialEq, Clone)] - pub enum DecryptPathStructureInput { - DecryptPathStructureInput { - tableName: Sequence, - encryptedStructure: Sequence>, - cmm: Object, - encryptionContext: Rc>> - } - } + }, + CryptoAction::DO_NOTHING{} => { - impl DecryptPathStructureInput { - pub fn tableName(&self) -> &Sequence { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => tableName, - } - } - pub fn encryptedStructure(&self) -> &Sequence> { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => encryptedStructure, - } - } - pub fn cmm(&self) -> &Object { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => cmm, - } - } - pub fn encryptionContext(&self) -> &Rc>> { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => encryptionContext, - } - } - } + }, + } + } + } - impl Debug - for DecryptPathStructureInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CryptoAction { + fn default() -> CryptoAction { + CryptoAction::ENCRYPT_AND_SIGN {} + } + } - impl DafnyPrint - for DecryptPathStructureInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptPathStructureInput.DecryptPathStructureInput(")?; - DafnyPrint::fmt_print(tableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CryptoAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecryptPathStructureInput {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(34,3) + #[derive(PartialEq, Clone)] + pub enum CryptoItem { + CryptoItem { + key: Sequence>, + data: Arc, + action: Arc + } + } - impl Hash - for DecryptPathStructureInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => { - Hash::hash(tableName, _state); - Hash::hash(encryptedStructure, _state); - Hash::hash(cmm, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } + impl CryptoItem { + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence> { + match self { + CryptoItem::CryptoItem{key, data, action, } => key, + } + } + /// Returns a borrow of the field data + pub fn data(&self) -> &Arc { + match self { + CryptoItem::CryptoItem{key, data, action, } => data, + } + } + /// Returns a borrow of the field action + pub fn action(&self) -> &Arc { + match self { + CryptoItem::CryptoItem{key, data, action, } => action, + } + } + } - impl Default - for DecryptPathStructureInput { - fn default() -> DecryptPathStructureInput { - DecryptPathStructureInput::DecryptPathStructureInput { - tableName: Default::default(), - encryptedStructure: Default::default(), - cmm: Default::default(), - encryptionContext: Default::default() - } - } - } + impl Debug + for CryptoItem { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DecryptPathStructureInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CryptoItem { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CryptoItem::CryptoItem{key, data, action, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.CryptoItem.CryptoItem(")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(data, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(action, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DecryptPathStructureOutput { - DecryptPathStructureOutput { - plaintextStructure: Sequence>, - parsedHeader: Rc - } - } + impl Eq + for CryptoItem {} + + impl Hash + for CryptoItem { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CryptoItem::CryptoItem{key, data, action, } => { + Hash::hash(key, _state); + Hash::hash(data, _state); + Hash::hash(action, _state) + }, + } + } + } - impl DecryptPathStructureOutput { - pub fn plaintextStructure(&self) -> &Sequence> { - match self { - DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => plaintextStructure, - } - } - pub fn parsedHeader(&self) -> &Rc { - match self { - DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => parsedHeader, - } - } - } + impl Default + for CryptoItem { + fn default() -> CryptoItem { + CryptoItem::CryptoItem { + key: Default::default(), + data: Default::default(), + action: Default::default() + } + } + } - impl Debug - for DecryptPathStructureOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CryptoItem { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DecryptPathStructureOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptPathStructureOutput.DecryptPathStructureOutput(")?; - DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(41,3) + #[derive(PartialEq, Clone)] + pub enum DecryptPathStructureInput { + DecryptPathStructureInput { + tableName: Sequence, + encryptedStructure: Sequence>, + cmm: Object, + encryptionContext: Arc>> + } + } - impl Eq - for DecryptPathStructureOutput {} + impl DecryptPathStructureInput { + /// Returns a borrow of the field tableName + pub fn tableName(&self) -> &Sequence { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => tableName, + } + } + /// Returns a borrow of the field encryptedStructure + pub fn encryptedStructure(&self) -> &Sequence> { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => encryptedStructure, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Object { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => cmm, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Arc>> { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => encryptionContext, + } + } + } - impl Hash - for DecryptPathStructureOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => { - Hash::hash(plaintextStructure, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } - - impl Default - for DecryptPathStructureOutput { - fn default() -> DecryptPathStructureOutput { - DecryptPathStructureOutput::DecryptPathStructureOutput { - plaintextStructure: Default::default(), - parsedHeader: Default::default() - } - } - } - - impl AsRef - for &DecryptPathStructureOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DecryptStructureInput { - DecryptStructureInput { - tableName: Sequence, - encryptedStructure: Map, Rc>, - authenticateSchema: Map, Rc>, - cmm: Object, - encryptionContext: Rc>> - } - } - - impl DecryptStructureInput { - pub fn tableName(&self) -> &Sequence { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => tableName, - } - } - pub fn encryptedStructure(&self) -> &Map, Rc> { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => encryptedStructure, - } - } - pub fn authenticateSchema(&self) -> &Map, Rc> { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => authenticateSchema, - } - } - pub fn cmm(&self) -> &Object { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => cmm, - } - } - pub fn encryptionContext(&self) -> &Rc>> { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => encryptionContext, - } - } - } - - impl Debug - for DecryptStructureInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DecryptPathStructureInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DecryptStructureInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptStructureInput.DecryptStructureInput(")?; - DafnyPrint::fmt_print(tableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(authenticateSchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DecryptPathStructureInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptPathStructureInput.DecryptPathStructureInput(")?; + DafnyPrint::fmt_print(tableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DecryptStructureInput {} + impl Eq + for DecryptPathStructureInput {} + + impl Hash + for DecryptPathStructureInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptPathStructureInput::DecryptPathStructureInput{tableName, encryptedStructure, cmm, encryptionContext, } => { + Hash::hash(tableName, _state); + Hash::hash(encryptedStructure, _state); + Hash::hash(cmm, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl Hash - for DecryptStructureInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => { - Hash::hash(tableName, _state); - Hash::hash(encryptedStructure, _state); - Hash::hash(authenticateSchema, _state); - Hash::hash(cmm, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } - - impl Default - for DecryptStructureInput { - fn default() -> DecryptStructureInput { - DecryptStructureInput::DecryptStructureInput { - tableName: Default::default(), - encryptedStructure: Default::default(), - authenticateSchema: Default::default(), - cmm: Default::default(), - encryptionContext: Default::default() - } - } - } - - impl AsRef - for &DecryptStructureInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DecryptStructureOutput { - DecryptStructureOutput { - plaintextStructure: Map, Rc>, - cryptoSchema: Map, Rc>, - parsedHeader: Rc - } - } - - impl DecryptStructureOutput { - pub fn plaintextStructure(&self) -> &Map, Rc> { - match self { - DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => plaintextStructure, - } - } - pub fn cryptoSchema(&self) -> &Map, Rc> { - match self { - DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => cryptoSchema, - } - } - pub fn parsedHeader(&self) -> &Rc { - match self { - DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => parsedHeader, - } - } - } - - impl Debug - for DecryptStructureOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DecryptPathStructureInput { + fn default() -> DecryptPathStructureInput { + DecryptPathStructureInput::DecryptPathStructureInput { + tableName: Default::default(), + encryptedStructure: Default::default(), + cmm: Default::default(), + encryptionContext: Default::default() + } + } + } - impl DafnyPrint - for DecryptStructureOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptStructureOutput.DecryptStructureOutput(")?; - DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DecryptPathStructureInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecryptStructureOutput {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(47,3) + #[derive(PartialEq, Clone)] + pub enum DecryptPathStructureOutput { + DecryptPathStructureOutput { + plaintextStructure: Sequence>, + parsedHeader: Arc + } + } - impl Hash - for DecryptStructureOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => { - Hash::hash(plaintextStructure, _state); - Hash::hash(cryptoSchema, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } - - impl Default - for DecryptStructureOutput { - fn default() -> DecryptStructureOutput { - DecryptStructureOutput::DecryptStructureOutput { - plaintextStructure: Default::default(), - cryptoSchema: Default::default(), - parsedHeader: Default::default() - } - } - } - - impl AsRef - for &DecryptStructureOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EncryptPathStructureInput { - EncryptPathStructureInput { - tableName: Sequence, - plaintextStructure: Sequence>, - cmm: Object, - algorithmSuiteId: Rc>>, - encryptionContext: Rc>> - } - } - - impl EncryptPathStructureInput { - pub fn tableName(&self) -> &Sequence { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => tableName, - } - } - pub fn plaintextStructure(&self) -> &Sequence> { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => plaintextStructure, - } - } - pub fn cmm(&self) -> &Object { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => cmm, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => algorithmSuiteId, - } - } - pub fn encryptionContext(&self) -> &Rc>> { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => encryptionContext, - } - } - } - - impl Debug - for EncryptPathStructureInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DecryptPathStructureOutput { + /// Returns a borrow of the field plaintextStructure + pub fn plaintextStructure(&self) -> &Sequence> { + match self { + DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => plaintextStructure, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc { + match self { + DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => parsedHeader, + } + } + } - impl DafnyPrint - for EncryptPathStructureInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptPathStructureInput.EncryptPathStructureInput(")?; - DafnyPrint::fmt_print(tableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DecryptPathStructureOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for EncryptPathStructureInput {} + impl DafnyPrint + for DecryptPathStructureOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptPathStructureOutput.DecryptPathStructureOutput(")?; + DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for EncryptPathStructureInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => { - Hash::hash(tableName, _state); - Hash::hash(plaintextStructure, _state); - Hash::hash(cmm, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } + impl Eq + for DecryptPathStructureOutput {} + + impl Hash + for DecryptPathStructureOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptPathStructureOutput::DecryptPathStructureOutput{plaintextStructure, parsedHeader, } => { + Hash::hash(plaintextStructure, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl Default - for EncryptPathStructureInput { - fn default() -> EncryptPathStructureInput { - EncryptPathStructureInput::EncryptPathStructureInput { - tableName: Default::default(), - plaintextStructure: Default::default(), - cmm: Default::default(), - algorithmSuiteId: Default::default(), - encryptionContext: Default::default() - } - } - } + impl Default + for DecryptPathStructureOutput { + fn default() -> DecryptPathStructureOutput { + DecryptPathStructureOutput::DecryptPathStructureOutput { + plaintextStructure: Default::default(), + parsedHeader: Default::default() + } + } + } - impl AsRef - for &EncryptPathStructureInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DecryptPathStructureOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum EncryptPathStructureOutput { - EncryptPathStructureOutput { - encryptedStructure: Sequence>, - parsedHeader: Rc - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(51,3) + #[derive(PartialEq, Clone)] + pub enum DecryptStructureInput { + DecryptStructureInput { + tableName: Sequence, + encryptedStructure: Map, Arc>, + authenticateSchema: Map, Arc>, + cmm: Object, + encryptionContext: Arc>> + } + } - impl EncryptPathStructureOutput { - pub fn encryptedStructure(&self) -> &Sequence> { - match self { - EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => encryptedStructure, - } - } - pub fn parsedHeader(&self) -> &Rc { - match self { - EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => parsedHeader, - } - } - } + impl DecryptStructureInput { + /// Returns a borrow of the field tableName + pub fn tableName(&self) -> &Sequence { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => tableName, + } + } + /// Returns a borrow of the field encryptedStructure + pub fn encryptedStructure(&self) -> &Map, Arc> { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => encryptedStructure, + } + } + /// Returns a borrow of the field authenticateSchema + pub fn authenticateSchema(&self) -> &Map, Arc> { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => authenticateSchema, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Object { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => cmm, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Arc>> { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => encryptionContext, + } + } + } - impl Debug - for EncryptPathStructureOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DecryptStructureInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for EncryptPathStructureOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptPathStructureOutput.EncryptPathStructureOutput(")?; - DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DecryptStructureInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptStructureInput.DecryptStructureInput(")?; + DafnyPrint::fmt_print(tableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(authenticateSchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for EncryptPathStructureOutput {} + impl Eq + for DecryptStructureInput {} + + impl Hash + for DecryptStructureInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptStructureInput::DecryptStructureInput{tableName, encryptedStructure, authenticateSchema, cmm, encryptionContext, } => { + Hash::hash(tableName, _state); + Hash::hash(encryptedStructure, _state); + Hash::hash(authenticateSchema, _state); + Hash::hash(cmm, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl Hash - for EncryptPathStructureOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => { - Hash::hash(encryptedStructure, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } - - impl Default - for EncryptPathStructureOutput { - fn default() -> EncryptPathStructureOutput { - EncryptPathStructureOutput::EncryptPathStructureOutput { - encryptedStructure: Default::default(), - parsedHeader: Default::default() - } - } - } - - impl AsRef - for &EncryptPathStructureOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EncryptStructureInput { - EncryptStructureInput { - tableName: Sequence, - plaintextStructure: Map, Rc>, - cryptoSchema: Map, Rc>, - cmm: Object, - algorithmSuiteId: Rc>>, - encryptionContext: Rc>> - } - } - - impl EncryptStructureInput { - pub fn tableName(&self) -> &Sequence { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => tableName, - } - } - pub fn plaintextStructure(&self) -> &Map, Rc> { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => plaintextStructure, - } - } - pub fn cryptoSchema(&self) -> &Map, Rc> { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => cryptoSchema, - } - } - pub fn cmm(&self) -> &Object { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => cmm, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => algorithmSuiteId, - } - } - pub fn encryptionContext(&self) -> &Rc>> { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => encryptionContext, - } - } - } - - impl Debug - for EncryptStructureInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DecryptStructureInput { + fn default() -> DecryptStructureInput { + DecryptStructureInput::DecryptStructureInput { + tableName: Default::default(), + encryptedStructure: Default::default(), + authenticateSchema: Default::default(), + cmm: Default::default(), + encryptionContext: Default::default() + } + } + } - impl DafnyPrint - for EncryptStructureInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptStructureInput.EncryptStructureInput(")?; - DafnyPrint::fmt_print(tableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DecryptStructureInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for EncryptStructureInput {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(58,3) + #[derive(PartialEq, Clone)] + pub enum DecryptStructureOutput { + DecryptStructureOutput { + plaintextStructure: Map, Arc>, + cryptoSchema: Map, Arc>, + parsedHeader: Arc + } + } - impl Hash - for EncryptStructureInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => { - Hash::hash(tableName, _state); - Hash::hash(plaintextStructure, _state); - Hash::hash(cryptoSchema, _state); - Hash::hash(cmm, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } - - impl Default - for EncryptStructureInput { - fn default() -> EncryptStructureInput { - EncryptStructureInput::EncryptStructureInput { - tableName: Default::default(), - plaintextStructure: Default::default(), - cryptoSchema: Default::default(), - cmm: Default::default(), - algorithmSuiteId: Default::default(), - encryptionContext: Default::default() - } - } - } - - impl AsRef - for &EncryptStructureInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EncryptStructureOutput { - EncryptStructureOutput { - encryptedStructure: Map, Rc>, - cryptoSchema: Map, Rc>, - parsedHeader: Rc - } - } - - impl EncryptStructureOutput { - pub fn encryptedStructure(&self) -> &Map, Rc> { - match self { - EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => encryptedStructure, - } - } - pub fn cryptoSchema(&self) -> &Map, Rc> { - match self { - EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => cryptoSchema, - } - } - pub fn parsedHeader(&self) -> &Rc { - match self { - EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => parsedHeader, - } - } - } - - impl Debug - for EncryptStructureOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DecryptStructureOutput { + /// Returns a borrow of the field plaintextStructure + pub fn plaintextStructure(&self) -> &Map, Arc> { + match self { + DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => plaintextStructure, + } + } + /// Returns a borrow of the field cryptoSchema + pub fn cryptoSchema(&self) -> &Map, Arc> { + match self { + DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => cryptoSchema, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc { + match self { + DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => parsedHeader, + } + } + } - impl DafnyPrint - for EncryptStructureOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptStructureOutput.EncryptStructureOutput(")?; - DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DecryptStructureOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for EncryptStructureOutput {} + impl DafnyPrint + for DecryptStructureOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.DecryptStructureOutput.DecryptStructureOutput(")?; + DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for EncryptStructureOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => { - Hash::hash(encryptedStructure, _state); - Hash::hash(cryptoSchema, _state); - Hash::hash(parsedHeader, _state) - }, - } - } - } - - impl Default - for EncryptStructureOutput { - fn default() -> EncryptStructureOutput { - EncryptStructureOutput::EncryptStructureOutput { - encryptedStructure: Default::default(), - cryptoSchema: Default::default(), - parsedHeader: Default::default() - } - } - } - - impl AsRef - for &EncryptStructureOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ParsedHeader { - ParsedHeader { - algorithmSuiteId: Rc, - encryptedDataKeys: Sequence>, - storedEncryptionContext: Map, - encryptionContext: Map - } - } - - impl ParsedHeader { - pub fn algorithmSuiteId(&self) -> &Rc { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => algorithmSuiteId, - } - } - pub fn encryptedDataKeys(&self) -> &Sequence> { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => encryptedDataKeys, - } - } - pub fn storedEncryptionContext(&self) -> &Map { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => storedEncryptionContext, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => encryptionContext, - } - } - } - - impl Debug - for ParsedHeader { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DecryptStructureOutput {} + + impl Hash + for DecryptStructureOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptStructureOutput::DecryptStructureOutput{plaintextStructure, cryptoSchema, parsedHeader, } => { + Hash::hash(plaintextStructure, _state); + Hash::hash(cryptoSchema, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl DafnyPrint - for ParsedHeader { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ParsedHeader.ParsedHeader(")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(storedEncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DecryptStructureOutput { + fn default() -> DecryptStructureOutput { + DecryptStructureOutput::DecryptStructureOutput { + plaintextStructure: Default::default(), + cryptoSchema: Default::default(), + parsedHeader: Default::default() + } + } + } - impl Eq - for ParsedHeader {} + impl AsRef + for DecryptStructureOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ParsedHeader { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => { - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptedDataKeys, _state); - Hash::hash(storedEncryptionContext, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(63,3) + #[derive(PartialEq, Clone)] + pub enum EncryptPathStructureInput { + EncryptPathStructureInput { + tableName: Sequence, + plaintextStructure: Sequence>, + cmm: Object, + algorithmSuiteId: Arc>>, + encryptionContext: Arc>> + } + } - impl Default - for ParsedHeader { - fn default() -> ParsedHeader { - ParsedHeader::ParsedHeader { - algorithmSuiteId: Default::default(), - encryptedDataKeys: Default::default(), - storedEncryptionContext: Default::default(), - encryptionContext: Default::default() - } - } - } + impl EncryptPathStructureInput { + /// Returns a borrow of the field tableName + pub fn tableName(&self) -> &Sequence { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => tableName, + } + } + /// Returns a borrow of the field plaintextStructure + pub fn plaintextStructure(&self) -> &Sequence> { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => plaintextStructure, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Object { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => cmm, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc>> { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Arc>> { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => encryptionContext, + } + } + } - impl AsRef - for &ParsedHeader { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for EncryptPathStructureInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PathSegment { - member { - member: Rc - } - } + impl DafnyPrint + for EncryptPathStructureInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptPathStructureInput.EncryptPathStructureInput(")?; + DafnyPrint::fmt_print(tableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PathSegment { - pub fn member(&self) -> &Rc { - match self { - PathSegment::member{member, } => member, - } - } - } + impl Eq + for EncryptPathStructureInput {} + + impl Hash + for EncryptPathStructureInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptPathStructureInput::EncryptPathStructureInput{tableName, plaintextStructure, cmm, algorithmSuiteId, encryptionContext, } => { + Hash::hash(tableName, _state); + Hash::hash(plaintextStructure, _state); + Hash::hash(cmm, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl Debug - for PathSegment { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for EncryptPathStructureInput { + fn default() -> EncryptPathStructureInput { + EncryptPathStructureInput::EncryptPathStructureInput { + tableName: Default::default(), + plaintextStructure: Default::default(), + cmm: Default::default(), + algorithmSuiteId: Default::default(), + encryptionContext: Default::default() + } + } + } - impl DafnyPrint - for PathSegment { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PathSegment::member{member, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.PathSegment.member(")?; - DafnyPrint::fmt_print(member, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for EncryptPathStructureInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for PathSegment {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(70,3) + #[derive(PartialEq, Clone)] + pub enum EncryptPathStructureOutput { + EncryptPathStructureOutput { + encryptedStructure: Sequence>, + parsedHeader: Arc + } + } - impl Hash - for PathSegment { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PathSegment::member{member, } => { - Hash::hash(member, _state) - }, - } - } - } + impl EncryptPathStructureOutput { + /// Returns a borrow of the field encryptedStructure + pub fn encryptedStructure(&self) -> &Sequence> { + match self { + EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => encryptedStructure, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc { + match self { + EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => parsedHeader, + } + } + } - impl Default - for PathSegment { - fn default() -> PathSegment { - PathSegment::member { - member: Default::default() - } - } - } + impl Debug + for EncryptPathStructureOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &PathSegment { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for EncryptPathStructureOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptPathStructureOutput.EncryptPathStructureOutput(")?; + DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ResolveAuthActionsInput { - ResolveAuthActionsInput { - tableName: Sequence, - authActions: Sequence>, - headerBytes: Sequence - } - } + impl Eq + for EncryptPathStructureOutput {} + + impl Hash + for EncryptPathStructureOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptPathStructureOutput::EncryptPathStructureOutput{encryptedStructure, parsedHeader, } => { + Hash::hash(encryptedStructure, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl ResolveAuthActionsInput { - pub fn tableName(&self) -> &Sequence { - match self { - ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => tableName, - } - } - pub fn authActions(&self) -> &Sequence> { - match self { - ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => authActions, - } - } - pub fn headerBytes(&self) -> &Sequence { - match self { - ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => headerBytes, - } - } - } + impl Default + for EncryptPathStructureOutput { + fn default() -> EncryptPathStructureOutput { + EncryptPathStructureOutput::EncryptPathStructureOutput { + encryptedStructure: Default::default(), + parsedHeader: Default::default() + } + } + } - impl Debug - for ResolveAuthActionsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for EncryptPathStructureOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ResolveAuthActionsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ResolveAuthActionsInput.ResolveAuthActionsInput(")?; - DafnyPrint::fmt_print(tableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(authActions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(headerBytes, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(74,3) + #[derive(PartialEq, Clone)] + pub enum EncryptStructureInput { + EncryptStructureInput { + tableName: Sequence, + plaintextStructure: Map, Arc>, + cryptoSchema: Map, Arc>, + cmm: Object, + algorithmSuiteId: Arc>>, + encryptionContext: Arc>> + } + } - impl Eq - for ResolveAuthActionsInput {} + impl EncryptStructureInput { + /// Returns a borrow of the field tableName + pub fn tableName(&self) -> &Sequence { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => tableName, + } + } + /// Returns a borrow of the field plaintextStructure + pub fn plaintextStructure(&self) -> &Map, Arc> { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => plaintextStructure, + } + } + /// Returns a borrow of the field cryptoSchema + pub fn cryptoSchema(&self) -> &Map, Arc> { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => cryptoSchema, + } + } + /// Returns a borrow of the field cmm + pub fn cmm(&self) -> &Object { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => cmm, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc>> { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Arc>> { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => encryptionContext, + } + } + } - impl Hash - for ResolveAuthActionsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => { - Hash::hash(tableName, _state); - Hash::hash(authActions, _state); - Hash::hash(headerBytes, _state) - }, - } - } - } + impl Debug + for EncryptStructureInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ResolveAuthActionsInput { - fn default() -> ResolveAuthActionsInput { - ResolveAuthActionsInput::ResolveAuthActionsInput { - tableName: Default::default(), - authActions: Default::default(), - headerBytes: Default::default() - } - } - } + impl DafnyPrint + for EncryptStructureInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptStructureInput.EncryptStructureInput(")?; + DafnyPrint::fmt_print(tableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cmm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ResolveAuthActionsInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for EncryptStructureInput {} + + impl Hash + for EncryptStructureInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptStructureInput::EncryptStructureInput{tableName, plaintextStructure, cryptoSchema, cmm, algorithmSuiteId, encryptionContext, } => { + Hash::hash(tableName, _state); + Hash::hash(plaintextStructure, _state); + Hash::hash(cryptoSchema, _state); + Hash::hash(cmm, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ResolveAuthActionsOutput { - ResolveAuthActionsOutput { - cryptoActions: Sequence> - } - } + impl Default + for EncryptStructureInput { + fn default() -> EncryptStructureInput { + EncryptStructureInput::EncryptStructureInput { + tableName: Default::default(), + plaintextStructure: Default::default(), + cryptoSchema: Default::default(), + cmm: Default::default(), + algorithmSuiteId: Default::default(), + encryptionContext: Default::default() + } + } + } - impl ResolveAuthActionsOutput { - pub fn cryptoActions(&self) -> &Sequence> { - match self { - ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => cryptoActions, - } - } - } + impl AsRef + for EncryptStructureInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ResolveAuthActionsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(82,3) + #[derive(PartialEq, Clone)] + pub enum EncryptStructureOutput { + EncryptStructureOutput { + encryptedStructure: Map, Arc>, + cryptoSchema: Map, Arc>, + parsedHeader: Arc + } + } - impl DafnyPrint - for ResolveAuthActionsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ResolveAuthActionsOutput.ResolveAuthActionsOutput(")?; - DafnyPrint::fmt_print(cryptoActions, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl EncryptStructureOutput { + /// Returns a borrow of the field encryptedStructure + pub fn encryptedStructure(&self) -> &Map, Arc> { + match self { + EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => encryptedStructure, + } + } + /// Returns a borrow of the field cryptoSchema + pub fn cryptoSchema(&self) -> &Map, Arc> { + match self { + EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => cryptoSchema, + } + } + /// Returns a borrow of the field parsedHeader + pub fn parsedHeader(&self) -> &Arc { + match self { + EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => parsedHeader, + } + } + } - impl Eq - for ResolveAuthActionsOutput {} + impl Debug + for EncryptStructureOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ResolveAuthActionsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => { - Hash::hash(cryptoActions, _state) - }, - } - } - } + impl DafnyPrint + for EncryptStructureOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.EncryptStructureOutput.EncryptStructureOutput(")?; + DafnyPrint::fmt_print(encryptedStructure, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cryptoSchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(parsedHeader, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ResolveAuthActionsOutput { - fn default() -> ResolveAuthActionsOutput { - ResolveAuthActionsOutput::ResolveAuthActionsOutput { - cryptoActions: Default::default() - } - } - } + impl Eq + for EncryptStructureOutput {} + + impl Hash + for EncryptStructureOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptStructureOutput::EncryptStructureOutput{encryptedStructure, cryptoSchema, parsedHeader, } => { + Hash::hash(encryptedStructure, _state); + Hash::hash(cryptoSchema, _state); + Hash::hash(parsedHeader, _state) + }, + } + } + } - impl AsRef - for &ResolveAuthActionsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for EncryptStructureOutput { + fn default() -> EncryptStructureOutput { + EncryptStructureOutput::EncryptStructureOutput { + encryptedStructure: Default::default(), + cryptoSchema: Default::default(), + parsedHeader: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum StructuredDataTerminal { - StructuredDataTerminal { - value: Sequence, - typeId: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::TerminalTypeId - } - } + impl AsRef + for EncryptStructureOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl StructuredDataTerminal { - pub fn value(&self) -> &Sequence { - match self { - StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => value, - } - } - pub fn typeId(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::TerminalTypeId { - match self { - StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => typeId, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(87,3) + #[derive(PartialEq, Clone)] + pub enum ParsedHeader { + ParsedHeader { + algorithmSuiteId: Arc, + encryptedDataKeys: Sequence>, + storedEncryptionContext: Map, + encryptionContext: Map + } + } - impl Debug - for StructuredDataTerminal { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ParsedHeader { + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptedDataKeys + pub fn encryptedDataKeys(&self) -> &Sequence> { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => encryptedDataKeys, + } + } + /// Returns a borrow of the field storedEncryptionContext + pub fn storedEncryptionContext(&self) -> &Map { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => storedEncryptionContext, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => encryptionContext, + } + } + } - impl DafnyPrint - for StructuredDataTerminal { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructuredDataTerminal.StructuredDataTerminal(")?; - DafnyPrint::fmt_print(value, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(typeId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ParsedHeader { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for StructuredDataTerminal {} + impl DafnyPrint + for ParsedHeader { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ParsedHeader.ParsedHeader(")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(storedEncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for StructuredDataTerminal { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => { - Hash::hash(value, _state); - Hash::hash(typeId, _state) - }, - } - } - } + impl Eq + for ParsedHeader {} + + impl Hash + for ParsedHeader { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ParsedHeader::ParsedHeader{algorithmSuiteId, encryptedDataKeys, storedEncryptionContext, encryptionContext, } => { + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptedDataKeys, _state); + Hash::hash(storedEncryptionContext, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl Default - for StructuredDataTerminal { - fn default() -> StructuredDataTerminal { - StructuredDataTerminal::StructuredDataTerminal { - value: Default::default(), - typeId: Default::default() - } - } - } + impl Default + for ParsedHeader { + fn default() -> ParsedHeader { + ParsedHeader::ParsedHeader { + algorithmSuiteId: Default::default(), + encryptedDataKeys: Default::default(), + storedEncryptionContext: Default::default(), + encryptionContext: Default::default() + } + } + } - impl AsRef - for &StructuredDataTerminal { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ParsedHeader { + fn as_ref(&self) -> &Self { + self + } + } - pub struct IStructuredEncryptionClientCallHistory {} + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(94,3) + #[derive(PartialEq, Clone)] + pub enum PathSegment { + member { + member: Arc + } + } - impl IStructuredEncryptionClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl PathSegment { + /// Returns a borrow of the field member + pub fn member(&self) -> &Arc { + match self { + PathSegment::member{member, } => member, + } + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClientCallHistory { - UpcastObjectFn!(dyn Any); - } + impl Debug + for PathSegment { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub trait IStructuredEncryptionClient: Any + UpcastObject { - fn EncryptStructure(&self, input: &Rc) -> Rc, Rc>>; - fn DecryptStructure(&self, input: &Rc) -> Rc, Rc>>; - fn EncryptPathStructure(&self, input: &Rc) -> Rc, Rc>>; - fn DecryptPathStructure(&self, input: &Rc) -> Rc, Rc>>; - fn ResolveAuthActions(&self, input: &Rc) -> Rc, Rc>>; - } + impl DafnyPrint + for PathSegment { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PathSegment::member{member, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.PathSegment.member(")?; + DafnyPrint::fmt_print(member, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum StructuredEncryptionConfig { - StructuredEncryptionConfig {} - } + impl Eq + for PathSegment {} - impl StructuredEncryptionConfig {} + impl Hash + for PathSegment { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PathSegment::member{member, } => { + Hash::hash(member, _state) + }, + } + } + } - impl Debug - for StructuredEncryptionConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for PathSegment { + fn default() -> PathSegment { + PathSegment::member { + member: Default::default() + } + } + } - impl DafnyPrint - for StructuredEncryptionConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StructuredEncryptionConfig::StructuredEncryptionConfig{} => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructuredEncryptionConfig.StructuredEncryptionConfig")?; - Ok(()) - }, - } - } - } + impl AsRef + for PathSegment { + fn as_ref(&self) -> &Self { + self + } + } - impl StructuredEncryptionConfig { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(StructuredEncryptionConfig::StructuredEncryptionConfig {})].iter() - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(96,3) + #[derive(PartialEq, Clone)] + pub enum ResolveAuthActionsInput { + ResolveAuthActionsInput { + tableName: Sequence, + authActions: Sequence>, + headerBytes: Sequence + } + } - impl Eq - for StructuredEncryptionConfig {} + impl ResolveAuthActionsInput { + /// Returns a borrow of the field tableName + pub fn tableName(&self) -> &Sequence { + match self { + ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => tableName, + } + } + /// Returns a borrow of the field authActions + pub fn authActions(&self) -> &Sequence> { + match self { + ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => authActions, + } + } + /// Returns a borrow of the field headerBytes + pub fn headerBytes(&self) -> &Sequence { + match self { + ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => headerBytes, + } + } + } - impl Hash - for StructuredEncryptionConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StructuredEncryptionConfig::StructuredEncryptionConfig{} => { + impl Debug + for ResolveAuthActionsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for ResolveAuthActionsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ResolveAuthActionsInput.ResolveAuthActionsInput(")?; + DafnyPrint::fmt_print(tableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(authActions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(headerBytes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for StructuredEncryptionConfig { - fn default() -> StructuredEncryptionConfig { - StructuredEncryptionConfig::StructuredEncryptionConfig {} - } - } + impl Eq + for ResolveAuthActionsInput {} + + impl Hash + for ResolveAuthActionsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ResolveAuthActionsInput::ResolveAuthActionsInput{tableName, authActions, headerBytes, } => { + Hash::hash(tableName, _state); + Hash::hash(authActions, _state); + Hash::hash(headerBytes, _state) + }, + } + } + } - impl AsRef - for &StructuredEncryptionConfig { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ResolveAuthActionsInput { + fn default() -> ResolveAuthActionsInput { + ResolveAuthActionsInput::ResolveAuthActionsInput { + tableName: Default::default(), + authActions: Default::default(), + headerBytes: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum StructureSegment { - StructureSegment { - key: Sequence - } - } + impl AsRef + for ResolveAuthActionsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl StructureSegment { - pub fn key(&self) -> &Sequence { - match self { - StructureSegment::StructureSegment{key, } => key, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(101,3) + #[derive(PartialEq, Clone)] + pub enum ResolveAuthActionsOutput { + ResolveAuthActionsOutput { + cryptoActions: Sequence> + } + } - impl Debug - for StructureSegment { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ResolveAuthActionsOutput { + /// Returns a borrow of the field cryptoActions + pub fn cryptoActions(&self) -> &Sequence> { + match self { + ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => cryptoActions, + } + } + } - impl DafnyPrint - for StructureSegment { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StructureSegment::StructureSegment{key, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructureSegment.StructureSegment(")?; - DafnyPrint::fmt_print(key, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ResolveAuthActionsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for StructureSegment {} + impl DafnyPrint + for ResolveAuthActionsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.ResolveAuthActionsOutput.ResolveAuthActionsOutput(")?; + DafnyPrint::fmt_print(cryptoActions, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for StructureSegment { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StructureSegment::StructureSegment{key, } => { - Hash::hash(key, _state) - }, - } - } - } + impl Eq + for ResolveAuthActionsOutput {} - impl Default - for StructureSegment { - fn default() -> StructureSegment { - StructureSegment::StructureSegment { - key: Default::default() - } - } - } + impl Hash + for ResolveAuthActionsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ResolveAuthActionsOutput::ResolveAuthActionsOutput{cryptoActions, } => { + Hash::hash(cryptoActions, _state) + }, + } + } + } - impl AsRef - for &StructureSegment { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ResolveAuthActionsOutput { + fn default() -> ResolveAuthActionsOutput { + ResolveAuthActionsOutput::ResolveAuthActionsOutput { + cryptoActions: Default::default() + } + } + } - pub type TerminalTypeId = Sequence; + impl AsRef + for ResolveAuthActionsOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - StructuredEncryptionException { - message: Sequence - }, - AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: Rc - }, - AwsCryptographyPrimitives { - AwsCryptographyPrimitives: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::StructuredEncryptionException{message, } => message, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyMaterialProviders(&self) -> &Rc { - match self { - Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyPrimitives(&self) -> &Rc { - match self { - Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } - - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(105,3) + #[derive(PartialEq, Clone)] + pub enum StructuredDataTerminal { + StructuredDataTerminal { + value: Sequence, + typeId: crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::TerminalTypeId + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::StructuredEncryptionException{message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.StructuredEncryptionException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; - DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.AwsCryptographyPrimitives(")?; - DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl StructuredDataTerminal { + /// Returns a borrow of the field value + pub fn value(&self) -> &Sequence { + match self { + StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => value, + } + } + /// Returns a borrow of the field typeId + pub fn typeId(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::TerminalTypeId { + match self { + StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => typeId, + } + } + } - impl Eq - for Error {} + impl Debug + for StructuredDataTerminal { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::StructuredEncryptionException{message, } => { - Hash::hash(message, _state) - }, - Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { - Hash::hash(AwsCryptographyMaterialProviders, _state) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - Hash::hash(AwsCryptographyPrimitives, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } - - impl Default - for Error { - fn default() -> Error { - Error::StructuredEncryptionException { - message: Default::default() - } - } - } - - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } - - pub type OpaqueError = Rc; - - pub type DummySubsetType = DafnyInt; - - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } - } - - pub mod keystore { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KeyStoreConfig; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_AwsArnParsing_Compile::AwsKmsArn; - pub use crate::implementation_from_dafny::r#_AwsArnParsing_Compile::AwsArn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration::mrDiscovery; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result::Success; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput; - - pub struct _default {} - - impl _default { - pub fn DefaultKeyStoreConfig() -> Rc { - Rc::new(KeyStoreConfig::KeyStoreConfig { - ddbTableName: string_utf16_of("None"), - kmsConfiguration: Rc::new(KMSConfiguration::kmsKeyArn { - kmsKeyArn: string_utf16_of("arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab") - }), - logicalKeyStoreName: string_utf16_of("None"), - id: Rc::new(Option::>::None {}), - grantTokens: Rc::new(Option::>>::None {}), - ddbClient: Rc::new(Option::>::None {}), - kmsClient: Rc::new(Option::>::None {}) - }) - } - pub fn KeyStore(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut kmsClient = MaybePlacebo::>::new(); - let mut ddbClient = MaybePlacebo::>::new(); - let mut inferredRegion: Rc>> = Rc::new(Option::>::None {}); - if crate::implementation_from_dafny::r#_KMSKeystoreOperations_Compile::_default::HasKeyId(config.kmsConfiguration()) { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_KmsArn_Compile::_default::IsValidKeyArn(&crate::implementation_from_dafny::r#_KMSKeystoreOperations_Compile::_default::GetKeyId(config.kmsConfiguration())); - if valueOrError0.IsFailure() { - res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); - return res.read(); - }; - let mut parsedArn: Rc = valueOrError0.Extract(); - inferredRegion = Rc::new(Option::>::Some { - value: parsedArn.region().clone() - }); - } else { - if matches!(config.kmsConfiguration().as_ref(), mrDiscovery{ .. }) { - inferredRegion = Rc::new(Option::>::Some { - value: config.kmsConfiguration().mrDiscovery().region().clone() - }); - } - }; - let mut grantTokens: Rc>, Rc>> = crate::implementation_from_dafny::r#_AwsKmsUtils_Compile::_default::GetValidGrantTokens(config.grantTokens()); - let mut valueOrError1 = MaybePlacebo::>>>::new(); - valueOrError1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(true && matches!((&grantTokens).as_ref(), Success{ .. }), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { - message: string_utf16_of("Grant Tokens passed to Key Store configuration are invalid.") - }))); - if valueOrError1.read().IsFailure() { - res = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return res.read(); - }; - let mut keyStoreId = MaybePlacebo::>::new(); - if matches!(config.id().as_ref(), Some{ .. }) { - keyStoreId = MaybePlacebo::from(config.id().value().clone()); - } else { - let mut maybeUuid = MaybePlacebo::, Sequence>>>::new(); - let mut _out0 = MaybePlacebo::, Sequence>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::UUID::_default::GenerateUUID()); - maybeUuid = MaybePlacebo::from(_out0.read()); - let mut valueOrError2 = MaybePlacebo::, Rc>>>::new(); - valueOrError2 = MaybePlacebo::from(maybeUuid.read().MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { - message: e.clone() - }) - }) - }))); - if valueOrError2.read().IsFailure() { - res = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return res.read(); - }; - let mut uuid: Sequence = valueOrError2.read().Extract(); - keyStoreId = MaybePlacebo::from(uuid.clone()); - }; - if matches!(config.kmsClient().as_ref(), Some{ .. }) { - kmsClient = MaybePlacebo::from(config.kmsClient().value().clone()); - } else { - if matches!(config.kmsClient().as_ref(), None{ .. }) && matches!((&inferredRegion).as_ref(), Some{ .. }) { - let mut maybeKmsClient = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::_default::KMSClientForRegion(inferredRegion.value())); - maybeKmsClient = MaybePlacebo::from(_out1.read()); - let mut valueOrError3: Rc, Rc>> = maybeKmsClient.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsKms { - ComAmazonawsKms: e.clone() - }) - }) - })); - if valueOrError3.IsFailure() { - res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); - return res.read(); - }; - kmsClient = MaybePlacebo::from(valueOrError3.Extract()); - } else { - let mut maybeKmsClient = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::_default::KMSClient()); - maybeKmsClient = MaybePlacebo::from(_out2.read()); - let mut valueOrError4: Rc, Rc>> = maybeKmsClient.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsKms { - ComAmazonawsKms: e.clone() - }) - }) - })); - if valueOrError4.IsFailure() { - res = MaybePlacebo::from(valueOrError4.PropagateFailure::>()); - return res.read(); - }; - kmsClient = MaybePlacebo::from(valueOrError4.Extract()); - } - }; - if matches!(config.ddbClient().as_ref(), Some{ .. }) { - ddbClient = MaybePlacebo::from(config.ddbClient().value().clone()); - } else { - if matches!(config.ddbClient().as_ref(), None{ .. }) && matches!((&inferredRegion).as_ref(), Some{ .. }) { - let mut maybeDdbClient = MaybePlacebo::, Rc>>>::new(); - let mut _out3 = MaybePlacebo::, Rc>>>::new(); - _out3 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::_default::DDBClientForRegion(inferredRegion.value())); - maybeDdbClient = MaybePlacebo::from(_out3.read()); - let mut valueOrError5: Rc, Rc>> = maybeDdbClient.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsDynamodb { - ComAmazonawsDynamodb: e.clone() - }) - }) - })); - if valueOrError5.IsFailure() { - res = MaybePlacebo::from(valueOrError5.PropagateFailure::>()); - return res.read(); - }; - ddbClient = MaybePlacebo::from(valueOrError5.Extract()); - } else { - let mut maybeDdbClient = MaybePlacebo::, Rc>>>::new(); - let mut _out4 = MaybePlacebo::, Rc>>>::new(); - _out4 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::_default::DynamoDBClient()); - maybeDdbClient = MaybePlacebo::from(_out4.read()); - let mut valueOrError6: Rc, Rc>> = maybeDdbClient.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsDynamodb { - ComAmazonawsDynamodb: e.clone() - }) - }) - })); - if valueOrError6.IsFailure() { - res = MaybePlacebo::from(valueOrError6.PropagateFailure::>()); - return res.read(); - }; - ddbClient = MaybePlacebo::from(valueOrError6.Extract()); - } - }; - let mut valueOrError7 = MaybePlacebo::>>>::new(); - valueOrError7 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_TableName(config.ddbTableName()), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { - message: string_utf16_of("Invalid Amazon DynamoDB Table Name") - }))); - if valueOrError7.read().IsFailure() { - res = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return res.read(); - }; - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient::_ctor(&_nw0, &Rc::new(Config::Config { - id: keyStoreId.read(), - ddbTableName: config.ddbTableName().clone(), - logicalKeyStoreName: config.logicalKeyStoreName().clone(), - kmsConfiguration: config.kmsConfiguration().clone(), - grantTokens: grantTokens.value().clone(), - kmsClient: kmsClient.read(), - ddbClient: ddbClient.read() - })); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } - - pub struct KeyStoreClient { - pub r#__i_config: Rc - } - - impl KeyStoreClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { - UpcastObjectFn!(dyn Any); - } - - impl IKeyStoreClient - for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { - fn GetKeyStoreInfo(&self) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::GetKeyStoreInfo(&self.config().clone())); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateKeyStore(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::CreateKeyStore(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::CreateKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn VersionKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::VersionKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetActiveBranchKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::GetActiveBranchKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetBranchKeyVersion(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::GetBranchKeyVersion(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn GetBeaconKey(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyKeyStoreOperations_Compile::_default::GetBeaconKey(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { - UpcastObjectFn!(dyn IKeyStoreClient); - } - - pub mod types { - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; + impl DafnyPrint + for StructuredDataTerminal { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructuredDataTerminal.StructuredDataTerminal(")?; + DafnyPrint::fmt_print(value, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(typeId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub struct _default {} + impl Eq + for StructuredDataTerminal {} + + impl Hash + for StructuredDataTerminal { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StructuredDataTerminal::StructuredDataTerminal{value, typeId, } => { + Hash::hash(value, _state); + Hash::hash(typeId, _state) + }, + } + } + } - impl _default { - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } + impl Default + for StructuredDataTerminal { + fn default() -> StructuredDataTerminal { + StructuredDataTerminal::StructuredDataTerminal { + value: Default::default(), + typeId: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + impl AsRef + for StructuredDataTerminal { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(109,3) + pub struct IStructuredEncryptionClientCallHistory {} - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl IStructuredEncryptionClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for DafnyCallEvent {} + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(123,3) + pub trait IStructuredEncryptionClient: Any + Sync + Send + UpcastObject { + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(152,5) + fn EncryptStructure(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(171,5) + fn DecryptStructure(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(190,5) + fn EncryptPathStructure(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(209,5) + fn DecryptPathStructure(&self, input: &Arc) -> Arc, Arc>>; + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(228,5) + fn ResolveAuthActions(&self, input: &Arc) -> Arc, Arc>>; + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(242,3) + #[derive(PartialEq, Clone)] + pub enum StructuredEncryptionConfig { + StructuredEncryptionConfig {} + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl StructuredEncryptionConfig {} - #[derive(PartialEq, Clone)] - pub enum BeaconKeyMaterials { - BeaconKeyMaterials { - beaconKeyIdentifier: Sequence, - encryptionContext: Map, - beaconKey: Rc>>, - hmacKeys: Rc, Sequence>>> - } - } + impl Debug + for StructuredEncryptionConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl BeaconKeyMaterials { - pub fn beaconKeyIdentifier(&self) -> &Sequence { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => beaconKeyIdentifier, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => encryptionContext, - } - } - pub fn beaconKey(&self) -> &Rc>> { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => beaconKey, - } - } - pub fn hmacKeys(&self) -> &Rc, Sequence>>> { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => hmacKeys, - } - } - } + impl DafnyPrint + for StructuredEncryptionConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StructuredEncryptionConfig::StructuredEncryptionConfig{} => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructuredEncryptionConfig.StructuredEncryptionConfig")?; + Ok(()) + }, + } + } + } - impl Debug - for BeaconKeyMaterials { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl StructuredEncryptionConfig { + /// Enumerates all possible values of StructuredEncryptionConfig + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(StructuredEncryptionConfig::StructuredEncryptionConfig {})].iter() + } + } - impl DafnyPrint - for BeaconKeyMaterials { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.BeaconKeyMaterials.BeaconKeyMaterials(")?; - DafnyPrint::fmt_print(beaconKeyIdentifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(beaconKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(hmacKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for StructuredEncryptionConfig {} - impl Eq - for BeaconKeyMaterials {} + impl Hash + for StructuredEncryptionConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StructuredEncryptionConfig::StructuredEncryptionConfig{} => { - impl Hash - for BeaconKeyMaterials { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => { - Hash::hash(beaconKeyIdentifier, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(beaconKey, _state); - Hash::hash(hmacKeys, _state) - }, - } - } - } + }, + } + } + } - impl Default - for BeaconKeyMaterials { - fn default() -> BeaconKeyMaterials { - BeaconKeyMaterials::BeaconKeyMaterials { - beaconKeyIdentifier: Default::default(), - encryptionContext: Default::default(), - beaconKey: Default::default(), - hmacKeys: Default::default() - } - } - } + impl Default + for StructuredEncryptionConfig { + fn default() -> StructuredEncryptionConfig { + StructuredEncryptionConfig::StructuredEncryptionConfig {} + } + } - impl AsRef - for &BeaconKeyMaterials { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for StructuredEncryptionConfig { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BranchKeyMaterials { - BranchKeyMaterials { - branchKeyIdentifier: Sequence, - branchKeyVersion: ValidUTF8Bytes, - encryptionContext: Map, - branchKey: Sequence - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(245,3) + #[derive(PartialEq, Clone)] + pub enum StructureSegment { + StructureSegment { + key: Sequence + } + } - impl BranchKeyMaterials { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKeyIdentifier, - } - } - pub fn branchKeyVersion(&self) -> &ValidUTF8Bytes { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKeyVersion, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => encryptionContext, - } - } - pub fn branchKey(&self) -> &Sequence { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKey, - } - } - } + impl StructureSegment { + /// Returns a borrow of the field key + pub fn key(&self) -> &Sequence { + match self { + StructureSegment::StructureSegment{key, } => key, + } + } + } - impl Debug - for BranchKeyMaterials { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for StructureSegment { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BranchKeyMaterials { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.BranchKeyMaterials.BranchKeyMaterials(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for StructureSegment { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StructureSegment::StructureSegment{key, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.StructureSegment.StructureSegment(")?; + DafnyPrint::fmt_print(key, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BranchKeyMaterials {} + impl Eq + for StructureSegment {} - impl Hash - for BranchKeyMaterials { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => { - Hash::hash(branchKeyIdentifier, _state); - Hash::hash(branchKeyVersion, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(branchKey, _state) - }, - } - } - } + impl Hash + for StructureSegment { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StructureSegment::StructureSegment{key, } => { + Hash::hash(key, _state) + }, + } + } + } - impl Default - for BranchKeyMaterials { - fn default() -> BranchKeyMaterials { - BranchKeyMaterials::BranchKeyMaterials { - branchKeyIdentifier: Default::default(), - branchKeyVersion: Default::default(), - encryptionContext: Default::default(), - branchKey: Default::default() - } - } - } + impl Default + for StructureSegment { + fn default() -> StructureSegment { + StructureSegment::StructureSegment { + key: Default::default() + } + } + } - impl AsRef - for &BranchKeyMaterials { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for StructureSegment { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateKeyInput { - CreateKeyInput { - branchKeyIdentifier: Rc>>, - encryptionContext: Rc>> - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(248,3) + pub type TerminalTypeId = Sequence; + + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(253,3) + #[derive(PartialEq, Clone)] + pub enum Error { + StructuredEncryptionException { + message: Sequence + }, + AwsCryptographyMaterialProviders { + AwsCryptographyMaterialProviders: Arc + }, + AwsCryptographyPrimitives { + AwsCryptographyPrimitives: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - impl CreateKeyInput { - pub fn branchKeyIdentifier(&self) -> &Rc>> { - match self { - CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => branchKeyIdentifier, - } - } - pub fn encryptionContext(&self) -> &Rc>> { - match self { - CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => encryptionContext, - } - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::StructuredEncryptionException{message, } => message, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyMaterialProviders for all enum members which have it + pub fn AwsCryptographyMaterialProviders(&self) -> &Arc { + match self { + Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => AwsCryptographyMaterialProviders, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyPrimitives for all enum members which have it + pub fn AwsCryptographyPrimitives(&self) -> &Arc { + match self { + Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::StructuredEncryptionException{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - impl Debug - for CreateKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyInput.CreateKeyInput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::StructuredEncryptionException{message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.StructuredEncryptionException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.AwsCryptographyMaterialProviders(")?; + DafnyPrint::fmt_print(AwsCryptographyMaterialProviders, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.AwsCryptographyPrimitives(")?; + DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.dbencryptionsdk.structuredencryption.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateKeyInput {} + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::StructuredEncryptionException{message, } => { + Hash::hash(message, _state) + }, + Error::AwsCryptographyMaterialProviders{AwsCryptographyMaterialProviders, } => { + Hash::hash(AwsCryptographyMaterialProviders, _state) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + Hash::hash(AwsCryptographyPrimitives, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl Hash - for CreateKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => { - Hash::hash(branchKeyIdentifier, _state); - Hash::hash(encryptionContext, _state) - }, - } - } - } + impl Default + for Error { + fn default() -> Error { + Error::StructuredEncryptionException { + message: Default::default() + } + } + } - impl Default - for CreateKeyInput { - fn default() -> CreateKeyInput { - CreateKeyInput::CreateKeyInput { - branchKeyIdentifier: Default::default(), - encryptionContext: Default::default() - } - } - } + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CreateKeyInput { - fn as_ref(&self) -> Self { - self - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(289,3) + pub type OpaqueError = Arc; - #[derive(PartialEq, Clone)] - pub enum CreateKeyOutput { - CreateKeyOutput { - branchKeyIdentifier: Sequence - } - } + /// dafny/StructuredEncryption/Model/AwsCryptographyDbEncryptionSdkStructuredEncryptionTypes.dfy(292,3) + pub type DummySubsetType = DafnyInt; - impl CreateKeyOutput { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => branchKeyIdentifier, + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } + } } - } } - impl Debug - for CreateKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + pub mod keystore { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/src/Index.dfy(9,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KeyStoreConfig; + pub use ::dafny_runtime::string_utf16_of; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::_AwsArnParsing_Compile::AwsKmsArn; + pub use crate::implementation_from_dafny::_AwsArnParsing_Compile::AwsArn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::KMSConfiguration::mrDiscovery; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Outcome; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result::Success; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::Some; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option::None; + pub use crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetKeyStoreInfoOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyStoreOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::CreateKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::VersionKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::VersionKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetActiveBranchKeyOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBranchKeyVersionOutput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::GetBeaconKeyOutput; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/src/Index.dfy(23,3) + pub fn DefaultKeyStoreConfig() -> Arc { + Arc::new(KeyStoreConfig::KeyStoreConfig { + ddbTableName: string_utf16_of("None"), + kmsConfiguration: Arc::new(KMSConfiguration::kmsKeyArn { + kmsKeyArn: string_utf16_of("arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab") + }), + logicalKeyStoreName: string_utf16_of("None"), + id: Arc::new(Option::>::None {}), + grantTokens: Arc::new(Option::>>::None {}), + ddbClient: Arc::new(Option::>::None {}), + kmsClient: Arc::new(Option::>::None {}) + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/src/Index.dfy(36,3) + pub fn KeyStore(config: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut kmsClient: Object; + let mut ddbClient: Object; + let mut inferredRegion: Arc>> = Arc::new(Option::>::None {}); + if crate::implementation_from_dafny::_KMSKeystoreOperations_Compile::_default::HasKeyId(config.kmsConfiguration()) { + let mut valueOrError0: Arc>> = crate::implementation_from_dafny::_KmsArn_Compile::_default::IsValidKeyArn(&crate::implementation_from_dafny::_KMSKeystoreOperations_Compile::_default::GetKeyId(config.kmsConfiguration())); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut parsedArn: Arc = valueOrError0.Extract(); + inferredRegion = Arc::new(Option::>::Some { + value: parsedArn.region().clone() + }); + } else { + if matches!(config.kmsConfiguration().as_ref(), mrDiscovery{ .. }) { + inferredRegion = Arc::new(Option::>::Some { + value: config.kmsConfiguration().mrDiscovery().region().clone() + }); + } + }; + let mut grantTokens: Arc>, Arc>> = crate::implementation_from_dafny::_AwsKmsUtils_Compile::_default::GetValidGrantTokens(config.grantTokens()); + let mut valueOrError1: Arc>>; + valueOrError1 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(true && matches!((&grantTokens).as_ref(), Success{ .. }), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { + message: string_utf16_of("Grant Tokens passed to Key Store configuration are invalid.") + })); + if valueOrError1.IsFailure() { + res = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); + return res.read(); + }; + let mut keyStoreId: Sequence; + if matches!(config.id().as_ref(), Some{ .. }) { + keyStoreId = config.id().value().clone(); + } else { + let mut maybeUuid: Arc, Sequence>>; + let mut _out0: Arc, Sequence>>; + _out0 = crate::implementation_from_dafny::UUID::_default::GenerateUUID(); + maybeUuid = _out0.clone(); + let mut valueOrError2: Arc, Arc>>; + valueOrError2 = maybeUuid.MapFailure::>(&({ + Arc::new(move |e: &Sequence| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { + message: e.clone() + }) + }) + })); + if valueOrError2.IsFailure() { + res = MaybePlacebo::from(valueOrError2.PropagateFailure::>()); + return res.read(); + }; + let mut uuid: Sequence = valueOrError2.Extract(); + keyStoreId = uuid.clone(); + }; + if matches!(config.kmsClient().as_ref(), Some{ .. }) { + kmsClient = config.kmsClient().value().clone(); + } else { + if matches!(config.kmsClient().as_ref(), None{ .. }) && matches!((&inferredRegion).as_ref(), Some{ .. }) { + let mut maybeKmsClient: Arc, Arc>>; + let mut _out1: Arc, Arc>>; + _out1 = crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::_default::KMSClientForRegion(inferredRegion.value()); + maybeKmsClient = _out1.clone(); + let mut valueOrError3: Arc, Arc>> = maybeKmsClient.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsKms { + ComAmazonawsKms: e.clone() + }) + }) + })); + if valueOrError3.IsFailure() { + res = MaybePlacebo::from(valueOrError3.PropagateFailure::>()); + return res.read(); + }; + kmsClient = valueOrError3.Extract(); + } else { + let mut maybeKmsClient: Arc, Arc>>; + let mut _out2: Arc, Arc>>; + _out2 = crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::_default::KMSClient(); + maybeKmsClient = _out2.clone(); + let mut valueOrError4: Arc, Arc>> = maybeKmsClient.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsKms { + ComAmazonawsKms: e.clone() + }) + }) + })); + if valueOrError4.IsFailure() { + res = MaybePlacebo::from(valueOrError4.PropagateFailure::>()); + return res.read(); + }; + kmsClient = valueOrError4.Extract(); + } + }; + if matches!(config.ddbClient().as_ref(), Some{ .. }) { + ddbClient = config.ddbClient().value().clone(); + } else { + if matches!(config.ddbClient().as_ref(), None{ .. }) && matches!((&inferredRegion).as_ref(), Some{ .. }) { + let mut maybeDdbClient: Arc, Arc>>; + let mut _out3: Arc, Arc>>; + _out3 = crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::_default::DDBClientForRegion(inferredRegion.value()); + maybeDdbClient = _out3.clone(); + let mut valueOrError5: Arc, Arc>> = maybeDdbClient.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsDynamodb { + ComAmazonawsDynamodb: e.clone() + }) + }) + })); + if valueOrError5.IsFailure() { + res = MaybePlacebo::from(valueOrError5.PropagateFailure::>()); + return res.read(); + }; + ddbClient = valueOrError5.Extract(); + } else { + let mut maybeDdbClient: Arc, Arc>>; + let mut _out4: Arc, Arc>>; + _out4 = crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::_default::DynamoDBClient(); + maybeDdbClient = _out4.clone(); + let mut valueOrError6: Arc, Arc>> = maybeDdbClient.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::ComAmazonawsDynamodb { + ComAmazonawsDynamodb: e.clone() + }) + }) + })); + if valueOrError6.IsFailure() { + res = MaybePlacebo::from(valueOrError6.PropagateFailure::>()); + return res.read(); + }; + ddbClient = valueOrError6.Extract(); + } + }; + let mut valueOrError7: Arc>>; + valueOrError7 = crate::implementation_from_dafny::_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_TableName(config.ddbTableName()), &Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::Error::KeyStoreException { + message: string_utf16_of("Invalid Amazon DynamoDB Table Name") + })); + if valueOrError7.IsFailure() { + res = MaybePlacebo::from(valueOrError7.PropagateFailure::>()); + return res.read(); + }; + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient::_ctor(&_nw0, &Arc::new(Config::Config { + id: keyStoreId.clone(), + ddbTableName: config.ddbTableName().clone(), + logicalKeyStoreName: config.logicalKeyStoreName().clone(), + kmsConfiguration: config.kmsConfiguration().clone(), + grantTokens: grantTokens.value().clone(), + kmsClient: kmsClient.clone(), + ddbClient: ddbClient.clone() + })); + client = _nw0.clone(); + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: client.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(335,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(338,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl DafnyPrint - for CreateKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyOutput.CreateKeyOutput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/src/Index.dfy(187,3) + pub struct KeyStoreClient { + pub __i_config: Arc + } - impl Eq - for CreateKeyOutput {} + impl KeyStoreClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/src/Index.dfy(195,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(349,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl Hash - for CreateKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => { - Hash::hash(branchKeyIdentifier, _state) - }, - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { + UpcastObjectFn!(DynAny); + } - impl Default - for CreateKeyOutput { - fn default() -> CreateKeyOutput { - CreateKeyOutput::CreateKeyOutput { - branchKeyIdentifier: Default::default() - } - } - } + impl IKeyStoreClient + for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(358,5) + fn GetKeyStoreInfo(&self) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::GetKeyStoreInfo(&self.config().clone()); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(378,5) + fn CreateKeyStore(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::CreateKeyStore(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(398,5) + fn CreateKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::CreateKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(418,5) + fn VersionKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::VersionKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(438,5) + fn GetActiveBranchKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::GetActiveBranchKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(458,5) + fn GetBranchKeyVersion(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::GetBranchKeyVersion(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(478,5) + fn GetBeaconKey(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyKeyStoreOperations_Compile::_default::GetBeaconKey(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + } - impl AsRef - for &CreateKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::KeyStoreClient { + UpcastObjectFn!(dyn IKeyStoreClient); + } - #[derive(PartialEq, Clone)] - pub enum CreateKeyStoreInput { - CreateKeyStoreInput {} - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(7,1) + pub mod types { + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(292,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl CreateKeyStoreInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(15,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl Debug - for CreateKeyStoreInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl DafnyPrint - for CreateKeyStoreInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyStoreInput::CreateKeyStoreInput{} => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyStoreInput.CreateKeyStoreInput")?; - Ok(()) - }, - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl CreateKeyStoreInput { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CreateKeyStoreInput::CreateKeyStoreInput {})].iter() - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateKeyStoreInput {} + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Hash - for CreateKeyStoreInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyStoreInput::CreateKeyStoreInput{} => { + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - }, - } - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for CreateKeyStoreInput { - fn default() -> CreateKeyStoreInput { - CreateKeyStoreInput::CreateKeyStoreInput {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(19,3) + #[derive(PartialEq, Clone)] + pub enum BeaconKeyMaterials { + BeaconKeyMaterials { + beaconKeyIdentifier: Sequence, + encryptionContext: Map, + beaconKey: Arc>>, + hmacKeys: Arc, Sequence>>> + } + } - impl AsRef - for &CreateKeyStoreInput { - fn as_ref(&self) -> Self { - self - } - } + impl BeaconKeyMaterials { + /// Returns a borrow of the field beaconKeyIdentifier + pub fn beaconKeyIdentifier(&self) -> &Sequence { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => beaconKeyIdentifier, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => encryptionContext, + } + } + /// Returns a borrow of the field beaconKey + pub fn beaconKey(&self) -> &Arc>> { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => beaconKey, + } + } + /// Returns a borrow of the field hmacKeys + pub fn hmacKeys(&self) -> &Arc, Sequence>>> { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => hmacKeys, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateKeyStoreOutput { - CreateKeyStoreOutput { - tableArn: Sequence - } - } + impl Debug + for BeaconKeyMaterials { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl CreateKeyStoreOutput { - pub fn tableArn(&self) -> &Sequence { - match self { - CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => tableArn, - } - } - } + impl DafnyPrint + for BeaconKeyMaterials { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.BeaconKeyMaterials.BeaconKeyMaterials(")?; + DafnyPrint::fmt_print(beaconKeyIdentifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(beaconKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(hmacKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for CreateKeyStoreOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for BeaconKeyMaterials {} + + impl Hash + for BeaconKeyMaterials { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BeaconKeyMaterials::BeaconKeyMaterials{beaconKeyIdentifier, encryptionContext, beaconKey, hmacKeys, } => { + Hash::hash(beaconKeyIdentifier, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(beaconKey, _state); + Hash::hash(hmacKeys, _state) + }, + } + } + } - impl DafnyPrint - for CreateKeyStoreOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyStoreOutput.CreateKeyStoreOutput(")?; - DafnyPrint::fmt_print(tableArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for BeaconKeyMaterials { + fn default() -> BeaconKeyMaterials { + BeaconKeyMaterials::BeaconKeyMaterials { + beaconKeyIdentifier: Default::default(), + encryptionContext: Default::default(), + beaconKey: Default::default(), + hmacKeys: Default::default() + } + } + } - impl Eq - for CreateKeyStoreOutput {} + impl AsRef + for BeaconKeyMaterials { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for CreateKeyStoreOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => { - Hash::hash(tableArn, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(25,3) + #[derive(PartialEq, Clone)] + pub enum BranchKeyMaterials { + BranchKeyMaterials { + branchKeyIdentifier: Sequence, + branchKeyVersion: ValidUTF8Bytes, + encryptionContext: Map, + branchKey: Sequence + } + } - impl Default - for CreateKeyStoreOutput { - fn default() -> CreateKeyStoreOutput { - CreateKeyStoreOutput::CreateKeyStoreOutput { - tableArn: Default::default() - } - } - } + impl BranchKeyMaterials { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKeyIdentifier, + } + } + /// Returns a borrow of the field branchKeyVersion + pub fn branchKeyVersion(&self) -> &ValidUTF8Bytes { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKeyVersion, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => encryptionContext, + } + } + /// Returns a borrow of the field branchKey + pub fn branchKey(&self) -> &Sequence { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => branchKey, + } + } + } - impl AsRef - for &CreateKeyStoreOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for BranchKeyMaterials { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum Discovery { - Discovery {} - } + impl DafnyPrint + for BranchKeyMaterials { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.BranchKeyMaterials.BranchKeyMaterials(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Discovery {} + impl Eq + for BranchKeyMaterials {} + + impl Hash + for BranchKeyMaterials { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BranchKeyMaterials::BranchKeyMaterials{branchKeyIdentifier, branchKeyVersion, encryptionContext, branchKey, } => { + Hash::hash(branchKeyIdentifier, _state); + Hash::hash(branchKeyVersion, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(branchKey, _state) + }, + } + } + } - impl Debug - for Discovery { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for BranchKeyMaterials { + fn default() -> BranchKeyMaterials { + BranchKeyMaterials::BranchKeyMaterials { + branchKeyIdentifier: Default::default(), + branchKeyVersion: Default::default(), + encryptionContext: Default::default(), + branchKey: Default::default() + } + } + } - impl DafnyPrint - for Discovery { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Discovery::Discovery{} => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Discovery.Discovery")?; - Ok(()) - }, - } - } - } + impl AsRef + for BranchKeyMaterials { + fn as_ref(&self) -> &Self { + self + } + } - impl Discovery { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(Discovery::Discovery {})].iter() - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(31,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyInput { + CreateKeyInput { + branchKeyIdentifier: Arc>>, + encryptionContext: Arc>> + } + } - impl Eq - for Discovery {} + impl CreateKeyInput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Arc>> { + match self { + CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => branchKeyIdentifier, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Arc>> { + match self { + CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => encryptionContext, + } + } + } - impl Hash - for Discovery { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Discovery::Discovery{} => { + impl Debug + for CreateKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for CreateKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyInput.CreateKeyInput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for Discovery { - fn default() -> Discovery { - Discovery::Discovery {} - } - } + impl Eq + for CreateKeyInput {} + + impl Hash + for CreateKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyInput::CreateKeyInput{branchKeyIdentifier, encryptionContext, } => { + Hash::hash(branchKeyIdentifier, _state); + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl AsRef - for &Discovery { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CreateKeyInput { + fn default() -> CreateKeyInput { + CreateKeyInput::CreateKeyInput { + branchKeyIdentifier: Default::default(), + encryptionContext: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetActiveBranchKeyInput { - GetActiveBranchKeyInput { - branchKeyIdentifier: Sequence - } - } + impl AsRef + for CreateKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl GetActiveBranchKeyInput { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(35,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyOutput { + CreateKeyOutput { + branchKeyIdentifier: Sequence + } + } - impl Debug - for GetActiveBranchKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateKeyOutput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => branchKeyIdentifier, + } + } + } - impl DafnyPrint - for GetActiveBranchKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetActiveBranchKeyInput.GetActiveBranchKeyInput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GetActiveBranchKeyInput {} + impl DafnyPrint + for CreateKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyOutput.CreateKeyOutput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GetActiveBranchKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => { - Hash::hash(branchKeyIdentifier, _state) - }, - } - } - } + impl Eq + for CreateKeyOutput {} - impl Default - for GetActiveBranchKeyInput { - fn default() -> GetActiveBranchKeyInput { - GetActiveBranchKeyInput::GetActiveBranchKeyInput { - branchKeyIdentifier: Default::default() - } - } - } + impl Hash + for CreateKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyOutput::CreateKeyOutput{branchKeyIdentifier, } => { + Hash::hash(branchKeyIdentifier, _state) + }, + } + } + } - impl AsRef - for &GetActiveBranchKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CreateKeyOutput { + fn default() -> CreateKeyOutput { + CreateKeyOutput::CreateKeyOutput { + branchKeyIdentifier: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetActiveBranchKeyOutput { - GetActiveBranchKeyOutput { - branchKeyMaterials: Rc - } - } + impl AsRef + for CreateKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl GetActiveBranchKeyOutput { - pub fn branchKeyMaterials(&self) -> &Rc { - match self { - GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => branchKeyMaterials, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(38,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyStoreInput { + CreateKeyStoreInput {} + } - impl Debug - for GetActiveBranchKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateKeyStoreInput {} - impl DafnyPrint - for GetActiveBranchKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetActiveBranchKeyOutput.GetActiveBranchKeyOutput(")?; - DafnyPrint::fmt_print(branchKeyMaterials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateKeyStoreInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GetActiveBranchKeyOutput {} + impl DafnyPrint + for CreateKeyStoreInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyStoreInput::CreateKeyStoreInput{} => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyStoreInput.CreateKeyStoreInput")?; + Ok(()) + }, + } + } + } - impl Hash - for GetActiveBranchKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => { - Hash::hash(branchKeyMaterials, _state) - }, - } - } - } + impl CreateKeyStoreInput { + /// Enumerates all possible values of CreateKeyStoreInput + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CreateKeyStoreInput::CreateKeyStoreInput {})].iter() + } + } - impl Default - for GetActiveBranchKeyOutput { - fn default() -> GetActiveBranchKeyOutput { - GetActiveBranchKeyOutput::GetActiveBranchKeyOutput { - branchKeyMaterials: Default::default() - } - } - } + impl Eq + for CreateKeyStoreInput {} - impl AsRef - for &GetActiveBranchKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for CreateKeyStoreInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyStoreInput::CreateKeyStoreInput{} => { - #[derive(PartialEq, Clone)] - pub enum GetBeaconKeyInput { - GetBeaconKeyInput { - branchKeyIdentifier: Sequence - } - } + }, + } + } + } - impl GetBeaconKeyInput { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, - } - } - } + impl Default + for CreateKeyStoreInput { + fn default() -> CreateKeyStoreInput { + CreateKeyStoreInput::CreateKeyStoreInput {} + } + } - impl Debug - for GetBeaconKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateKeyStoreInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GetBeaconKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBeaconKeyInput.GetBeaconKeyInput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(41,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyStoreOutput { + CreateKeyStoreOutput { + tableArn: Sequence + } + } - impl Eq - for GetBeaconKeyInput {} + impl CreateKeyStoreOutput { + /// Returns a borrow of the field tableArn + pub fn tableArn(&self) -> &Sequence { + match self { + CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => tableArn, + } + } + } - impl Hash - for GetBeaconKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => { - Hash::hash(branchKeyIdentifier, _state) - }, - } - } - } + impl Debug + for CreateKeyStoreOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for GetBeaconKeyInput { - fn default() -> GetBeaconKeyInput { - GetBeaconKeyInput::GetBeaconKeyInput { - branchKeyIdentifier: Default::default() - } - } - } + impl DafnyPrint + for CreateKeyStoreOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.CreateKeyStoreOutput.CreateKeyStoreOutput(")?; + DafnyPrint::fmt_print(tableArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &GetBeaconKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for CreateKeyStoreOutput {} - #[derive(PartialEq, Clone)] - pub enum GetBeaconKeyOutput { - GetBeaconKeyOutput { - beaconKeyMaterials: Rc - } - } + impl Hash + for CreateKeyStoreOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyStoreOutput::CreateKeyStoreOutput{tableArn, } => { + Hash::hash(tableArn, _state) + }, + } + } + } - impl GetBeaconKeyOutput { - pub fn beaconKeyMaterials(&self) -> &Rc { - match self { - GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => beaconKeyMaterials, - } - } - } + impl Default + for CreateKeyStoreOutput { + fn default() -> CreateKeyStoreOutput { + CreateKeyStoreOutput::CreateKeyStoreOutput { + tableArn: Default::default() + } + } + } - impl Debug - for GetBeaconKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateKeyStoreOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GetBeaconKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBeaconKeyOutput.GetBeaconKeyOutput(")?; - DafnyPrint::fmt_print(beaconKeyMaterials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(44,3) + #[derive(PartialEq, Clone)] + pub enum Discovery { + Discovery {} + } - impl Eq - for GetBeaconKeyOutput {} + impl Discovery {} - impl Hash - for GetBeaconKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => { - Hash::hash(beaconKeyMaterials, _state) - }, - } - } - } + impl Debug + for Discovery { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for GetBeaconKeyOutput { - fn default() -> GetBeaconKeyOutput { - GetBeaconKeyOutput::GetBeaconKeyOutput { - beaconKeyMaterials: Default::default() - } - } - } + impl DafnyPrint + for Discovery { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Discovery::Discovery{} => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Discovery.Discovery")?; + Ok(()) + }, + } + } + } - impl AsRef - for &GetBeaconKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Discovery { + /// Enumerates all possible values of Discovery + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(Discovery::Discovery {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyVersionInput { - GetBranchKeyVersionInput { - branchKeyIdentifier: Sequence, - branchKeyVersion: Sequence - } - } + impl Eq + for Discovery {} - impl GetBranchKeyVersionInput { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => branchKeyIdentifier, - } - } - pub fn branchKeyVersion(&self) -> &Sequence { - match self { - GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => branchKeyVersion, - } - } - } + impl Hash + for Discovery { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Discovery::Discovery{} => { - impl Debug - for GetBranchKeyVersionInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for GetBranchKeyVersionInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBranchKeyVersionInput.GetBranchKeyVersionInput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for Discovery { + fn default() -> Discovery { + Discovery::Discovery {} + } + } - impl Eq - for GetBranchKeyVersionInput {} + impl AsRef + for Discovery { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetBranchKeyVersionInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => { - Hash::hash(branchKeyIdentifier, _state); - Hash::hash(branchKeyVersion, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(48,3) + #[derive(PartialEq, Clone)] + pub enum GetActiveBranchKeyInput { + GetActiveBranchKeyInput { + branchKeyIdentifier: Sequence + } + } - impl Default - for GetBranchKeyVersionInput { - fn default() -> GetBranchKeyVersionInput { - GetBranchKeyVersionInput::GetBranchKeyVersionInput { - branchKeyIdentifier: Default::default(), - branchKeyVersion: Default::default() - } - } - } + impl GetActiveBranchKeyInput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, + } + } + } - impl AsRef - for &GetBranchKeyVersionInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetActiveBranchKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyVersionOutput { - GetBranchKeyVersionOutput { - branchKeyMaterials: Rc - } - } + impl DafnyPrint + for GetActiveBranchKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetActiveBranchKeyInput.GetActiveBranchKeyInput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetBranchKeyVersionOutput { - pub fn branchKeyMaterials(&self) -> &Rc { - match self { - GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => branchKeyMaterials, - } - } - } + impl Eq + for GetActiveBranchKeyInput {} - impl Debug - for GetBranchKeyVersionOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetActiveBranchKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetActiveBranchKeyInput::GetActiveBranchKeyInput{branchKeyIdentifier, } => { + Hash::hash(branchKeyIdentifier, _state) + }, + } + } + } - impl DafnyPrint - for GetBranchKeyVersionOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBranchKeyVersionOutput.GetBranchKeyVersionOutput(")?; - DafnyPrint::fmt_print(branchKeyMaterials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetActiveBranchKeyInput { + fn default() -> GetActiveBranchKeyInput { + GetActiveBranchKeyInput::GetActiveBranchKeyInput { + branchKeyIdentifier: Default::default() + } + } + } - impl Eq - for GetBranchKeyVersionOutput {} + impl AsRef + for GetActiveBranchKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetBranchKeyVersionOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => { - Hash::hash(branchKeyMaterials, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(51,3) + #[derive(PartialEq, Clone)] + pub enum GetActiveBranchKeyOutput { + GetActiveBranchKeyOutput { + branchKeyMaterials: Arc + } + } - impl Default - for GetBranchKeyVersionOutput { - fn default() -> GetBranchKeyVersionOutput { - GetBranchKeyVersionOutput::GetBranchKeyVersionOutput { - branchKeyMaterials: Default::default() - } - } - } + impl GetActiveBranchKeyOutput { + /// Returns a borrow of the field branchKeyMaterials + pub fn branchKeyMaterials(&self) -> &Arc { + match self { + GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => branchKeyMaterials, + } + } + } - impl AsRef - for &GetBranchKeyVersionOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetActiveBranchKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetKeyStoreInfoOutput { - GetKeyStoreInfoOutput { - keyStoreId: Sequence, - keyStoreName: Sequence, - logicalKeyStoreName: Sequence, - grantTokens: Sequence>, - kmsConfiguration: Rc - } - } - - impl GetKeyStoreInfoOutput { - pub fn keyStoreId(&self) -> &Sequence { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => keyStoreId, - } - } - pub fn keyStoreName(&self) -> &Sequence { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => keyStoreName, - } - } - pub fn logicalKeyStoreName(&self) -> &Sequence { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => logicalKeyStoreName, - } - } - pub fn grantTokens(&self) -> &Sequence> { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => grantTokens, - } - } - pub fn kmsConfiguration(&self) -> &Rc { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => kmsConfiguration, - } - } - } + impl DafnyPrint + for GetActiveBranchKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetActiveBranchKeyOutput.GetActiveBranchKeyOutput(")?; + DafnyPrint::fmt_print(branchKeyMaterials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for GetKeyStoreInfoOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GetActiveBranchKeyOutput {} - impl DafnyPrint - for GetKeyStoreInfoOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetKeyStoreInfoOutput.GetKeyStoreInfoOutput(")?; - DafnyPrint::fmt_print(keyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(logicalKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for GetActiveBranchKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetActiveBranchKeyOutput::GetActiveBranchKeyOutput{branchKeyMaterials, } => { + Hash::hash(branchKeyMaterials, _state) + }, + } + } + } - impl Eq - for GetKeyStoreInfoOutput {} + impl Default + for GetActiveBranchKeyOutput { + fn default() -> GetActiveBranchKeyOutput { + GetActiveBranchKeyOutput::GetActiveBranchKeyOutput { + branchKeyMaterials: Default::default() + } + } + } - impl Hash - for GetKeyStoreInfoOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => { - Hash::hash(keyStoreId, _state); - Hash::hash(keyStoreName, _state); - Hash::hash(logicalKeyStoreName, _state); - Hash::hash(grantTokens, _state); - Hash::hash(kmsConfiguration, _state) - }, - } - } - } + impl AsRef + for GetActiveBranchKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for GetKeyStoreInfoOutput { - fn default() -> GetKeyStoreInfoOutput { - GetKeyStoreInfoOutput::GetKeyStoreInfoOutput { - keyStoreId: Default::default(), - keyStoreName: Default::default(), - logicalKeyStoreName: Default::default(), - grantTokens: Default::default(), - kmsConfiguration: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(54,3) + #[derive(PartialEq, Clone)] + pub enum GetBeaconKeyInput { + GetBeaconKeyInput { + branchKeyIdentifier: Sequence + } + } - impl AsRef - for &GetKeyStoreInfoOutput { - fn as_ref(&self) -> Self { - self - } - } + impl GetBeaconKeyInput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, + } + } + } - pub struct IKeyStoreClientCallHistory {} + impl Debug + for GetBeaconKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl IKeyStoreClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl DafnyPrint + for GetBeaconKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBeaconKeyInput.GetBeaconKeyInput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClientCallHistory { - UpcastObjectFn!(dyn Any); - } + impl Eq + for GetBeaconKeyInput {} - pub trait IKeyStoreClient: Any + UpcastObject { - fn GetKeyStoreInfo(&self) -> Rc, Rc>>; - fn CreateKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn CreateKey(&self, input: &Rc) -> Rc, Rc>>; - fn VersionKey(&self, input: &Rc) -> Rc, Rc>>; - fn GetActiveBranchKey(&self, input: &Rc) -> Rc, Rc>>; - fn GetBranchKeyVersion(&self, input: &Rc) -> Rc, Rc>>; - fn GetBeaconKey(&self, input: &Rc) -> Rc, Rc>>; - } + impl Hash + for GetBeaconKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBeaconKeyInput::GetBeaconKeyInput{branchKeyIdentifier, } => { + Hash::hash(branchKeyIdentifier, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KeyStoreConfig { - KeyStoreConfig { - ddbTableName: Sequence, - kmsConfiguration: Rc, - logicalKeyStoreName: Sequence, - id: Rc>>, - grantTokens: Rc>>>, - ddbClient: Rc>>, - kmsClient: Rc>> - } - } - - impl KeyStoreConfig { - pub fn ddbTableName(&self) -> &Sequence { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => ddbTableName, - } - } - pub fn kmsConfiguration(&self) -> &Rc { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => kmsConfiguration, - } - } - pub fn logicalKeyStoreName(&self) -> &Sequence { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => logicalKeyStoreName, - } - } - pub fn id(&self) -> &Rc>> { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => id, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => grantTokens, - } - } - pub fn ddbClient(&self) -> &Rc>> { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => ddbClient, - } - } - pub fn kmsClient(&self) -> &Rc>> { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => kmsClient, - } - } - } + impl Default + for GetBeaconKeyInput { + fn default() -> GetBeaconKeyInput { + GetBeaconKeyInput::GetBeaconKeyInput { + branchKeyIdentifier: Default::default() + } + } + } - impl Debug - for KeyStoreConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GetBeaconKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for KeyStoreConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KeyStoreConfig.KeyStoreConfig(")?; - DafnyPrint::fmt_print(ddbTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsConfiguration, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(logicalKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(id, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ddbClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(57,3) + #[derive(PartialEq, Clone)] + pub enum GetBeaconKeyOutput { + GetBeaconKeyOutput { + beaconKeyMaterials: Arc + } + } - impl Eq - for KeyStoreConfig {} + impl GetBeaconKeyOutput { + /// Returns a borrow of the field beaconKeyMaterials + pub fn beaconKeyMaterials(&self) -> &Arc { + match self { + GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => beaconKeyMaterials, + } + } + } - impl Hash - for KeyStoreConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => { - Hash::hash(ddbTableName, _state); - Hash::hash(kmsConfiguration, _state); - Hash::hash(logicalKeyStoreName, _state); - Hash::hash(id, _state); - Hash::hash(grantTokens, _state); - Hash::hash(ddbClient, _state); - Hash::hash(kmsClient, _state) - }, - } - } - } + impl Debug + for GetBeaconKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for KeyStoreConfig { - fn default() -> KeyStoreConfig { - KeyStoreConfig::KeyStoreConfig { - ddbTableName: Default::default(), - kmsConfiguration: Default::default(), - logicalKeyStoreName: Default::default(), - id: Default::default(), - grantTokens: Default::default(), - ddbClient: Default::default(), - kmsClient: Default::default() - } - } - } - - impl AsRef - for &KeyStoreConfig { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetBeaconKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBeaconKeyOutput.GetBeaconKeyOutput(")?; + DafnyPrint::fmt_print(beaconKeyMaterials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KMSConfiguration { - kmsKeyArn { - kmsKeyArn: Sequence - }, - kmsMRKeyArn { - kmsMRKeyArn: Sequence - }, - discovery { - discovery: Rc - }, - mrDiscovery { - mrDiscovery: Rc - } - } - - impl KMSConfiguration { - pub fn kmsKeyArn(&self) -> &Sequence { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => kmsKeyArn, - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), - KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), - } - } - pub fn kmsMRKeyArn(&self) -> &Sequence { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => kmsMRKeyArn, - KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), - KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), - } - } - pub fn discovery(&self) -> &Rc { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::discovery{discovery, } => discovery, - KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), - } - } - pub fn mrDiscovery(&self) -> &Rc { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), - KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), - KMSConfiguration::mrDiscovery{mrDiscovery, } => mrDiscovery, - } - } - } + impl Eq + for GetBeaconKeyOutput {} - impl Debug - for KMSConfiguration { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetBeaconKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBeaconKeyOutput::GetBeaconKeyOutput{beaconKeyMaterials, } => { + Hash::hash(beaconKeyMaterials, _state) + }, + } + } + } - impl DafnyPrint - for KMSConfiguration { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.kmsKeyArn(")?; - DafnyPrint::fmt_print(kmsKeyArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.kmsMRKeyArn(")?; - DafnyPrint::fmt_print(kmsMRKeyArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - KMSConfiguration::discovery{discovery, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.discovery(")?; - DafnyPrint::fmt_print(discovery, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - KMSConfiguration::mrDiscovery{mrDiscovery, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.mrDiscovery(")?; - DafnyPrint::fmt_print(mrDiscovery, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetBeaconKeyOutput { + fn default() -> GetBeaconKeyOutput { + GetBeaconKeyOutput::GetBeaconKeyOutput { + beaconKeyMaterials: Default::default() + } + } + } - impl Eq - for KMSConfiguration {} + impl AsRef + for GetBeaconKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for KMSConfiguration { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KMSConfiguration::kmsKeyArn{kmsKeyArn, } => { - Hash::hash(kmsKeyArn, _state) - }, - KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => { - Hash::hash(kmsMRKeyArn, _state) - }, - KMSConfiguration::discovery{discovery, } => { - Hash::hash(discovery, _state) - }, - KMSConfiguration::mrDiscovery{mrDiscovery, } => { - Hash::hash(mrDiscovery, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(60,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyVersionInput { + GetBranchKeyVersionInput { + branchKeyIdentifier: Sequence, + branchKeyVersion: Sequence + } + } - impl Default - for KMSConfiguration { - fn default() -> KMSConfiguration { - KMSConfiguration::kmsKeyArn { - kmsKeyArn: Default::default() - } - } - } + impl GetBranchKeyVersionInput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => branchKeyIdentifier, + } + } + /// Returns a borrow of the field branchKeyVersion + pub fn branchKeyVersion(&self) -> &Sequence { + match self { + GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => branchKeyVersion, + } + } + } - impl AsRef - for &KMSConfiguration { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GetBranchKeyVersionInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum MRDiscovery { - MRDiscovery { - region: Sequence - } - } + impl DafnyPrint + for GetBranchKeyVersionInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBranchKeyVersionInput.GetBranchKeyVersionInput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKeyVersion, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl MRDiscovery { - pub fn region(&self) -> &Sequence { - match self { - MRDiscovery::MRDiscovery{region, } => region, - } - } - } + impl Eq + for GetBranchKeyVersionInput {} + + impl Hash + for GetBranchKeyVersionInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyVersionInput::GetBranchKeyVersionInput{branchKeyIdentifier, branchKeyVersion, } => { + Hash::hash(branchKeyIdentifier, _state); + Hash::hash(branchKeyVersion, _state) + }, + } + } + } - impl Debug - for MRDiscovery { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetBranchKeyVersionInput { + fn default() -> GetBranchKeyVersionInput { + GetBranchKeyVersionInput::GetBranchKeyVersionInput { + branchKeyIdentifier: Default::default(), + branchKeyVersion: Default::default() + } + } + } - impl DafnyPrint - for MRDiscovery { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MRDiscovery::MRDiscovery{region, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.MRDiscovery.MRDiscovery(")?; - DafnyPrint::fmt_print(region, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetBranchKeyVersionInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for MRDiscovery {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(64,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyVersionOutput { + GetBranchKeyVersionOutput { + branchKeyMaterials: Arc + } + } - impl Hash - for MRDiscovery { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MRDiscovery::MRDiscovery{region, } => { - Hash::hash(region, _state) - }, - } - } - } + impl GetBranchKeyVersionOutput { + /// Returns a borrow of the field branchKeyMaterials + pub fn branchKeyMaterials(&self) -> &Arc { + match self { + GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => branchKeyMaterials, + } + } + } - impl Default - for MRDiscovery { - fn default() -> MRDiscovery { - MRDiscovery::MRDiscovery { - region: Default::default() - } - } - } + impl Debug + for GetBranchKeyVersionOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &MRDiscovery { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetBranchKeyVersionOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetBranchKeyVersionOutput.GetBranchKeyVersionOutput(")?; + DafnyPrint::fmt_print(branchKeyMaterials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum VersionKeyInput { - VersionKeyInput { - branchKeyIdentifier: Sequence - } - } + impl Eq + for GetBranchKeyVersionOutput {} - impl VersionKeyInput { - pub fn branchKeyIdentifier(&self) -> &Sequence { - match self { - VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, - } - } - } + impl Hash + for GetBranchKeyVersionOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyVersionOutput::GetBranchKeyVersionOutput{branchKeyMaterials, } => { + Hash::hash(branchKeyMaterials, _state) + }, + } + } + } - impl Debug - for VersionKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetBranchKeyVersionOutput { + fn default() -> GetBranchKeyVersionOutput { + GetBranchKeyVersionOutput::GetBranchKeyVersionOutput { + branchKeyMaterials: Default::default() + } + } + } - impl DafnyPrint - for VersionKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.VersionKeyInput.VersionKeyInput(")?; - DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetBranchKeyVersionOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for VersionKeyInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(67,3) + #[derive(PartialEq, Clone)] + pub enum GetKeyStoreInfoOutput { + GetKeyStoreInfoOutput { + keyStoreId: Sequence, + keyStoreName: Sequence, + logicalKeyStoreName: Sequence, + grantTokens: Sequence>, + kmsConfiguration: Arc + } + } - impl Hash - for VersionKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => { - Hash::hash(branchKeyIdentifier, _state) - }, - } - } - } + impl GetKeyStoreInfoOutput { + /// Returns a borrow of the field keyStoreId + pub fn keyStoreId(&self) -> &Sequence { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => keyStoreId, + } + } + /// Returns a borrow of the field keyStoreName + pub fn keyStoreName(&self) -> &Sequence { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => keyStoreName, + } + } + /// Returns a borrow of the field logicalKeyStoreName + pub fn logicalKeyStoreName(&self) -> &Sequence { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => logicalKeyStoreName, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Sequence> { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => grantTokens, + } + } + /// Returns a borrow of the field kmsConfiguration + pub fn kmsConfiguration(&self) -> &Arc { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => kmsConfiguration, + } + } + } - impl Default - for VersionKeyInput { - fn default() -> VersionKeyInput { - VersionKeyInput::VersionKeyInput { - branchKeyIdentifier: Default::default() - } - } - } + impl Debug + for GetKeyStoreInfoOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &VersionKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetKeyStoreInfoOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.GetKeyStoreInfoOutput.GetKeyStoreInfoOutput(")?; + DafnyPrint::fmt_print(keyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(logicalKeyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum VersionKeyOutput { - VersionKeyOutput {} - } + impl Eq + for GetKeyStoreInfoOutput {} + + impl Hash + for GetKeyStoreInfoOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput{keyStoreId, keyStoreName, logicalKeyStoreName, grantTokens, kmsConfiguration, } => { + Hash::hash(keyStoreId, _state); + Hash::hash(keyStoreName, _state); + Hash::hash(logicalKeyStoreName, _state); + Hash::hash(grantTokens, _state); + Hash::hash(kmsConfiguration, _state) + }, + } + } + } - impl VersionKeyOutput {} + impl Default + for GetKeyStoreInfoOutput { + fn default() -> GetKeyStoreInfoOutput { + GetKeyStoreInfoOutput::GetKeyStoreInfoOutput { + keyStoreId: Default::default(), + keyStoreName: Default::default(), + logicalKeyStoreName: Default::default(), + grantTokens: Default::default(), + kmsConfiguration: Default::default() + } + } + } - impl Debug - for VersionKeyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GetKeyStoreInfoOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for VersionKeyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VersionKeyOutput::VersionKeyOutput{} => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.VersionKeyOutput.VersionKeyOutput")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(76,3) + pub struct IKeyStoreClientCallHistory {} - impl VersionKeyOutput { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(VersionKeyOutput::VersionKeyOutput {})].iter() - } - } + impl IKeyStoreClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Eq - for VersionKeyOutput {} + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl Hash - for VersionKeyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VersionKeyOutput::VersionKeyOutput{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(94,3) + pub trait IKeyStoreClient: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(123,5) + fn GetKeyStoreInfo(&self) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(138,5) + fn CreateKeyStore(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(153,5) + fn CreateKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(168,5) + fn VersionKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(183,5) + fn GetActiveBranchKey(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(198,5) + fn GetBranchKeyVersion(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(213,5) + fn GetBeaconKey(&self, input: &Arc) -> Arc, Arc>>; + } - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(227,3) + #[derive(PartialEq, Clone)] + pub enum KeyStoreConfig { + KeyStoreConfig { + ddbTableName: Sequence, + kmsConfiguration: Arc, + logicalKeyStoreName: Sequence, + id: Arc>>, + grantTokens: Arc>>>, + ddbClient: Arc>>, + kmsClient: Arc>> + } + } - impl Default - for VersionKeyOutput { - fn default() -> VersionKeyOutput { - VersionKeyOutput::VersionKeyOutput {} - } - } + impl KeyStoreConfig { + /// Returns a borrow of the field ddbTableName + pub fn ddbTableName(&self) -> &Sequence { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => ddbTableName, + } + } + /// Returns a borrow of the field kmsConfiguration + pub fn kmsConfiguration(&self) -> &Arc { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => kmsConfiguration, + } + } + /// Returns a borrow of the field logicalKeyStoreName + pub fn logicalKeyStoreName(&self) -> &Sequence { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => logicalKeyStoreName, + } + } + /// Returns a borrow of the field id + pub fn id(&self) -> &Arc>> { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => id, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => grantTokens, + } + } + /// Returns a borrow of the field ddbClient + pub fn ddbClient(&self) -> &Arc>> { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => ddbClient, + } + } + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Arc>> { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => kmsClient, + } + } + } - impl AsRef - for &VersionKeyOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for KeyStoreConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - KeyStoreException { - message: Sequence - }, - ComAmazonawsDynamodb { - ComAmazonawsDynamodb: Rc - }, - ComAmazonawsKms { - ComAmazonawsKms: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::KeyStoreException{message, } => message, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsDynamodb(&self) -> &Rc { - match self { - Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsKms(&self) -> &Rc { - match self { - Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => ComAmazonawsKms, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } + impl DafnyPrint + for KeyStoreConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KeyStoreConfig.KeyStoreConfig(")?; + DafnyPrint::fmt_print(ddbTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsConfiguration, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(logicalKeyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(id, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ddbClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for KeyStoreConfig {} + + impl Hash + for KeyStoreConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyStoreConfig::KeyStoreConfig{ddbTableName, kmsConfiguration, logicalKeyStoreName, id, grantTokens, ddbClient, kmsClient, } => { + Hash::hash(ddbTableName, _state); + Hash::hash(kmsConfiguration, _state); + Hash::hash(logicalKeyStoreName, _state); + Hash::hash(id, _state); + Hash::hash(grantTokens, _state); + Hash::hash(ddbClient, _state); + Hash::hash(kmsClient, _state) + }, + } + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::KeyStoreException{message, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.KeyStoreException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.ComAmazonawsDynamodb(")?; - DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsKms{ComAmazonawsKms, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.ComAmazonawsKms(")?; - DafnyPrint::fmt_print(ComAmazonawsKms, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for KeyStoreConfig { + fn default() -> KeyStoreConfig { + KeyStoreConfig::KeyStoreConfig { + ddbTableName: Default::default(), + kmsConfiguration: Default::default(), + logicalKeyStoreName: Default::default(), + id: Default::default(), + grantTokens: Default::default(), + ddbClient: Default::default(), + kmsClient: Default::default() + } + } + } - impl Eq - for Error {} + impl AsRef + for KeyStoreConfig { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::KeyStoreException{message, } => { - Hash::hash(message, _state) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - Hash::hash(ComAmazonawsDynamodb, _state) - }, - Error::ComAmazonawsKms{ComAmazonawsKms, } => { - Hash::hash(ComAmazonawsKms, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(236,3) + #[derive(PartialEq, Clone)] + pub enum KMSConfiguration { + kmsKeyArn { + kmsKeyArn: Sequence + }, + kmsMRKeyArn { + kmsMRKeyArn: Sequence + }, + discovery { + discovery: Arc + }, + mrDiscovery { + mrDiscovery: Arc + } + } - impl Default - for Error { - fn default() -> Error { - Error::KeyStoreException { - message: Default::default() - } - } - } + impl KMSConfiguration { + /// Gets the field kmsKeyArn for all enum members which have it + pub fn kmsKeyArn(&self) -> &Sequence { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => kmsKeyArn, + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), + KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field kmsMRKeyArn for all enum members which have it + pub fn kmsMRKeyArn(&self) -> &Sequence { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => kmsMRKeyArn, + KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), + KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field discovery for all enum members which have it + pub fn discovery(&self) -> &Arc { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::discovery{discovery, } => discovery, + KMSConfiguration::mrDiscovery{mrDiscovery, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field mrDiscovery for all enum members which have it + pub fn mrDiscovery(&self) -> &Arc { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => panic!("field does not exist on this variant"), + KMSConfiguration::discovery{discovery, } => panic!("field does not exist on this variant"), + KMSConfiguration::mrDiscovery{mrDiscovery, } => mrDiscovery, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } - - pub type OpaqueError = Rc; - - pub type DummySubsetType = DafnyInt; - - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } - - pub mod materialproviders { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient; - pub use ::dafny_runtime::upcast_object; - pub use ::dafny_runtime::cast_object; - pub use crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::update_field_uninit_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput; - - pub struct _default {} - - impl _default { - pub fn DefaultMaterialProvidersConfig() -> Rc { - Rc::new(MaterialProvidersConfig::MaterialProvidersConfig {}) - } - pub fn MaterialProviders(config: &Rc) -> Rc, Rc>> { - let mut res = MaybePlacebo::, Rc>>>::new(); - let mut maybeCrypto = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::AtomicPrimitives(&crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::DefaultCryptoConfig())); - maybeCrypto = MaybePlacebo::from(_out0.read()); - let mut valueOrError0: Rc, Rc>> = maybeCrypto.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error::AwsCryptographyPrimitives { - AwsCryptographyPrimitives: e.clone() - }) - }) - })); - if valueOrError0.IsFailure() { - res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); - return res.read(); - }; - let mut cryptoPrimitivesX: Object = upcast_object::()(valueOrError0.Extract()); - let mut cryptoPrimitives: Object = cast_object!(cryptoPrimitivesX.clone(), AtomicPrimitivesClient); - let mut client = MaybePlacebo::>::new(); - let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient::_allocate_object(); - crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient::_ctor(&_nw0, &Rc::new(Config::Config { - crypto: cryptoPrimitives.clone() - })); - client = MaybePlacebo::from(_nw0.clone()); - res = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: client.read() - })); - return res.read(); - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } - - pub struct MaterialProvidersClient { - pub r#__i_config: Rc - } - - impl MaterialProvidersClient { - pub fn _allocate_object() -> Object { - allocate_object::() - } - pub fn _ctor(this: &Object, config: &Rc) -> () { - let mut _set__i_config: bool = false; - update_field_uninit_object!(this.clone(), r#__i_config, _set__i_config, config.clone()); - return (); - } - pub fn config(&self) -> Rc { - self.r#__i_config.clone() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { - UpcastObjectFn!(dyn Any); - } - - impl IAwsCryptographicMaterialProvidersClient - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { - fn CreateAwsKmsKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsDiscoveryKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsDiscoveryKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsMultiKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMultiKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsDiscoveryMultiKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsDiscoveryMultiKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsMrkKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsMrkMultiKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkMultiKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsMrkDiscoveryKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkDiscoveryKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsMrkDiscoveryMultiKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkDiscoveryMultiKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsHierarchicalKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsHierarchicalKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsRsaKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsRsaKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateAwsKmsEcdhKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsEcdhKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateMultiKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateMultiKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateRawAesKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawAesKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateRawRsaKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawRsaKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateRawEcdhKeyring(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawEcdhKeyring(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateDefaultCryptographicMaterialsManager(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateDefaultCryptographicMaterialsManager(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateRequiredEncryptionContextCMM(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRequiredEncryptionContextCMM(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateCryptographicMaterialsCache(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateCryptographicMaterialsCache(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn CreateDefaultClientSupplier(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateDefaultClientSupplier(&self.config().clone(), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn InitializeEncryptionMaterials(&self, input: &Rc) -> Rc, Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::InitializeEncryptionMaterials(&self.config().clone(), input) - } - fn InitializeDecryptionMaterials(&self, input: &Rc) -> Rc, Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::InitializeDecryptionMaterials(&self.config().clone(), input) - } - fn ValidEncryptionMaterialsTransition(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidEncryptionMaterialsTransition(&self.config().clone(), input) - } - fn ValidDecryptionMaterialsTransition(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidDecryptionMaterialsTransition(&self.config().clone(), input) - } - fn EncryptionMaterialsHasPlaintextDataKey(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::EncryptionMaterialsHasPlaintextDataKey(&self.config().clone(), input) - } - fn DecryptionMaterialsWithPlaintextDataKey(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::DecryptionMaterialsWithPlaintextDataKey(&self.config().clone(), input) - } - fn GetAlgorithmSuiteInfo(&self, input: &Sequence) -> Rc, Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::GetAlgorithmSuiteInfo(&self.config().clone(), input) - } - fn ValidAlgorithmSuiteInfo(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidAlgorithmSuiteInfo(&self.config().clone(), input) - } - fn ValidateCommitmentPolicyOnEncrypt(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidateCommitmentPolicyOnEncrypt(&self.config().clone(), input) - } - fn ValidateCommitmentPolicyOnDecrypt(&self, input: &Rc) -> Rc>> { - crate::implementation_from_dafny::r#_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidateCommitmentPolicyOnDecrypt(&self.config().clone(), input) - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { - UpcastObjectFn!(dyn IAwsCryptographicMaterialProvidersClient); - } - - pub mod types { - pub use ::dafny_runtime::truncate; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::SequenceIter; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; - pub use ::dafny_runtime::MaybePlacebo; - pub use ::dafny_runtime::md; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AES_GCM; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials; - pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::BeaconKeyMaterials; + impl Debug + for KMSConfiguration { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub struct _default {} + impl DafnyPrint + for KMSConfiguration { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.kmsKeyArn(")?; + DafnyPrint::fmt_print(kmsKeyArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.kmsMRKeyArn(")?; + DafnyPrint::fmt_print(kmsMRKeyArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + KMSConfiguration::discovery{discovery, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.discovery(")?; + DafnyPrint::fmt_print(discovery, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + KMSConfiguration::mrDiscovery{mrDiscovery, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.KMSConfiguration.mrDiscovery(")?; + DafnyPrint::fmt_print(mrDiscovery, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl _default { - pub fn IsValid_CountingNumber(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) - } - pub fn IsValid_PositiveInteger(x: i32) -> bool { - !(x < truncate!(int!(0), i32)) - } - pub fn IsValid_PositiveLong(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } + impl Eq + for KMSConfiguration {} + + impl Hash + for KMSConfiguration { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KMSConfiguration::kmsKeyArn{kmsKeyArn, } => { + Hash::hash(kmsKeyArn, _state) + }, + KMSConfiguration::kmsMRKeyArn{kmsMRKeyArn, } => { + Hash::hash(kmsMRKeyArn, _state) + }, + KMSConfiguration::discovery{discovery, } => { + Hash::hash(discovery, _state) + }, + KMSConfiguration::mrDiscovery{mrDiscovery, } => { + Hash::hash(mrDiscovery, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + impl Default + for KMSConfiguration { + fn default() -> KMSConfiguration { + KMSConfiguration::kmsKeyArn { + kmsKeyArn: Default::default() + } + } + } - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } + impl AsRef + for KMSConfiguration { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(241,3) + #[derive(PartialEq, Clone)] + pub enum MRDiscovery { + MRDiscovery { + region: Sequence + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl MRDiscovery { + /// Returns a borrow of the field region + pub fn region(&self) -> &Sequence { + match self { + MRDiscovery::MRDiscovery{region, } => region, + } + } + } - impl Eq - for DafnyCallEvent {} + impl Debug + for MRDiscovery { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl DafnyPrint + for MRDiscovery { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + MRDiscovery::MRDiscovery{region, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.MRDiscovery.MRDiscovery(")?; + DafnyPrint::fmt_print(region, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl Eq + for MRDiscovery {} - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for MRDiscovery { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + MRDiscovery::MRDiscovery{region, } => { + Hash::hash(region, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum AesWrappingAlg { - ALG_AES128_GCM_IV12_TAG16 {}, - ALG_AES192_GCM_IV12_TAG16 {}, - ALG_AES256_GCM_IV12_TAG16 {} - } + impl Default + for MRDiscovery { + fn default() -> MRDiscovery { + MRDiscovery::MRDiscovery { + region: Default::default() + } + } + } - impl AesWrappingAlg {} + impl AsRef + for MRDiscovery { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for AesWrappingAlg { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(246,3) + #[derive(PartialEq, Clone)] + pub enum VersionKeyInput { + VersionKeyInput { + branchKeyIdentifier: Sequence + } + } - impl DafnyPrint - for AesWrappingAlg { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES128__GCM__IV12__TAG16")?; - Ok(()) - }, - AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES192__GCM__IV12__TAG16")?; - Ok(()) - }, - AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES256__GCM__IV12__TAG16")?; - Ok(()) - }, - } - } - } + impl VersionKeyInput { + /// Returns a borrow of the field branchKeyIdentifier + pub fn branchKeyIdentifier(&self) -> &Sequence { + match self { + VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => branchKeyIdentifier, + } + } + } - impl AesWrappingAlg { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16 {}), Rc::new(AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16 {}), Rc::new(AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16 {})].iter() - } - } + impl Debug + for VersionKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AesWrappingAlg {} + impl DafnyPrint + for VersionKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.VersionKeyInput.VersionKeyInput(")?; + DafnyPrint::fmt_print(branchKeyIdentifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AesWrappingAlg { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16{} => { + impl Eq + for VersionKeyInput {} - }, - AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16{} => { + impl Hash + for VersionKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + VersionKeyInput::VersionKeyInput{branchKeyIdentifier, } => { + Hash::hash(branchKeyIdentifier, _state) + }, + } + } + } - }, - AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16{} => { + impl Default + for VersionKeyInput { + fn default() -> VersionKeyInput { + VersionKeyInput::VersionKeyInput { + branchKeyIdentifier: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for VersionKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for AesWrappingAlg { - fn default() -> AesWrappingAlg { - AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16 {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(249,3) + #[derive(PartialEq, Clone)] + pub enum VersionKeyOutput { + VersionKeyOutput {} + } - impl AsRef - for &AesWrappingAlg { - fn as_ref(&self) -> Self { - self - } - } + impl VersionKeyOutput {} - #[derive(PartialEq, Clone)] - pub enum AlgorithmSuiteId { - ESDK { - ESDK: Rc - }, - DBE { - DBE: Rc - } - } + impl Debug + for VersionKeyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AlgorithmSuiteId { - pub fn ESDK(&self) -> &Rc { - match self { - AlgorithmSuiteId::ESDK{ESDK, } => ESDK, - AlgorithmSuiteId::DBE{DBE, } => panic!("field does not exist on this variant"), - } - } - pub fn DBE(&self) -> &Rc { - match self { - AlgorithmSuiteId::ESDK{ESDK, } => panic!("field does not exist on this variant"), - AlgorithmSuiteId::DBE{DBE, } => DBE, - } - } - } + impl DafnyPrint + for VersionKeyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + VersionKeyOutput::VersionKeyOutput{} => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.VersionKeyOutput.VersionKeyOutput")?; + Ok(()) + }, + } + } + } - impl Debug - for AlgorithmSuiteId { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl VersionKeyOutput { + /// Enumerates all possible values of VersionKeyOutput + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(VersionKeyOutput::VersionKeyOutput {})].iter() + } + } - impl DafnyPrint - for AlgorithmSuiteId { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AlgorithmSuiteId::ESDK{ESDK, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteId.ESDK(")?; - DafnyPrint::fmt_print(ESDK, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AlgorithmSuiteId::DBE{DBE, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteId.DBE(")?; - DafnyPrint::fmt_print(DBE, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for VersionKeyOutput {} - impl Eq - for AlgorithmSuiteId {} + impl Hash + for VersionKeyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + VersionKeyOutput::VersionKeyOutput{} => { - impl Hash - for AlgorithmSuiteId { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AlgorithmSuiteId::ESDK{ESDK, } => { - Hash::hash(ESDK, _state) - }, - AlgorithmSuiteId::DBE{DBE, } => { - Hash::hash(DBE, _state) - }, - } - } - } + }, + } + } + } - impl Default - for AlgorithmSuiteId { - fn default() -> AlgorithmSuiteId { - AlgorithmSuiteId::ESDK { - ESDK: Default::default() - } - } - } + impl Default + for VersionKeyOutput { + fn default() -> VersionKeyOutput { + VersionKeyOutput::VersionKeyOutput {} + } + } - impl AsRef - for &AlgorithmSuiteId { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for VersionKeyOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum AlgorithmSuiteInfo { - AlgorithmSuiteInfo { - id: Rc, - binaryId: Sequence, - messageVersion: i32, - encrypt: Rc, - kdf: Rc, - commitment: Rc, - signature: Rc, - symmetricSignature: Rc, - edkWrapping: Rc - } - } - - impl AlgorithmSuiteInfo { - pub fn id(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => id, - } - } - pub fn binaryId(&self) -> &Sequence { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => binaryId, - } - } - pub fn messageVersion(&self) -> &i32 { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => messageVersion, - } - } - pub fn encrypt(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => encrypt, - } - } - pub fn kdf(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => kdf, - } - } - pub fn commitment(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => commitment, - } - } - pub fn signature(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => signature, - } - } - pub fn symmetricSignature(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => symmetricSignature, - } - } - pub fn edkWrapping(&self) -> &Rc { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => edkWrapping, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(252,3) + #[derive(PartialEq, Clone)] + pub enum Error { + KeyStoreException { + message: Sequence + }, + ComAmazonawsDynamodb { + ComAmazonawsDynamodb: Arc + }, + ComAmazonawsKms { + ComAmazonawsKms: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - impl Debug - for AlgorithmSuiteInfo { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::KeyStoreException{message, } => message, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsDynamodb for all enum members which have it + pub fn ComAmazonawsDynamodb(&self) -> &Arc { + match self { + Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsKms for all enum members which have it + pub fn ComAmazonawsKms(&self) -> &Arc { + match self { + Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => ComAmazonawsKms, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::KeyStoreException{message, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - impl DafnyPrint - for AlgorithmSuiteInfo { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteInfo.AlgorithmSuiteInfo(")?; - DafnyPrint::fmt_print(id, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(binaryId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(messageVersion, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kdf, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(commitment, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signature, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(symmetricSignature, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(edkWrapping, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AlgorithmSuiteInfo {} + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::KeyStoreException{message, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.KeyStoreException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.ComAmazonawsDynamodb(")?; + DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsKms{ComAmazonawsKms, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.ComAmazonawsKms(")?; + DafnyPrint::fmt_print(ComAmazonawsKms, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.keystore.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AlgorithmSuiteInfo { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => { - Hash::hash(id, _state); - Hash::hash(binaryId, _state); - Hash::hash(messageVersion, _state); - Hash::hash(encrypt, _state); - Hash::hash(kdf, _state); - Hash::hash(commitment, _state); - Hash::hash(signature, _state); - Hash::hash(symmetricSignature, _state); - Hash::hash(edkWrapping, _state) - }, - } - } - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::KeyStoreException{message, } => { + Hash::hash(message, _state) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + Hash::hash(ComAmazonawsDynamodb, _state) + }, + Error::ComAmazonawsKms{ComAmazonawsKms, } => { + Hash::hash(ComAmazonawsKms, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl Default - for AlgorithmSuiteInfo { - fn default() -> AlgorithmSuiteInfo { - AlgorithmSuiteInfo::AlgorithmSuiteInfo { - id: Default::default(), - binaryId: Default::default(), - messageVersion: Default::default(), - encrypt: Default::default(), - kdf: Default::default(), - commitment: Default::default(), - signature: Default::default(), - symmetricSignature: Default::default(), - edkWrapping: Default::default() - } - } - } - - impl AsRef - for &AlgorithmSuiteInfo { - fn as_ref(&self) -> Self { - self - } - } - - pub struct IAwsCryptographicMaterialProvidersClientCallHistory {} - - impl IAwsCryptographicMaterialProvidersClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClientCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IAwsCryptographicMaterialProvidersClient: Any + UpcastObject { - fn CreateAwsKmsKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsDiscoveryKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsMultiKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsDiscoveryMultiKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsMrkKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsMrkMultiKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsMrkDiscoveryKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsMrkDiscoveryMultiKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsHierarchicalKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsRsaKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAwsKmsEcdhKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateMultiKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateRawAesKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateRawRsaKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateRawEcdhKeyring(&self, input: &Rc) -> Rc, Rc>>; - fn CreateDefaultCryptographicMaterialsManager(&self, input: &Rc) -> Rc, Rc>>; - fn CreateRequiredEncryptionContextCMM(&self, input: &Rc) -> Rc, Rc>>; - fn CreateCryptographicMaterialsCache(&self, input: &Rc) -> Rc, Rc>>; - fn CreateDefaultClientSupplier(&self, input: &Rc) -> Rc, Rc>>; - fn InitializeEncryptionMaterials(&self, input: &Rc) -> Rc, Rc>>; - fn InitializeDecryptionMaterials(&self, input: &Rc) -> Rc, Rc>>; - fn ValidEncryptionMaterialsTransition(&self, input: &Rc) -> Rc>>; - fn ValidDecryptionMaterialsTransition(&self, input: &Rc) -> Rc>>; - fn EncryptionMaterialsHasPlaintextDataKey(&self, input: &Rc) -> Rc>>; - fn DecryptionMaterialsWithPlaintextDataKey(&self, input: &Rc) -> Rc>>; - fn GetAlgorithmSuiteInfo(&self, input: &Sequence) -> Rc, Rc>>; - fn ValidAlgorithmSuiteInfo(&self, input: &Rc) -> Rc>>; - fn ValidateCommitmentPolicyOnEncrypt(&self, input: &Rc) -> Rc>>; - fn ValidateCommitmentPolicyOnDecrypt(&self, input: &Rc) -> Rc>>; - } - - pub struct IBranchKeyIdSupplierCallHistory {} - - impl IBranchKeyIdSupplierCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplierCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IBranchKeyIdSupplier: Any + UpcastObject { - fn GetBranchKeyId(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier::r#_GetBranchKeyId_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_GetBranchKeyId_k(&self, input: &Rc) -> Rc, Rc>>; - } + impl Default + for Error { + fn default() -> Error { + Error::KeyStoreException { + message: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum CacheType { - Default { - Default: Rc - }, - No { - No: Rc - }, - SingleThreaded { - SingleThreaded: Rc - }, - MultiThreaded { - MultiThreaded: Rc - }, - StormTracking { - StormTracking: Rc - }, - Shared { - Shared: Object - } - } - - impl CacheType { - pub fn Default(&self) -> &Rc { - match self { - CacheType::Default{Default, } => Default, - CacheType::No{No, } => panic!("field does not exist on this variant"), - CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), - CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), - CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), - CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), - } - } - pub fn No(&self) -> &Rc { - match self { - CacheType::Default{Default, } => panic!("field does not exist on this variant"), - CacheType::No{No, } => No, - CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), - CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), - CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), - CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), - } - } - pub fn SingleThreaded(&self) -> &Rc { - match self { - CacheType::Default{Default, } => panic!("field does not exist on this variant"), - CacheType::No{No, } => panic!("field does not exist on this variant"), - CacheType::SingleThreaded{SingleThreaded, } => SingleThreaded, - CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), - CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), - CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), - } - } - pub fn MultiThreaded(&self) -> &Rc { - match self { - CacheType::Default{Default, } => panic!("field does not exist on this variant"), - CacheType::No{No, } => panic!("field does not exist on this variant"), - CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), - CacheType::MultiThreaded{MultiThreaded, } => MultiThreaded, - CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), - CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), - } - } - pub fn StormTracking(&self) -> &Rc { - match self { - CacheType::Default{Default, } => panic!("field does not exist on this variant"), - CacheType::No{No, } => panic!("field does not exist on this variant"), - CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), - CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), - CacheType::StormTracking{StormTracking, } => StormTracking, - CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), - } - } - pub fn Shared(&self) -> &Object { - match self { - CacheType::Default{Default, } => panic!("field does not exist on this variant"), - CacheType::No{No, } => panic!("field does not exist on this variant"), - CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), - CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), - CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), - CacheType::Shared{Shared, } => Shared, - } - } - } + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for CacheType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(288,3) + pub type OpaqueError = Arc; - impl DafnyPrint - for CacheType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CacheType::Default{Default, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.Default(")?; - DafnyPrint::fmt_print(Default, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CacheType::No{No, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.No(")?; - DafnyPrint::fmt_print(No, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CacheType::SingleThreaded{SingleThreaded, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.SingleThreaded(")?; - DafnyPrint::fmt_print(SingleThreaded, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CacheType::MultiThreaded{MultiThreaded, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.MultiThreaded(")?; - DafnyPrint::fmt_print(MultiThreaded, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CacheType::StormTracking{StormTracking, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.StormTracking(")?; - DafnyPrint::fmt_print(StormTracking, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CacheType::Shared{Shared, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.Shared(")?; - DafnyPrint::fmt_print(Shared, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographyKeyStore/Model/AwsCryptographyKeyStoreTypes.dfy(291,3) + pub type DummySubsetType = DafnyInt; + + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } } - } } - impl Eq - for CacheType {} + pub mod materialproviders { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/Index.dfy(6,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::MaterialProvidersConfig; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Result; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::MaybePlacebo; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient; + pub use ::dafny_runtime::upcast_object; + pub use ::dafny_runtime::cast_object; + pub use crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::Config; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::update_field_uninit_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMultiKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsDiscoveryMultiKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkMultiKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsMrkDiscoveryMultiKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsHierarchicalKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsRsaKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateAwsKmsEcdhKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateMultiKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawAesKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawRsaKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRawEcdhKeyringInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultCryptographicMaterialsManagerInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateCryptographicMaterialsCacheInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateDefaultClientSupplierInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::InitializeEncryptionMaterialsInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::InitializeDecryptionMaterialsInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidEncryptionMaterialsTransitionInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidDecryptionMaterialsTransitionInput; + pub use ::dafny_runtime::Sequence; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnEncryptInput; + pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ValidateCommitmentPolicyOnDecryptInput; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/Index.dfy(13,3) + pub fn DefaultMaterialProvidersConfig() -> Arc { + Arc::new(MaterialProvidersConfig::MaterialProvidersConfig {}) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/Index.dfy(18,3) + pub fn MaterialProviders(config: &Arc) -> Arc, Arc>> { + let mut res = MaybePlacebo::, Arc>>>::new(); + let mut maybeCrypto: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::AtomicPrimitives(&crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::_default::DefaultCryptoConfig()); + maybeCrypto = _out0.clone(); + let mut valueOrError0: Arc, Arc>> = maybeCrypto.MapFailure::>(&({ + Arc::new(move |e: &Arc| -> Arc{ + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error::AwsCryptographyPrimitives { + AwsCryptographyPrimitives: e.clone() + }) + }) + })); + if valueOrError0.IsFailure() { + res = MaybePlacebo::from(valueOrError0.PropagateFailure::>()); + return res.read(); + }; + let mut cryptoPrimitivesX: Object = upcast_object::()(valueOrError0.Extract()); + let mut cryptoPrimitives: Object = cast_object!(cryptoPrimitivesX.clone(), AtomicPrimitivesClient); + let mut client: Object; + let mut _nw0: Object = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient::_allocate_object(); + crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient::_ctor(&_nw0, &Arc::new(Config::Config { + crypto: cryptoPrimitives.clone() + })); + client = _nw0.clone(); + res = MaybePlacebo::from(Arc::new(Result::, Arc>::Success { + value: client.clone() + })); + return res.read(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1751,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Success { + value: client.clone() + }) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1754,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl Hash - for CacheType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CacheType::Default{Default, } => { - Hash::hash(Default, _state) - }, - CacheType::No{No, } => { - Hash::hash(No, _state) - }, - CacheType::SingleThreaded{SingleThreaded, } => { - Hash::hash(SingleThreaded, _state) - }, - CacheType::MultiThreaded{MultiThreaded, } => { - Hash::hash(MultiThreaded, _state) - }, - CacheType::StormTracking{StormTracking, } => { - Hash::hash(StormTracking, _state) - }, - CacheType::Shared{Shared, } => { - Hash::hash(Shared, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/Index.dfy(33,3) + pub struct MaterialProvidersClient { + pub __i_config: Arc + } - impl Default - for CacheType { - fn default() -> CacheType { - CacheType::Default { - Default: Default::default() - } - } - } + impl MaterialProvidersClient { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/src/Index.dfy(41,5) + pub fn _ctor(this: &Object, config: &Arc) -> () { + let mut _set___i_config: bool = false; + update_field_uninit_object!(this.clone(), __i_config, _set___i_config, config.clone()); + return (); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1765,5) + pub fn config(&self) -> Arc { + self.__i_config.clone() + } + } - impl AsRef - for &CacheType { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { + UpcastObjectFn!(DynAny); + } - pub struct IClientSupplierCallHistory {} + impl IAwsCryptographicMaterialProvidersClient + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1774,5) + fn CreateAwsKmsKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1805,5) + fn CreateAwsKmsDiscoveryKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsDiscoveryKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1836,5) + fn CreateAwsKmsMultiKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMultiKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1868,5) + fn CreateAwsKmsDiscoveryMultiKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsDiscoveryMultiKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1900,5) + fn CreateAwsKmsMrkKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1931,5) + fn CreateAwsKmsMrkMultiKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkMultiKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1963,5) + fn CreateAwsKmsMrkDiscoveryKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkDiscoveryKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1994,5) + fn CreateAwsKmsMrkDiscoveryMultiKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsMrkDiscoveryMultiKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2026,5) + fn CreateAwsKmsHierarchicalKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsHierarchicalKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2086,5) + fn CreateAwsKmsRsaKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsRsaKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2118,5) + fn CreateAwsKmsEcdhKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateAwsKmsEcdhKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2149,5) + fn CreateMultiKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateMultiKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2187,5) + fn CreateRawAesKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawAesKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2213,5) + fn CreateRawRsaKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawRsaKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2239,5) + fn CreateRawEcdhKeyring(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRawEcdhKeyring(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2265,5) + fn CreateDefaultCryptographicMaterialsManager(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateDefaultCryptographicMaterialsManager(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2296,5) + fn CreateRequiredEncryptionContextCMM(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateRequiredEncryptionContextCMM(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2334,5) + fn CreateCryptographicMaterialsCache(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateCryptographicMaterialsCache(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2382,5) + fn CreateDefaultClientSupplier(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::CreateDefaultClientSupplier(&self.config().clone(), input); + output = _out0.clone(); + return output.clone(); + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2407,5) + fn InitializeEncryptionMaterials(&self, input: &Arc) -> Arc, Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::InitializeEncryptionMaterials(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2416,5) + fn InitializeDecryptionMaterials(&self, input: &Arc) -> Arc, Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::InitializeDecryptionMaterials(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2425,5) + fn ValidEncryptionMaterialsTransition(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidEncryptionMaterialsTransition(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2434,5) + fn ValidDecryptionMaterialsTransition(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidDecryptionMaterialsTransition(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2443,5) + fn EncryptionMaterialsHasPlaintextDataKey(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::EncryptionMaterialsHasPlaintextDataKey(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2452,5) + fn DecryptionMaterialsWithPlaintextDataKey(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::DecryptionMaterialsWithPlaintextDataKey(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2461,5) + fn GetAlgorithmSuiteInfo(&self, input: &Sequence) -> Arc, Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::GetAlgorithmSuiteInfo(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2470,5) + fn ValidAlgorithmSuiteInfo(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidAlgorithmSuiteInfo(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2479,5) + fn ValidateCommitmentPolicyOnEncrypt(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidateCommitmentPolicyOnEncrypt(&self.config().clone(), input) + } + /// Functions that are transparent do not need ensures + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(2488,5) + fn ValidateCommitmentPolicyOnDecrypt(&self, input: &Arc) -> Arc>> { + crate::implementation_from_dafny::_AwsCryptographyMaterialProvidersOperations_Compile::_default::ValidateCommitmentPolicyOnDecrypt(&self.config().clone(), input) + } + } - impl IClientSupplierCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient { + UpcastObjectFn!(dyn IAwsCryptographicMaterialProvidersClient); + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplierCallHistory { - UpcastObjectFn!(dyn Any); - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(9,1) + pub mod types { + pub use ::dafny_runtime::truncate; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::SequenceIter; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::seq; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + pub use ::dafny_runtime::rd; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDHCurveSpec; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::IKeyStoreClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::EncryptionAlgorithmSpec; + pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; + pub use ::dafny_runtime::Map; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::ECDSASignatureAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::AES_GCM; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::DigestAlgorithm; + pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::SymmetricKeyLength; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::BranchKeyMaterials; + pub use crate::implementation_from_dafny::software::amazon::cryptography::keystore::internaldafny::types::BeaconKeyMaterials; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(885,3) + pub fn IsValid_CountingNumber(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1580,3) + pub fn IsValid_PositiveInteger(x: i32) -> bool { + !(x < truncate!(int!(0), i32)) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1584,3) + pub fn IsValid_PositiveLong(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1729,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - pub trait IClientSupplier: Any + UpcastObject { - fn GetClient(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier::r#_GetClient_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_GetClient_k(&self, input: &Rc) -> Rc, Rc>>; - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(19,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - #[derive(PartialEq, Clone)] - pub enum CommitmentPolicy { - ESDK { - ESDK: Rc - }, - DBE { - DBE: Rc - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl CommitmentPolicy { - pub fn ESDK(&self) -> &Rc { - match self { - CommitmentPolicy::ESDK{ESDK, } => ESDK, - CommitmentPolicy::DBE{DBE, } => panic!("field does not exist on this variant"), - } - } - pub fn DBE(&self) -> &Rc { - match self { - CommitmentPolicy::ESDK{ESDK, } => panic!("field does not exist on this variant"), - CommitmentPolicy::DBE{DBE, } => DBE, - } - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for CommitmentPolicy { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for CommitmentPolicy { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CommitmentPolicy::ESDK{ESDK, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CommitmentPolicy.ESDK(")?; - DafnyPrint::fmt_print(ESDK, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - CommitmentPolicy::DBE{DBE, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CommitmentPolicy.DBE(")?; - DafnyPrint::fmt_print(DBE, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Eq - for CommitmentPolicy {} + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl Hash - for CommitmentPolicy { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CommitmentPolicy::ESDK{ESDK, } => { - Hash::hash(ESDK, _state) - }, - CommitmentPolicy::DBE{DBE, } => { - Hash::hash(DBE, _state) - }, - } - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for CommitmentPolicy { - fn default() -> CommitmentPolicy { - CommitmentPolicy::ESDK { - ESDK: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(25,3) + #[derive(PartialEq, Clone)] + pub enum AesWrappingAlg { + ALG_AES128_GCM_IV12_TAG16 {}, + ALG_AES192_GCM_IV12_TAG16 {}, + ALG_AES256_GCM_IV12_TAG16 {} + } - impl AsRef - for &CommitmentPolicy { - fn as_ref(&self) -> Self { - self - } - } + impl AesWrappingAlg {} - pub type CountingNumber = i32; + impl Debug + for AesWrappingAlg { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsDiscoveryKeyringInput { - CreateAwsKmsDiscoveryKeyringInput { - kmsClient: Object, - discoveryFilter: Rc>>, - grantTokens: Rc>>> - } - } + impl DafnyPrint + for AesWrappingAlg { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES128__GCM__IV12__TAG16")?; + Ok(()) + }, + AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES192__GCM__IV12__TAG16")?; + Ok(()) + }, + AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AesWrappingAlg.ALG__AES256__GCM__IV12__TAG16")?; + Ok(()) + }, + } + } + } - impl CreateAwsKmsDiscoveryKeyringInput { - pub fn kmsClient(&self) -> &Object { - match self { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => kmsClient, - } - } - pub fn discoveryFilter(&self) -> &Rc>> { - match self { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => discoveryFilter, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => grantTokens, - } - } - } + impl AesWrappingAlg { + /// Enumerates all possible values of AesWrappingAlg + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16 {}), Arc::new(AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16 {}), Arc::new(AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16 {})].iter() + } + } - impl Debug - for CreateAwsKmsDiscoveryKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for AesWrappingAlg {} - impl DafnyPrint - for CreateAwsKmsDiscoveryKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsDiscoveryKeyringInput.CreateAwsKmsDiscoveryKeyringInput(")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for AesWrappingAlg { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16{} => { - impl Eq - for CreateAwsKmsDiscoveryKeyringInput {} + }, + AesWrappingAlg::ALG_AES192_GCM_IV12_TAG16{} => { - impl Hash - for CreateAwsKmsDiscoveryKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => { - Hash::hash(kmsClient, _state); - Hash::hash(discoveryFilter, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + }, + AesWrappingAlg::ALG_AES256_GCM_IV12_TAG16{} => { - impl Default - for CreateAwsKmsDiscoveryKeyringInput { - fn default() -> CreateAwsKmsDiscoveryKeyringInput { - CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput { - kmsClient: Default::default(), - discoveryFilter: Default::default(), - grantTokens: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &CreateAwsKmsDiscoveryKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for AesWrappingAlg { + fn default() -> AesWrappingAlg { + AesWrappingAlg::ALG_AES128_GCM_IV12_TAG16 {} + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsDiscoveryMultiKeyringInput { - CreateAwsKmsDiscoveryMultiKeyringInput { - regions: Sequence>, - discoveryFilter: Rc>>, - clientSupplier: Rc>>, - grantTokens: Rc>>> - } - } + impl AsRef + for AesWrappingAlg { + fn as_ref(&self) -> &Self { + self + } + } - impl CreateAwsKmsDiscoveryMultiKeyringInput { - pub fn regions(&self) -> &Sequence> { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => regions, - } - } - pub fn discoveryFilter(&self) -> &Rc>> { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => discoveryFilter, - } - } - pub fn clientSupplier(&self) -> &Rc>> { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => clientSupplier, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => grantTokens, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(29,3) + #[derive(PartialEq, Clone)] + pub enum AlgorithmSuiteId { + ESDK { + ESDK: Arc + }, + DBE { + DBE: Arc + } + } - impl Debug - for CreateAwsKmsDiscoveryMultiKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AlgorithmSuiteId { + /// Gets the field ESDK for all enum members which have it + pub fn ESDK(&self) -> &Arc { + match self { + AlgorithmSuiteId::ESDK{ESDK, } => ESDK, + AlgorithmSuiteId::DBE{DBE, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field DBE for all enum members which have it + pub fn DBE(&self) -> &Arc { + match self { + AlgorithmSuiteId::ESDK{ESDK, } => panic!("field does not exist on this variant"), + AlgorithmSuiteId::DBE{DBE, } => DBE, + } + } + } - impl DafnyPrint - for CreateAwsKmsDiscoveryMultiKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsDiscoveryMultiKeyringInput.CreateAwsKmsDiscoveryMultiKeyringInput(")?; - DafnyPrint::fmt_print(regions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for AlgorithmSuiteId { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateAwsKmsDiscoveryMultiKeyringInput {} + impl DafnyPrint + for AlgorithmSuiteId { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AlgorithmSuiteId::ESDK{ESDK, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteId.ESDK(")?; + DafnyPrint::fmt_print(ESDK, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AlgorithmSuiteId::DBE{DBE, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteId.DBE(")?; + DafnyPrint::fmt_print(DBE, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateAwsKmsDiscoveryMultiKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { - Hash::hash(regions, _state); - Hash::hash(discoveryFilter, _state); - Hash::hash(clientSupplier, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Eq + for AlgorithmSuiteId {} + + impl Hash + for AlgorithmSuiteId { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AlgorithmSuiteId::ESDK{ESDK, } => { + Hash::hash(ESDK, _state) + }, + AlgorithmSuiteId::DBE{DBE, } => { + Hash::hash(DBE, _state) + }, + } + } + } - impl Default - for CreateAwsKmsDiscoveryMultiKeyringInput { - fn default() -> CreateAwsKmsDiscoveryMultiKeyringInput { - CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput { - regions: Default::default(), - discoveryFilter: Default::default(), - clientSupplier: Default::default(), - grantTokens: Default::default() - } - } - } + impl Default + for AlgorithmSuiteId { + fn default() -> AlgorithmSuiteId { + AlgorithmSuiteId::ESDK { + ESDK: Default::default() + } + } + } - impl AsRef - for &CreateAwsKmsDiscoveryMultiKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for AlgorithmSuiteId { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsEcdhKeyringInput { - CreateAwsKmsEcdhKeyringInput { - KeyAgreementScheme: Rc, - curveSpec: Rc, - kmsClient: Object, - grantTokens: Rc>>> - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(32,3) + #[derive(PartialEq, Clone)] + pub enum AlgorithmSuiteInfo { + AlgorithmSuiteInfo { + id: Arc, + binaryId: Sequence, + messageVersion: i32, + encrypt: Arc, + kdf: Arc, + commitment: Arc, + signature: Arc, + symmetricSignature: Arc, + edkWrapping: Arc + } + } - impl CreateAwsKmsEcdhKeyringInput { - pub fn KeyAgreementScheme(&self) -> &Rc { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => KeyAgreementScheme, - } - } - pub fn curveSpec(&self) -> &Rc { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => curveSpec, - } - } - pub fn kmsClient(&self) -> &Object { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => kmsClient, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => grantTokens, - } - } - } + impl AlgorithmSuiteInfo { + /// Returns a borrow of the field id + pub fn id(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => id, + } + } + /// Returns a borrow of the field binaryId + pub fn binaryId(&self) -> &Sequence { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => binaryId, + } + } + /// Returns a borrow of the field messageVersion + pub fn messageVersion(&self) -> &i32 { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => messageVersion, + } + } + /// Returns a borrow of the field encrypt + pub fn encrypt(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => encrypt, + } + } + /// Returns a borrow of the field kdf + pub fn kdf(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => kdf, + } + } + /// Returns a borrow of the field commitment + pub fn commitment(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => commitment, + } + } + /// Returns a borrow of the field signature + pub fn signature(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => signature, + } + } + /// Returns a borrow of the field symmetricSignature + pub fn symmetricSignature(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => symmetricSignature, + } + } + /// Returns a borrow of the field edkWrapping + pub fn edkWrapping(&self) -> &Arc { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => edkWrapping, + } + } + } - impl Debug - for CreateAwsKmsEcdhKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for AlgorithmSuiteInfo { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateAwsKmsEcdhKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsEcdhKeyringInput.CreateAwsKmsEcdhKeyringInput(")?; - DafnyPrint::fmt_print(KeyAgreementScheme, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(curveSpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for AlgorithmSuiteInfo { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.AlgorithmSuiteInfo.AlgorithmSuiteInfo(")?; + DafnyPrint::fmt_print(id, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(binaryId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(messageVersion, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encrypt, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kdf, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(commitment, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signature, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(symmetricSignature, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(edkWrapping, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateAwsKmsEcdhKeyringInput {} + impl Eq + for AlgorithmSuiteInfo {} + + impl Hash + for AlgorithmSuiteInfo { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AlgorithmSuiteInfo::AlgorithmSuiteInfo{id, binaryId, messageVersion, encrypt, kdf, commitment, signature, symmetricSignature, edkWrapping, } => { + Hash::hash(id, _state); + Hash::hash(binaryId, _state); + Hash::hash(messageVersion, _state); + Hash::hash(encrypt, _state); + Hash::hash(kdf, _state); + Hash::hash(commitment, _state); + Hash::hash(signature, _state); + Hash::hash(symmetricSignature, _state); + Hash::hash(edkWrapping, _state) + }, + } + } + } - impl Hash - for CreateAwsKmsEcdhKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => { - Hash::hash(KeyAgreementScheme, _state); - Hash::hash(curveSpec, _state); - Hash::hash(kmsClient, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Default + for AlgorithmSuiteInfo { + fn default() -> AlgorithmSuiteInfo { + AlgorithmSuiteInfo::AlgorithmSuiteInfo { + id: Default::default(), + binaryId: Default::default(), + messageVersion: Default::default(), + encrypt: Default::default(), + kdf: Default::default(), + commitment: Default::default(), + signature: Default::default(), + symmetricSignature: Default::default(), + edkWrapping: Default::default() + } + } + } - impl Default - for CreateAwsKmsEcdhKeyringInput { - fn default() -> CreateAwsKmsEcdhKeyringInput { - CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput { - KeyAgreementScheme: Default::default(), - curveSpec: Default::default(), - kmsClient: Default::default(), - grantTokens: Default::default() - } - } - } + impl AsRef + for AlgorithmSuiteInfo { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CreateAwsKmsEcdhKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(43,3) + pub struct IAwsCryptographicMaterialProvidersClientCallHistory {} - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsHierarchicalKeyringInput { - CreateAwsKmsHierarchicalKeyringInput { - branchKeyId: Rc>>, - branchKeyIdSupplier: Rc>>, - keyStore: Object, - ttlSeconds: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, - cache: Rc>>, - partitionId: Rc>> - } - } - - impl CreateAwsKmsHierarchicalKeyringInput { - pub fn branchKeyId(&self) -> &Rc>> { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => branchKeyId, - } - } - pub fn branchKeyIdSupplier(&self) -> &Rc>> { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => branchKeyIdSupplier, - } - } - pub fn keyStore(&self) -> &Object { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => keyStore, - } - } - pub fn ttlSeconds(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => ttlSeconds, - } - } - pub fn cache(&self) -> &Rc>> { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => cache, - } - } - pub fn partitionId(&self) -> &Rc>> { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => partitionId, - } - } - } + impl IAwsCryptographicMaterialProvidersClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Debug - for CreateAwsKmsHierarchicalKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl DafnyPrint - for CreateAwsKmsHierarchicalKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsHierarchicalKeyringInput.CreateAwsKmsHierarchicalKeyringInput(")?; - DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(branchKeyIdSupplier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyStore, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ttlSeconds, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cache, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partitionId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(105,3) + pub trait IAwsCryptographicMaterialProvidersClient: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(134,5) + fn CreateAwsKmsKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(160,5) + fn CreateAwsKmsDiscoveryKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(186,5) + fn CreateAwsKmsMultiKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(213,5) + fn CreateAwsKmsDiscoveryMultiKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(240,5) + fn CreateAwsKmsMrkKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(266,5) + fn CreateAwsKmsMrkMultiKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(293,5) + fn CreateAwsKmsMrkDiscoveryKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(319,5) + fn CreateAwsKmsMrkDiscoveryMultiKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(346,5) + fn CreateAwsKmsHierarchicalKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(401,5) + fn CreateAwsKmsRsaKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(428,5) + fn CreateAwsKmsEcdhKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(454,5) + fn CreateMultiKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(487,5) + fn CreateRawAesKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(508,5) + fn CreateRawRsaKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(529,5) + fn CreateRawEcdhKeyring(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(550,5) + fn CreateDefaultCryptographicMaterialsManager(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(576,5) + fn CreateRequiredEncryptionContextCMM(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(609,5) + fn CreateCryptographicMaterialsCache(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(652,5) + fn CreateDefaultClientSupplier(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(673,5) + fn InitializeEncryptionMaterials(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(679,5) + fn InitializeDecryptionMaterials(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(685,5) + fn ValidEncryptionMaterialsTransition(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(691,5) + fn ValidDecryptionMaterialsTransition(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(697,5) + fn EncryptionMaterialsHasPlaintextDataKey(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(703,5) + fn DecryptionMaterialsWithPlaintextDataKey(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(709,5) + fn GetAlgorithmSuiteInfo(&self, input: &Sequence) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(715,5) + fn ValidAlgorithmSuiteInfo(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(721,5) + fn ValidateCommitmentPolicyOnEncrypt(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(727,5) + fn ValidateCommitmentPolicyOnDecrypt(&self, input: &Arc) -> Arc>>; + } - impl Eq - for CreateAwsKmsHierarchicalKeyringInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(732,3) + pub struct IBranchKeyIdSupplierCallHistory {} - impl Hash - for CreateAwsKmsHierarchicalKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => { - Hash::hash(branchKeyId, _state); - Hash::hash(branchKeyIdSupplier, _state); - Hash::hash(keyStore, _state); - Hash::hash(ttlSeconds, _state); - Hash::hash(cache, _state); - Hash::hash(partitionId, _state) - }, - } - } - } + impl IBranchKeyIdSupplierCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Default - for CreateAwsKmsHierarchicalKeyringInput { - fn default() -> CreateAwsKmsHierarchicalKeyringInput { - CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput { - branchKeyId: Default::default(), - branchKeyIdSupplier: Default::default(), - keyStore: Default::default(), - ttlSeconds: Default::default(), - cache: Default::default(), - partitionId: Default::default() - } - } - } - - impl AsRef - for &CreateAwsKmsHierarchicalKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplierCallHistory { + UpcastObjectFn!(DynAny); + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsKeyringInput { - CreateAwsKmsKeyringInput { - kmsKeyId: Sequence, - kmsClient: Object, - grantTokens: Rc>>> - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(738,3) + pub trait IBranchKeyIdSupplier: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(767,5) + fn GetBranchKeyId(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier::_GetBranchKeyId_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(784,5) + fn _GetBranchKeyId_k(&self, input: &Arc) -> Arc, Arc>>; + } - impl CreateAwsKmsKeyringInput { - pub fn kmsKeyId(&self) -> &Sequence { - match self { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsKeyId, - } - } - pub fn kmsClient(&self) -> &Object { - match self { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsClient, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => grantTokens, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(797,3) + #[derive(PartialEq, Clone)] + pub enum CacheType { + Default { + Default: Arc + }, + No { + No: Arc + }, + SingleThreaded { + SingleThreaded: Arc + }, + MultiThreaded { + MultiThreaded: Arc + }, + StormTracking { + StormTracking: Arc + }, + Shared { + Shared: Object + } + } - impl Debug - for CreateAwsKmsKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CacheType { + /// Gets the field Default for all enum members which have it + pub fn Default(&self) -> &Arc { + match self { + CacheType::Default{Default, } => Default, + CacheType::No{No, } => panic!("field does not exist on this variant"), + CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), + CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), + CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), + CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field No for all enum members which have it + pub fn No(&self) -> &Arc { + match self { + CacheType::Default{Default, } => panic!("field does not exist on this variant"), + CacheType::No{No, } => No, + CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), + CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), + CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), + CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field SingleThreaded for all enum members which have it + pub fn SingleThreaded(&self) -> &Arc { + match self { + CacheType::Default{Default, } => panic!("field does not exist on this variant"), + CacheType::No{No, } => panic!("field does not exist on this variant"), + CacheType::SingleThreaded{SingleThreaded, } => SingleThreaded, + CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), + CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), + CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field MultiThreaded for all enum members which have it + pub fn MultiThreaded(&self) -> &Arc { + match self { + CacheType::Default{Default, } => panic!("field does not exist on this variant"), + CacheType::No{No, } => panic!("field does not exist on this variant"), + CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), + CacheType::MultiThreaded{MultiThreaded, } => MultiThreaded, + CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), + CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field StormTracking for all enum members which have it + pub fn StormTracking(&self) -> &Arc { + match self { + CacheType::Default{Default, } => panic!("field does not exist on this variant"), + CacheType::No{No, } => panic!("field does not exist on this variant"), + CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), + CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), + CacheType::StormTracking{StormTracking, } => StormTracking, + CacheType::Shared{Shared, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field Shared for all enum members which have it + pub fn Shared(&self) -> &Object { + match self { + CacheType::Default{Default, } => panic!("field does not exist on this variant"), + CacheType::No{No, } => panic!("field does not exist on this variant"), + CacheType::SingleThreaded{SingleThreaded, } => panic!("field does not exist on this variant"), + CacheType::MultiThreaded{MultiThreaded, } => panic!("field does not exist on this variant"), + CacheType::StormTracking{StormTracking, } => panic!("field does not exist on this variant"), + CacheType::Shared{Shared, } => Shared, + } + } + } - impl DafnyPrint - for CreateAwsKmsKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsKeyringInput.CreateAwsKmsKeyringInput(")?; - DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CacheType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateAwsKmsKeyringInput {} + impl DafnyPrint + for CacheType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CacheType::Default{Default, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.Default(")?; + DafnyPrint::fmt_print(Default, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CacheType::No{No, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.No(")?; + DafnyPrint::fmt_print(No, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CacheType::SingleThreaded{SingleThreaded, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.SingleThreaded(")?; + DafnyPrint::fmt_print(SingleThreaded, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CacheType::MultiThreaded{MultiThreaded, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.MultiThreaded(")?; + DafnyPrint::fmt_print(MultiThreaded, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CacheType::StormTracking{StormTracking, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.StormTracking(")?; + DafnyPrint::fmt_print(StormTracking, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CacheType::Shared{Shared, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CacheType.Shared(")?; + DafnyPrint::fmt_print(Shared, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateAwsKmsKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { - Hash::hash(kmsKeyId, _state); - Hash::hash(kmsClient, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Eq + for CacheType {} + + impl Hash + for CacheType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CacheType::Default{Default, } => { + Hash::hash(Default, _state) + }, + CacheType::No{No, } => { + Hash::hash(No, _state) + }, + CacheType::SingleThreaded{SingleThreaded, } => { + Hash::hash(SingleThreaded, _state) + }, + CacheType::MultiThreaded{MultiThreaded, } => { + Hash::hash(MultiThreaded, _state) + }, + CacheType::StormTracking{StormTracking, } => { + Hash::hash(StormTracking, _state) + }, + CacheType::Shared{Shared, } => { + Hash::hash(Shared, _state) + }, + } + } + } - impl Default - for CreateAwsKmsKeyringInput { - fn default() -> CreateAwsKmsKeyringInput { - CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput { - kmsKeyId: Default::default(), - kmsClient: Default::default(), - grantTokens: Default::default() - } - } - } + impl Default + for CacheType { + fn default() -> CacheType { + CacheType::Default { + Default: Default::default() + } + } + } - impl AsRef - for &CreateAwsKmsKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CacheType { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsMrkDiscoveryKeyringInput { - CreateAwsKmsMrkDiscoveryKeyringInput { - kmsClient: Object, - discoveryFilter: Rc>>, - grantTokens: Rc>>>, - region: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(804,3) + pub struct IClientSupplierCallHistory {} - impl CreateAwsKmsMrkDiscoveryKeyringInput { - pub fn kmsClient(&self) -> &Object { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => kmsClient, - } - } - pub fn discoveryFilter(&self) -> &Rc>> { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => discoveryFilter, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => grantTokens, - } - } - pub fn region(&self) -> &Sequence { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => region, - } - } - } + impl IClientSupplierCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Debug - for CreateAwsKmsMrkDiscoveryKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplierCallHistory { + UpcastObjectFn!(DynAny); + } - impl DafnyPrint - for CreateAwsKmsMrkDiscoveryKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkDiscoveryKeyringInput.CreateAwsKmsMrkDiscoveryKeyringInput(")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(region, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(810,3) + pub trait IClientSupplier: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(839,5) + fn GetClient(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IClientSupplier::_GetClient_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(862,5) + fn _GetClient_k(&self, input: &Arc) -> Arc, Arc>>; + } - impl Eq - for CreateAwsKmsMrkDiscoveryKeyringInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(881,3) + #[derive(PartialEq, Clone)] + pub enum CommitmentPolicy { + ESDK { + ESDK: Arc + }, + DBE { + DBE: Arc + } + } - impl Hash - for CreateAwsKmsMrkDiscoveryKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => { - Hash::hash(kmsClient, _state); - Hash::hash(discoveryFilter, _state); - Hash::hash(grantTokens, _state); - Hash::hash(region, _state) - }, - } - } - } + impl CommitmentPolicy { + /// Gets the field ESDK for all enum members which have it + pub fn ESDK(&self) -> &Arc { + match self { + CommitmentPolicy::ESDK{ESDK, } => ESDK, + CommitmentPolicy::DBE{DBE, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field DBE for all enum members which have it + pub fn DBE(&self) -> &Arc { + match self { + CommitmentPolicy::ESDK{ESDK, } => panic!("field does not exist on this variant"), + CommitmentPolicy::DBE{DBE, } => DBE, + } + } + } - impl Default - for CreateAwsKmsMrkDiscoveryKeyringInput { - fn default() -> CreateAwsKmsMrkDiscoveryKeyringInput { - CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput { - kmsClient: Default::default(), - discoveryFilter: Default::default(), - grantTokens: Default::default(), - region: Default::default() - } - } - } + impl Debug + for CommitmentPolicy { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &CreateAwsKmsMrkDiscoveryKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CommitmentPolicy { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CommitmentPolicy::ESDK{ESDK, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CommitmentPolicy.ESDK(")?; + DafnyPrint::fmt_print(ESDK, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + CommitmentPolicy::DBE{DBE, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CommitmentPolicy.DBE(")?; + DafnyPrint::fmt_print(DBE, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsMrkDiscoveryMultiKeyringInput { - CreateAwsKmsMrkDiscoveryMultiKeyringInput { - regions: Sequence>, - discoveryFilter: Rc>>, - clientSupplier: Rc>>, - grantTokens: Rc>>> - } - } + impl Eq + for CommitmentPolicy {} + + impl Hash + for CommitmentPolicy { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CommitmentPolicy::ESDK{ESDK, } => { + Hash::hash(ESDK, _state) + }, + CommitmentPolicy::DBE{DBE, } => { + Hash::hash(DBE, _state) + }, + } + } + } - impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { - pub fn regions(&self) -> &Sequence> { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => regions, - } - } - pub fn discoveryFilter(&self) -> &Rc>> { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => discoveryFilter, - } - } - pub fn clientSupplier(&self) -> &Rc>> { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => clientSupplier, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => grantTokens, - } - } - } + impl Default + for CommitmentPolicy { + fn default() -> CommitmentPolicy { + CommitmentPolicy::ESDK { + ESDK: Default::default() + } + } + } - impl Debug - for CreateAwsKmsMrkDiscoveryMultiKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CommitmentPolicy { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateAwsKmsMrkDiscoveryMultiKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkDiscoveryMultiKeyringInput.CreateAwsKmsMrkDiscoveryMultiKeyringInput(")?; - DafnyPrint::fmt_print(regions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(884,3) + pub type CountingNumber = i32; - impl Eq - for CreateAwsKmsMrkDiscoveryMultiKeyringInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(888,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsDiscoveryKeyringInput { + CreateAwsKmsDiscoveryKeyringInput { + kmsClient: Object, + discoveryFilter: Arc>>, + grantTokens: Arc>>> + } + } - impl Hash - for CreateAwsKmsMrkDiscoveryMultiKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { - Hash::hash(regions, _state); - Hash::hash(discoveryFilter, _state); - Hash::hash(clientSupplier, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl CreateAwsKmsDiscoveryKeyringInput { + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Object { + match self { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => kmsClient, + } + } + /// Returns a borrow of the field discoveryFilter + pub fn discoveryFilter(&self) -> &Arc>> { + match self { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => discoveryFilter, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => grantTokens, + } + } + } - impl Default - for CreateAwsKmsMrkDiscoveryMultiKeyringInput { - fn default() -> CreateAwsKmsMrkDiscoveryMultiKeyringInput { - CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput { - regions: Default::default(), - discoveryFilter: Default::default(), - clientSupplier: Default::default(), - grantTokens: Default::default() - } - } - } + impl Debug + for CreateAwsKmsDiscoveryKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &CreateAwsKmsMrkDiscoveryMultiKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CreateAwsKmsDiscoveryKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsDiscoveryKeyringInput.CreateAwsKmsDiscoveryKeyringInput(")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsMrkKeyringInput { - CreateAwsKmsMrkKeyringInput { - kmsKeyId: Sequence, - kmsClient: Object, - grantTokens: Rc>>> - } - } + impl Eq + for CreateAwsKmsDiscoveryKeyringInput {} + + impl Hash + for CreateAwsKmsDiscoveryKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, } => { + Hash::hash(kmsClient, _state); + Hash::hash(discoveryFilter, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl CreateAwsKmsMrkKeyringInput { - pub fn kmsKeyId(&self) -> &Sequence { - match self { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsKeyId, - } - } - pub fn kmsClient(&self) -> &Object { - match self { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsClient, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => grantTokens, - } - } - } + impl Default + for CreateAwsKmsDiscoveryKeyringInput { + fn default() -> CreateAwsKmsDiscoveryKeyringInput { + CreateAwsKmsDiscoveryKeyringInput::CreateAwsKmsDiscoveryKeyringInput { + kmsClient: Default::default(), + discoveryFilter: Default::default(), + grantTokens: Default::default() + } + } + } - impl Debug - for CreateAwsKmsMrkKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateAwsKmsDiscoveryKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateAwsKmsMrkKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkKeyringInput.CreateAwsKmsMrkKeyringInput(")?; - DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(893,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsDiscoveryMultiKeyringInput { + CreateAwsKmsDiscoveryMultiKeyringInput { + regions: Sequence>, + discoveryFilter: Arc>>, + clientSupplier: Arc>>, + grantTokens: Arc>>> + } + } - impl Eq - for CreateAwsKmsMrkKeyringInput {} + impl CreateAwsKmsDiscoveryMultiKeyringInput { + /// Returns a borrow of the field regions + pub fn regions(&self) -> &Sequence> { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => regions, + } + } + /// Returns a borrow of the field discoveryFilter + pub fn discoveryFilter(&self) -> &Arc>> { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => discoveryFilter, + } + } + /// Returns a borrow of the field clientSupplier + pub fn clientSupplier(&self) -> &Arc>> { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => clientSupplier, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => grantTokens, + } + } + } - impl Hash - for CreateAwsKmsMrkKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { - Hash::hash(kmsKeyId, _state); - Hash::hash(kmsClient, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Debug + for CreateAwsKmsDiscoveryMultiKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for CreateAwsKmsMrkKeyringInput { - fn default() -> CreateAwsKmsMrkKeyringInput { - CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput { - kmsKeyId: Default::default(), - kmsClient: Default::default(), - grantTokens: Default::default() - } - } - } + impl DafnyPrint + for CreateAwsKmsDiscoveryMultiKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsDiscoveryMultiKeyringInput.CreateAwsKmsDiscoveryMultiKeyringInput(")?; + DafnyPrint::fmt_print(regions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &CreateAwsKmsMrkKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for CreateAwsKmsDiscoveryMultiKeyringInput {} + + impl Hash + for CreateAwsKmsDiscoveryMultiKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { + Hash::hash(regions, _state); + Hash::hash(discoveryFilter, _state); + Hash::hash(clientSupplier, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsMrkMultiKeyringInput { - CreateAwsKmsMrkMultiKeyringInput { - generator: Rc>>, - kmsKeyIds: Rc>>>, - clientSupplier: Rc>>, - grantTokens: Rc>>> - } - } + impl Default + for CreateAwsKmsDiscoveryMultiKeyringInput { + fn default() -> CreateAwsKmsDiscoveryMultiKeyringInput { + CreateAwsKmsDiscoveryMultiKeyringInput::CreateAwsKmsDiscoveryMultiKeyringInput { + regions: Default::default(), + discoveryFilter: Default::default(), + clientSupplier: Default::default(), + grantTokens: Default::default() + } + } + } - impl CreateAwsKmsMrkMultiKeyringInput { - pub fn generator(&self) -> &Rc>> { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => generator, - } - } - pub fn kmsKeyIds(&self) -> &Rc>>> { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => kmsKeyIds, - } - } - pub fn clientSupplier(&self) -> &Rc>> { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => clientSupplier, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => grantTokens, - } - } - } + impl AsRef + for CreateAwsKmsDiscoveryMultiKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for CreateAwsKmsMrkMultiKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(899,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsEcdhKeyringInput { + CreateAwsKmsEcdhKeyringInput { + KeyAgreementScheme: Arc, + curveSpec: Arc, + kmsClient: Object, + grantTokens: Arc>>> + } + } - impl DafnyPrint - for CreateAwsKmsMrkMultiKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkMultiKeyringInput.CreateAwsKmsMrkMultiKeyringInput(")?; - DafnyPrint::fmt_print(generator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsKeyIds, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CreateAwsKmsEcdhKeyringInput { + /// Returns a borrow of the field KeyAgreementScheme + pub fn KeyAgreementScheme(&self) -> &Arc { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => KeyAgreementScheme, + } + } + /// Returns a borrow of the field curveSpec + pub fn curveSpec(&self) -> &Arc { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => curveSpec, + } + } + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Object { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => kmsClient, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => grantTokens, + } + } + } - impl Eq - for CreateAwsKmsMrkMultiKeyringInput {} + impl Debug + for CreateAwsKmsEcdhKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for CreateAwsKmsMrkMultiKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { - Hash::hash(generator, _state); - Hash::hash(kmsKeyIds, _state); - Hash::hash(clientSupplier, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl DafnyPrint + for CreateAwsKmsEcdhKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsEcdhKeyringInput.CreateAwsKmsEcdhKeyringInput(")?; + DafnyPrint::fmt_print(KeyAgreementScheme, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(curveSpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for CreateAwsKmsMrkMultiKeyringInput { - fn default() -> CreateAwsKmsMrkMultiKeyringInput { - CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput { - generator: Default::default(), - kmsKeyIds: Default::default(), - clientSupplier: Default::default(), - grantTokens: Default::default() - } - } - } + impl Eq + for CreateAwsKmsEcdhKeyringInput {} + + impl Hash + for CreateAwsKmsEcdhKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput{KeyAgreementScheme, curveSpec, kmsClient, grantTokens, } => { + Hash::hash(KeyAgreementScheme, _state); + Hash::hash(curveSpec, _state); + Hash::hash(kmsClient, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl AsRef - for &CreateAwsKmsMrkMultiKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CreateAwsKmsEcdhKeyringInput { + fn default() -> CreateAwsKmsEcdhKeyringInput { + CreateAwsKmsEcdhKeyringInput::CreateAwsKmsEcdhKeyringInput { + KeyAgreementScheme: Default::default(), + curveSpec: Default::default(), + kmsClient: Default::default(), + grantTokens: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsMultiKeyringInput { - CreateAwsKmsMultiKeyringInput { - generator: Rc>>, - kmsKeyIds: Rc>>>, - clientSupplier: Rc>>, - grantTokens: Rc>>> - } - } + impl AsRef + for CreateAwsKmsEcdhKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl CreateAwsKmsMultiKeyringInput { - pub fn generator(&self) -> &Rc>> { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => generator, - } - } - pub fn kmsKeyIds(&self) -> &Rc>>> { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => kmsKeyIds, - } - } - pub fn clientSupplier(&self) -> &Rc>> { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => clientSupplier, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => grantTokens, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(905,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsHierarchicalKeyringInput { + CreateAwsKmsHierarchicalKeyringInput { + branchKeyId: Arc>>, + branchKeyIdSupplier: Arc>>, + keyStore: Object, + ttlSeconds: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, + cache: Arc>>, + partitionId: Arc>> + } + } - impl Debug - for CreateAwsKmsMultiKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateAwsKmsHierarchicalKeyringInput { + /// Returns a borrow of the field branchKeyId + pub fn branchKeyId(&self) -> &Arc>> { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => branchKeyId, + } + } + /// Returns a borrow of the field branchKeyIdSupplier + pub fn branchKeyIdSupplier(&self) -> &Arc>> { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => branchKeyIdSupplier, + } + } + /// Returns a borrow of the field keyStore + pub fn keyStore(&self) -> &Object { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => keyStore, + } + } + /// Returns a borrow of the field ttlSeconds + pub fn ttlSeconds(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => ttlSeconds, + } + } + /// Returns a borrow of the field cache + pub fn cache(&self) -> &Arc>> { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => cache, + } + } + /// Returns a borrow of the field partitionId + pub fn partitionId(&self) -> &Arc>> { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => partitionId, + } + } + } - impl DafnyPrint - for CreateAwsKmsMultiKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMultiKeyringInput.CreateAwsKmsMultiKeyringInput(")?; - DafnyPrint::fmt_print(generator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsKeyIds, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateAwsKmsHierarchicalKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateAwsKmsMultiKeyringInput {} + impl DafnyPrint + for CreateAwsKmsHierarchicalKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsHierarchicalKeyringInput.CreateAwsKmsHierarchicalKeyringInput(")?; + DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(branchKeyIdSupplier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyStore, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ttlSeconds, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(cache, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partitionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateAwsKmsMultiKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { - Hash::hash(generator, _state); - Hash::hash(kmsKeyIds, _state); - Hash::hash(clientSupplier, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Eq + for CreateAwsKmsHierarchicalKeyringInput {} + + impl Hash + for CreateAwsKmsHierarchicalKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput{branchKeyId, branchKeyIdSupplier, keyStore, ttlSeconds, cache, partitionId, } => { + Hash::hash(branchKeyId, _state); + Hash::hash(branchKeyIdSupplier, _state); + Hash::hash(keyStore, _state); + Hash::hash(ttlSeconds, _state); + Hash::hash(cache, _state); + Hash::hash(partitionId, _state) + }, + } + } + } - impl Default - for CreateAwsKmsMultiKeyringInput { - fn default() -> CreateAwsKmsMultiKeyringInput { - CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput { - generator: Default::default(), - kmsKeyIds: Default::default(), - clientSupplier: Default::default(), - grantTokens: Default::default() - } - } - } + impl Default + for CreateAwsKmsHierarchicalKeyringInput { + fn default() -> CreateAwsKmsHierarchicalKeyringInput { + CreateAwsKmsHierarchicalKeyringInput::CreateAwsKmsHierarchicalKeyringInput { + branchKeyId: Default::default(), + branchKeyIdSupplier: Default::default(), + keyStore: Default::default(), + ttlSeconds: Default::default(), + cache: Default::default(), + partitionId: Default::default() + } + } + } - impl AsRef - for &CreateAwsKmsMultiKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CreateAwsKmsHierarchicalKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAwsKmsRsaKeyringInput { - CreateAwsKmsRsaKeyringInput { - publicKey: Rc>>, - kmsKeyId: Sequence, - encryptionAlgorithm: Rc, - kmsClient: Rc>>, - grantTokens: Rc>>> - } - } - - impl CreateAwsKmsRsaKeyringInput { - pub fn publicKey(&self) -> &Rc>> { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => publicKey, - } - } - pub fn kmsKeyId(&self) -> &Sequence { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => kmsKeyId, - } - } - pub fn encryptionAlgorithm(&self) -> &Rc { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => encryptionAlgorithm, - } - } - pub fn kmsClient(&self) -> &Rc>> { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => kmsClient, - } - } - pub fn grantTokens(&self) -> &Rc>>> { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => grantTokens, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(913,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsKeyringInput { + CreateAwsKmsKeyringInput { + kmsKeyId: Sequence, + kmsClient: Object, + grantTokens: Arc>>> + } + } - impl Debug - for CreateAwsKmsRsaKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateAwsKmsKeyringInput { + /// Returns a borrow of the field kmsKeyId + pub fn kmsKeyId(&self) -> &Sequence { + match self { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsKeyId, + } + } + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Object { + match self { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsClient, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => grantTokens, + } + } + } - impl DafnyPrint - for CreateAwsKmsRsaKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsRsaKeyringInput.CreateAwsKmsRsaKeyringInput(")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(kmsClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(grantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateAwsKmsKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateAwsKmsRsaKeyringInput {} + impl DafnyPrint + for CreateAwsKmsKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsKeyringInput.CreateAwsKmsKeyringInput(")?; + DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateAwsKmsRsaKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => { - Hash::hash(publicKey, _state); - Hash::hash(kmsKeyId, _state); - Hash::hash(encryptionAlgorithm, _state); - Hash::hash(kmsClient, _state); - Hash::hash(grantTokens, _state) - }, - } - } - } + impl Eq + for CreateAwsKmsKeyringInput {} + + impl Hash + for CreateAwsKmsKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { + Hash::hash(kmsKeyId, _state); + Hash::hash(kmsClient, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl Default - for CreateAwsKmsRsaKeyringInput { - fn default() -> CreateAwsKmsRsaKeyringInput { - CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput { - publicKey: Default::default(), - kmsKeyId: Default::default(), - encryptionAlgorithm: Default::default(), - kmsClient: Default::default(), - grantTokens: Default::default() - } - } - } + impl Default + for CreateAwsKmsKeyringInput { + fn default() -> CreateAwsKmsKeyringInput { + CreateAwsKmsKeyringInput::CreateAwsKmsKeyringInput { + kmsKeyId: Default::default(), + kmsClient: Default::default(), + grantTokens: Default::default() + } + } + } - impl AsRef - for &CreateAwsKmsRsaKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CreateAwsKmsKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateCryptographicMaterialsCacheInput { - CreateCryptographicMaterialsCacheInput { - cache: Rc - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(918,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsMrkDiscoveryKeyringInput { + CreateAwsKmsMrkDiscoveryKeyringInput { + kmsClient: Object, + discoveryFilter: Arc>>, + grantTokens: Arc>>>, + region: Sequence + } + } - impl CreateCryptographicMaterialsCacheInput { - pub fn cache(&self) -> &Rc { - match self { - CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => cache, - } - } - } + impl CreateAwsKmsMrkDiscoveryKeyringInput { + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Object { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => kmsClient, + } + } + /// Returns a borrow of the field discoveryFilter + pub fn discoveryFilter(&self) -> &Arc>> { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => discoveryFilter, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => grantTokens, + } + } + /// Returns a borrow of the field region + pub fn region(&self) -> &Sequence { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => region, + } + } + } - impl Debug - for CreateCryptographicMaterialsCacheInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for CreateAwsKmsMrkDiscoveryKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateCryptographicMaterialsCacheInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateCryptographicMaterialsCacheInput.CreateCryptographicMaterialsCacheInput(")?; - DafnyPrint::fmt_print(cache, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for CreateAwsKmsMrkDiscoveryKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkDiscoveryKeyringInput.CreateAwsKmsMrkDiscoveryKeyringInput(")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(region, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateCryptographicMaterialsCacheInput {} + impl Eq + for CreateAwsKmsMrkDiscoveryKeyringInput {} + + impl Hash + for CreateAwsKmsMrkDiscoveryKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput{kmsClient, discoveryFilter, grantTokens, region, } => { + Hash::hash(kmsClient, _state); + Hash::hash(discoveryFilter, _state); + Hash::hash(grantTokens, _state); + Hash::hash(region, _state) + }, + } + } + } - impl Hash - for CreateCryptographicMaterialsCacheInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => { - Hash::hash(cache, _state) - }, - } - } - } + impl Default + for CreateAwsKmsMrkDiscoveryKeyringInput { + fn default() -> CreateAwsKmsMrkDiscoveryKeyringInput { + CreateAwsKmsMrkDiscoveryKeyringInput::CreateAwsKmsMrkDiscoveryKeyringInput { + kmsClient: Default::default(), + discoveryFilter: Default::default(), + grantTokens: Default::default(), + region: Default::default() + } + } + } - impl Default - for CreateCryptographicMaterialsCacheInput { - fn default() -> CreateCryptographicMaterialsCacheInput { - CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput { - cache: Default::default() - } - } - } + impl AsRef + for CreateAwsKmsMrkDiscoveryKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CreateCryptographicMaterialsCacheInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(924,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsMrkDiscoveryMultiKeyringInput { + CreateAwsKmsMrkDiscoveryMultiKeyringInput { + regions: Sequence>, + discoveryFilter: Arc>>, + clientSupplier: Arc>>, + grantTokens: Arc>>> + } + } - #[derive(PartialEq, Clone)] - pub enum CreateDefaultClientSupplierInput { - CreateDefaultClientSupplierInput {} - } + impl CreateAwsKmsMrkDiscoveryMultiKeyringInput { + /// Returns a borrow of the field regions + pub fn regions(&self) -> &Sequence> { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => regions, + } + } + /// Returns a borrow of the field discoveryFilter + pub fn discoveryFilter(&self) -> &Arc>> { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => discoveryFilter, + } + } + /// Returns a borrow of the field clientSupplier + pub fn clientSupplier(&self) -> &Arc>> { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => clientSupplier, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => grantTokens, + } + } + } - impl CreateDefaultClientSupplierInput {} + impl Debug + for CreateAwsKmsMrkDiscoveryMultiKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for CreateDefaultClientSupplierInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CreateAwsKmsMrkDiscoveryMultiKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkDiscoveryMultiKeyringInput.CreateAwsKmsMrkDiscoveryMultiKeyringInput(")?; + DafnyPrint::fmt_print(regions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(discoveryFilter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for CreateDefaultClientSupplierInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateDefaultClientSupplierInput.CreateDefaultClientSupplierInput")?; - Ok(()) - }, - } - } - } + impl Eq + for CreateAwsKmsMrkDiscoveryMultiKeyringInput {} + + impl Hash + for CreateAwsKmsMrkDiscoveryMultiKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput{regions, discoveryFilter, clientSupplier, grantTokens, } => { + Hash::hash(regions, _state); + Hash::hash(discoveryFilter, _state); + Hash::hash(clientSupplier, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl CreateDefaultClientSupplierInput { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput {})].iter() - } - } + impl Default + for CreateAwsKmsMrkDiscoveryMultiKeyringInput { + fn default() -> CreateAwsKmsMrkDiscoveryMultiKeyringInput { + CreateAwsKmsMrkDiscoveryMultiKeyringInput::CreateAwsKmsMrkDiscoveryMultiKeyringInput { + regions: Default::default(), + discoveryFilter: Default::default(), + clientSupplier: Default::default(), + grantTokens: Default::default() + } + } + } - impl Eq - for CreateDefaultClientSupplierInput {} + impl AsRef + for CreateAwsKmsMrkDiscoveryMultiKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for CreateDefaultClientSupplierInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(930,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsMrkKeyringInput { + CreateAwsKmsMrkKeyringInput { + kmsKeyId: Sequence, + kmsClient: Object, + grantTokens: Arc>>> + } + } - }, - } - } - } + impl CreateAwsKmsMrkKeyringInput { + /// Returns a borrow of the field kmsKeyId + pub fn kmsKeyId(&self) -> &Sequence { + match self { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsKeyId, + } + } + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Object { + match self { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => kmsClient, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => grantTokens, + } + } + } - impl Default - for CreateDefaultClientSupplierInput { - fn default() -> CreateDefaultClientSupplierInput { - CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput {} - } - } + impl Debug + for CreateAwsKmsMrkKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &CreateDefaultClientSupplierInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CreateAwsKmsMrkKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkKeyringInput.CreateAwsKmsMrkKeyringInput(")?; + DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateDefaultCryptographicMaterialsManagerInput { - CreateDefaultCryptographicMaterialsManagerInput { - keyring: Object - } - } + impl Eq + for CreateAwsKmsMrkKeyringInput {} + + impl Hash + for CreateAwsKmsMrkKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput{kmsKeyId, kmsClient, grantTokens, } => { + Hash::hash(kmsKeyId, _state); + Hash::hash(kmsClient, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl CreateDefaultCryptographicMaterialsManagerInput { - pub fn keyring(&self) -> &Object { - match self { - CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => keyring, - } - } - } + impl Default + for CreateAwsKmsMrkKeyringInput { + fn default() -> CreateAwsKmsMrkKeyringInput { + CreateAwsKmsMrkKeyringInput::CreateAwsKmsMrkKeyringInput { + kmsKeyId: Default::default(), + kmsClient: Default::default(), + grantTokens: Default::default() + } + } + } - impl Debug - for CreateDefaultCryptographicMaterialsManagerInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateAwsKmsMrkKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateDefaultCryptographicMaterialsManagerInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateDefaultCryptographicMaterialsManagerInput.CreateDefaultCryptographicMaterialsManagerInput(")?; - DafnyPrint::fmt_print(keyring, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(935,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsMrkMultiKeyringInput { + CreateAwsKmsMrkMultiKeyringInput { + generator: Arc>>, + kmsKeyIds: Arc>>>, + clientSupplier: Arc>>, + grantTokens: Arc>>> + } + } - impl Eq - for CreateDefaultCryptographicMaterialsManagerInput {} + impl CreateAwsKmsMrkMultiKeyringInput { + /// Returns a borrow of the field generator + pub fn generator(&self) -> &Arc>> { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => generator, + } + } + /// Returns a borrow of the field kmsKeyIds + pub fn kmsKeyIds(&self) -> &Arc>>> { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => kmsKeyIds, + } + } + /// Returns a borrow of the field clientSupplier + pub fn clientSupplier(&self) -> &Arc>> { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => clientSupplier, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => grantTokens, + } + } + } - impl Hash - for CreateDefaultCryptographicMaterialsManagerInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => { - Hash::hash(keyring, _state) - }, - } - } - } + impl Debug + for CreateAwsKmsMrkMultiKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for CreateDefaultCryptographicMaterialsManagerInput { - fn default() -> CreateDefaultCryptographicMaterialsManagerInput { - CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { - keyring: Default::default() - } - } - } + impl DafnyPrint + for CreateAwsKmsMrkMultiKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMrkMultiKeyringInput.CreateAwsKmsMrkMultiKeyringInput(")?; + DafnyPrint::fmt_print(generator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsKeyIds, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &CreateDefaultCryptographicMaterialsManagerInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for CreateAwsKmsMrkMultiKeyringInput {} + + impl Hash + for CreateAwsKmsMrkMultiKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { + Hash::hash(generator, _state); + Hash::hash(kmsKeyIds, _state); + Hash::hash(clientSupplier, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateMultiKeyringInput { - CreateMultiKeyringInput { - generator: Rc>>, - childKeyrings: Sequence> - } - } + impl Default + for CreateAwsKmsMrkMultiKeyringInput { + fn default() -> CreateAwsKmsMrkMultiKeyringInput { + CreateAwsKmsMrkMultiKeyringInput::CreateAwsKmsMrkMultiKeyringInput { + generator: Default::default(), + kmsKeyIds: Default::default(), + clientSupplier: Default::default(), + grantTokens: Default::default() + } + } + } - impl CreateMultiKeyringInput { - pub fn generator(&self) -> &Rc>> { - match self { - CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => generator, - } - } - pub fn childKeyrings(&self) -> &Sequence> { - match self { - CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => childKeyrings, - } - } - } + impl AsRef + for CreateAwsKmsMrkMultiKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for CreateMultiKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(941,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsMultiKeyringInput { + CreateAwsKmsMultiKeyringInput { + generator: Arc>>, + kmsKeyIds: Arc>>>, + clientSupplier: Arc>>, + grantTokens: Arc>>> + } + } - impl DafnyPrint - for CreateMultiKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateMultiKeyringInput.CreateMultiKeyringInput(")?; - DafnyPrint::fmt_print(generator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(childKeyrings, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CreateAwsKmsMultiKeyringInput { + /// Returns a borrow of the field generator + pub fn generator(&self) -> &Arc>> { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => generator, + } + } + /// Returns a borrow of the field kmsKeyIds + pub fn kmsKeyIds(&self) -> &Arc>>> { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => kmsKeyIds, + } + } + /// Returns a borrow of the field clientSupplier + pub fn clientSupplier(&self) -> &Arc>> { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => clientSupplier, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => grantTokens, + } + } + } - impl Eq - for CreateMultiKeyringInput {} + impl Debug + for CreateAwsKmsMultiKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for CreateMultiKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => { - Hash::hash(generator, _state); - Hash::hash(childKeyrings, _state) - }, - } - } - } + impl DafnyPrint + for CreateAwsKmsMultiKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsMultiKeyringInput.CreateAwsKmsMultiKeyringInput(")?; + DafnyPrint::fmt_print(generator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsKeyIds, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(clientSupplier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for CreateMultiKeyringInput { - fn default() -> CreateMultiKeyringInput { - CreateMultiKeyringInput::CreateMultiKeyringInput { - generator: Default::default(), - childKeyrings: Default::default() - } - } - } + impl Eq + for CreateAwsKmsMultiKeyringInput {} + + impl Hash + for CreateAwsKmsMultiKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput{generator, kmsKeyIds, clientSupplier, grantTokens, } => { + Hash::hash(generator, _state); + Hash::hash(kmsKeyIds, _state); + Hash::hash(clientSupplier, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl AsRef - for &CreateMultiKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CreateAwsKmsMultiKeyringInput { + fn default() -> CreateAwsKmsMultiKeyringInput { + CreateAwsKmsMultiKeyringInput::CreateAwsKmsMultiKeyringInput { + generator: Default::default(), + kmsKeyIds: Default::default(), + clientSupplier: Default::default(), + grantTokens: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateRawAesKeyringInput { - CreateRawAesKeyringInput { - keyNamespace: Sequence, - keyName: Sequence, - wrappingKey: Sequence, - wrappingAlg: Rc - } - } + impl AsRef + for CreateAwsKmsMultiKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl CreateRawAesKeyringInput { - pub fn keyNamespace(&self) -> &Sequence { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => keyNamespace, - } - } - pub fn keyName(&self) -> &Sequence { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => keyName, - } - } - pub fn wrappingKey(&self) -> &Sequence { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => wrappingKey, - } - } - pub fn wrappingAlg(&self) -> &Rc { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => wrappingAlg, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(947,3) + #[derive(PartialEq, Clone)] + pub enum CreateAwsKmsRsaKeyringInput { + CreateAwsKmsRsaKeyringInput { + publicKey: Arc>>, + kmsKeyId: Sequence, + encryptionAlgorithm: Arc, + kmsClient: Arc>>, + grantTokens: Arc>>> + } + } - impl Debug - for CreateRawAesKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateAwsKmsRsaKeyringInput { + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc>> { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => publicKey, + } + } + /// Returns a borrow of the field kmsKeyId + pub fn kmsKeyId(&self) -> &Sequence { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => kmsKeyId, + } + } + /// Returns a borrow of the field encryptionAlgorithm + pub fn encryptionAlgorithm(&self) -> &Arc { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => encryptionAlgorithm, + } + } + /// Returns a borrow of the field kmsClient + pub fn kmsClient(&self) -> &Arc>> { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => kmsClient, + } + } + /// Returns a borrow of the field grantTokens + pub fn grantTokens(&self) -> &Arc>>> { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => grantTokens, + } + } + } - impl DafnyPrint - for CreateRawAesKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawAesKeyringInput.CreateRawAesKeyringInput(")?; - DafnyPrint::fmt_print(keyNamespace, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(wrappingKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(wrappingAlg, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateAwsKmsRsaKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateRawAesKeyringInput {} + impl DafnyPrint + for CreateAwsKmsRsaKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateAwsKmsRsaKeyringInput.CreateAwsKmsRsaKeyringInput(")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(kmsClient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(grantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateRawAesKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => { - Hash::hash(keyNamespace, _state); - Hash::hash(keyName, _state); - Hash::hash(wrappingKey, _state); - Hash::hash(wrappingAlg, _state) - }, - } - } - } + impl Eq + for CreateAwsKmsRsaKeyringInput {} + + impl Hash + for CreateAwsKmsRsaKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput{publicKey, kmsKeyId, encryptionAlgorithm, kmsClient, grantTokens, } => { + Hash::hash(publicKey, _state); + Hash::hash(kmsKeyId, _state); + Hash::hash(encryptionAlgorithm, _state); + Hash::hash(kmsClient, _state); + Hash::hash(grantTokens, _state) + }, + } + } + } - impl Default - for CreateRawAesKeyringInput { - fn default() -> CreateRawAesKeyringInput { - CreateRawAesKeyringInput::CreateRawAesKeyringInput { - keyNamespace: Default::default(), - keyName: Default::default(), - wrappingKey: Default::default(), - wrappingAlg: Default::default() - } - } - } + impl Default + for CreateAwsKmsRsaKeyringInput { + fn default() -> CreateAwsKmsRsaKeyringInput { + CreateAwsKmsRsaKeyringInput::CreateAwsKmsRsaKeyringInput { + publicKey: Default::default(), + kmsKeyId: Default::default(), + encryptionAlgorithm: Default::default(), + kmsClient: Default::default(), + grantTokens: Default::default() + } + } + } - impl AsRef - for &CreateRawAesKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CreateAwsKmsRsaKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateRawEcdhKeyringInput { - CreateRawEcdhKeyringInput { - KeyAgreementScheme: Rc, - curveSpec: Rc - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(954,3) + #[derive(PartialEq, Clone)] + pub enum CreateCryptographicMaterialsCacheInput { + CreateCryptographicMaterialsCacheInput { + cache: Arc + } + } - impl CreateRawEcdhKeyringInput { - pub fn KeyAgreementScheme(&self) -> &Rc { - match self { - CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => KeyAgreementScheme, - } - } - pub fn curveSpec(&self) -> &Rc { - match self { - CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => curveSpec, - } - } - } + impl CreateCryptographicMaterialsCacheInput { + /// Returns a borrow of the field cache + pub fn cache(&self) -> &Arc { + match self { + CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => cache, + } + } + } - impl Debug - for CreateRawEcdhKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for CreateCryptographicMaterialsCacheInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateRawEcdhKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawEcdhKeyringInput.CreateRawEcdhKeyringInput(")?; - DafnyPrint::fmt_print(KeyAgreementScheme, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(curveSpec, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for CreateCryptographicMaterialsCacheInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateCryptographicMaterialsCacheInput.CreateCryptographicMaterialsCacheInput(")?; + DafnyPrint::fmt_print(cache, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateRawEcdhKeyringInput {} + impl Eq + for CreateCryptographicMaterialsCacheInput {} - impl Hash - for CreateRawEcdhKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => { - Hash::hash(KeyAgreementScheme, _state); - Hash::hash(curveSpec, _state) - }, - } - } - } + impl Hash + for CreateCryptographicMaterialsCacheInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput{cache, } => { + Hash::hash(cache, _state) + }, + } + } + } - impl Default - for CreateRawEcdhKeyringInput { - fn default() -> CreateRawEcdhKeyringInput { - CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput { - KeyAgreementScheme: Default::default(), - curveSpec: Default::default() - } - } - } + impl Default + for CreateCryptographicMaterialsCacheInput { + fn default() -> CreateCryptographicMaterialsCacheInput { + CreateCryptographicMaterialsCacheInput::CreateCryptographicMaterialsCacheInput { + cache: Default::default() + } + } + } - impl AsRef - for &CreateRawEcdhKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CreateCryptographicMaterialsCacheInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateRawRsaKeyringInput { - CreateRawRsaKeyringInput { - keyNamespace: Sequence, - keyName: Sequence, - paddingScheme: Rc, - publicKey: Rc>>, - privateKey: Rc>> - } - } - - impl CreateRawRsaKeyringInput { - pub fn keyNamespace(&self) -> &Sequence { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => keyNamespace, - } - } - pub fn keyName(&self) -> &Sequence { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => keyName, - } - } - pub fn paddingScheme(&self) -> &Rc { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => paddingScheme, - } - } - pub fn publicKey(&self) -> &Rc>> { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => publicKey, - } - } - pub fn privateKey(&self) -> &Rc>> { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => privateKey, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(957,3) + #[derive(PartialEq, Clone)] + pub enum CreateDefaultClientSupplierInput { + CreateDefaultClientSupplierInput {} + } - impl Debug - for CreateRawRsaKeyringInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateDefaultClientSupplierInput {} - impl DafnyPrint - for CreateRawRsaKeyringInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawRsaKeyringInput.CreateRawRsaKeyringInput(")?; - DafnyPrint::fmt_print(keyNamespace, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(paddingScheme, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(publicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(privateKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateDefaultClientSupplierInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateRawRsaKeyringInput {} + impl DafnyPrint + for CreateDefaultClientSupplierInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateDefaultClientSupplierInput.CreateDefaultClientSupplierInput")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateRawRsaKeyringInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => { - Hash::hash(keyNamespace, _state); - Hash::hash(keyName, _state); - Hash::hash(paddingScheme, _state); - Hash::hash(publicKey, _state); - Hash::hash(privateKey, _state) - }, - } - } - } + impl CreateDefaultClientSupplierInput { + /// Enumerates all possible values of CreateDefaultClientSupplierInput + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput {})].iter() + } + } - impl Default - for CreateRawRsaKeyringInput { - fn default() -> CreateRawRsaKeyringInput { - CreateRawRsaKeyringInput::CreateRawRsaKeyringInput { - keyNamespace: Default::default(), - keyName: Default::default(), - paddingScheme: Default::default(), - publicKey: Default::default(), - privateKey: Default::default() - } - } - } + impl Eq + for CreateDefaultClientSupplierInput {} - impl AsRef - for &CreateRawRsaKeyringInput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for CreateDefaultClientSupplierInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput{} => { - #[derive(PartialEq, Clone)] - pub enum CreateRequiredEncryptionContextCMMInput { - CreateRequiredEncryptionContextCMMInput { - underlyingCMM: Rc>>, - keyring: Rc>>, - requiredEncryptionContextKeys: Sequence - } - } + }, + } + } + } - impl CreateRequiredEncryptionContextCMMInput { - pub fn underlyingCMM(&self) -> &Rc>> { - match self { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => underlyingCMM, - } - } - pub fn keyring(&self) -> &Rc>> { - match self { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => keyring, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Sequence { - match self { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, - } - } - } + impl Default + for CreateDefaultClientSupplierInput { + fn default() -> CreateDefaultClientSupplierInput { + CreateDefaultClientSupplierInput::CreateDefaultClientSupplierInput {} + } + } - impl Debug - for CreateRequiredEncryptionContextCMMInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateDefaultClientSupplierInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateRequiredEncryptionContextCMMInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRequiredEncryptionContextCMMInput.CreateRequiredEncryptionContextCMMInput(")?; - DafnyPrint::fmt_print(underlyingCMM, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyring, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(960,3) + #[derive(PartialEq, Clone)] + pub enum CreateDefaultCryptographicMaterialsManagerInput { + CreateDefaultCryptographicMaterialsManagerInput { + keyring: Object + } + } - impl Eq - for CreateRequiredEncryptionContextCMMInput {} + impl CreateDefaultCryptographicMaterialsManagerInput { + /// Returns a borrow of the field keyring + pub fn keyring(&self) -> &Object { + match self { + CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => keyring, + } + } + } - impl Hash - for CreateRequiredEncryptionContextCMMInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => { - Hash::hash(underlyingCMM, _state); - Hash::hash(keyring, _state); - Hash::hash(requiredEncryptionContextKeys, _state) - }, - } - } - } + impl Debug + for CreateDefaultCryptographicMaterialsManagerInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for CreateRequiredEncryptionContextCMMInput { - fn default() -> CreateRequiredEncryptionContextCMMInput { - CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: Default::default(), - keyring: Default::default(), - requiredEncryptionContextKeys: Default::default() - } - } - } + impl DafnyPrint + for CreateDefaultCryptographicMaterialsManagerInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateDefaultCryptographicMaterialsManagerInput.CreateDefaultCryptographicMaterialsManagerInput(")?; + DafnyPrint::fmt_print(keyring, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &CreateRequiredEncryptionContextCMMInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for CreateDefaultCryptographicMaterialsManagerInput {} - pub struct ICryptographicMaterialsCacheCallHistory {} + impl Hash + for CreateDefaultCryptographicMaterialsManagerInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput{keyring, } => { + Hash::hash(keyring, _state) + }, + } + } + } - impl ICryptographicMaterialsCacheCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl Default + for CreateDefaultCryptographicMaterialsManagerInput { + fn default() -> CreateDefaultCryptographicMaterialsManagerInput { + CreateDefaultCryptographicMaterialsManagerInput::CreateDefaultCryptographicMaterialsManagerInput { + keyring: Default::default() + } + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCacheCallHistory { - UpcastObjectFn!(dyn Any); - } + impl AsRef + for CreateDefaultCryptographicMaterialsManagerInput { + fn as_ref(&self) -> &Self { + self + } + } - pub trait ICryptographicMaterialsCache: Any + UpcastObject { - fn PutCacheEntry(&self, input: &Rc) -> Rc>> { - let mut output = MaybePlacebo::>>>::new(); - let mut _out0 = MaybePlacebo::>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::r#_PutCacheEntry_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_PutCacheEntry_k(&self, input: &Rc) -> Rc>>; - fn UpdateUsageMetadata(&self, input: &Rc) -> Rc>> { - let mut output = MaybePlacebo::>>>::new(); - let mut _out0 = MaybePlacebo::>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::r#_UpdateUsageMetadata_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_UpdateUsageMetadata_k(&self, input: &Rc) -> Rc>>; - fn GetCacheEntry(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::r#_GetCacheEntry_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_GetCacheEntry_k(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteCacheEntry(&self, input: &Rc) -> Rc>> { - let mut output = MaybePlacebo::>>>::new(); - let mut _out0 = MaybePlacebo::>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::r#_DeleteCacheEntry_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_DeleteCacheEntry_k(&self, input: &Rc) -> Rc>>; - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(963,3) + #[derive(PartialEq, Clone)] + pub enum CreateMultiKeyringInput { + CreateMultiKeyringInput { + generator: Arc>>, + childKeyrings: Sequence> + } + } - pub struct ICryptographicMaterialsManagerCallHistory {} + impl CreateMultiKeyringInput { + /// Returns a borrow of the field generator + pub fn generator(&self) -> &Arc>> { + match self { + CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => generator, + } + } + /// Returns a borrow of the field childKeyrings + pub fn childKeyrings(&self) -> &Sequence> { + match self { + CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => childKeyrings, + } + } + } - impl ICryptographicMaterialsManagerCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl Debug + for CreateMultiKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManagerCallHistory { - UpcastObjectFn!(dyn Any); - } + impl DafnyPrint + for CreateMultiKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateMultiKeyringInput.CreateMultiKeyringInput(")?; + DafnyPrint::fmt_print(generator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(childKeyrings, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub trait ICryptographicMaterialsManager: Any + UpcastObject { - fn GetEncryptionMaterials(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager::r#_GetEncryptionMaterials_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_GetEncryptionMaterials_k(&self, input: &Rc) -> Rc, Rc>>; - fn DecryptMaterials(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager::r#_DecryptMaterials_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_DecryptMaterials_k(&self, input: &Rc) -> Rc, Rc>>; - } + impl Eq + for CreateMultiKeyringInput {} + + impl Hash + for CreateMultiKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateMultiKeyringInput::CreateMultiKeyringInput{generator, childKeyrings, } => { + Hash::hash(generator, _state); + Hash::hash(childKeyrings, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DBEAlgorithmSuiteId { - ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}, - ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {} - } + impl Default + for CreateMultiKeyringInput { + fn default() -> CreateMultiKeyringInput { + CreateMultiKeyringInput::CreateMultiKeyringInput { + generator: Default::default(), + childKeyrings: Default::default() + } + } + } - impl DBEAlgorithmSuiteId {} + impl AsRef + for CreateMultiKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for DBEAlgorithmSuiteId { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(967,3) + #[derive(PartialEq, Clone)] + pub enum CreateRawAesKeyringInput { + CreateRawAesKeyringInput { + keyNamespace: Sequence, + keyName: Sequence, + wrappingKey: Sequence, + wrappingAlg: Arc + } + } - impl DafnyPrint - for DBEAlgorithmSuiteId { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBEAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__SYMSIG__HMAC__SHA384")?; - Ok(()) - }, - DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBEAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__ECDSA__P384__SYMSIG__HMAC__SHA384")?; - Ok(()) - }, - } - } - } + impl CreateRawAesKeyringInput { + /// Returns a borrow of the field keyNamespace + pub fn keyNamespace(&self) -> &Sequence { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => keyNamespace, + } + } + /// Returns a borrow of the field keyName + pub fn keyName(&self) -> &Sequence { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => keyName, + } + } + /// Returns a borrow of the field wrappingKey + pub fn wrappingKey(&self) -> &Sequence { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => wrappingKey, + } + } + /// Returns a borrow of the field wrappingAlg + pub fn wrappingAlg(&self) -> &Arc { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => wrappingAlg, + } + } + } - impl DBEAlgorithmSuiteId { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}), Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {})].iter() - } - } + impl Debug + for CreateRawAesKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DBEAlgorithmSuiteId {} + impl DafnyPrint + for CreateRawAesKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawAesKeyringInput.CreateRawAesKeyringInput(")?; + DafnyPrint::fmt_print(keyNamespace, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(wrappingKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(wrappingAlg, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DBEAlgorithmSuiteId { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{} => { + impl Eq + for CreateRawAesKeyringInput {} + + impl Hash + for CreateRawAesKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateRawAesKeyringInput::CreateRawAesKeyringInput{keyNamespace, keyName, wrappingKey, wrappingAlg, } => { + Hash::hash(keyNamespace, _state); + Hash::hash(keyName, _state); + Hash::hash(wrappingKey, _state); + Hash::hash(wrappingAlg, _state) + }, + } + } + } - }, - DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384{} => { + impl Default + for CreateRawAesKeyringInput { + fn default() -> CreateRawAesKeyringInput { + CreateRawAesKeyringInput::CreateRawAesKeyringInput { + keyNamespace: Default::default(), + keyName: Default::default(), + wrappingKey: Default::default(), + wrappingAlg: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for CreateRawAesKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DBEAlgorithmSuiteId { - fn default() -> DBEAlgorithmSuiteId { - DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(973,3) + #[derive(PartialEq, Clone)] + pub enum CreateRawEcdhKeyringInput { + CreateRawEcdhKeyringInput { + KeyAgreementScheme: Arc, + curveSpec: Arc + } + } - impl AsRef - for &DBEAlgorithmSuiteId { - fn as_ref(&self) -> Self { - self - } - } + impl CreateRawEcdhKeyringInput { + /// Returns a borrow of the field KeyAgreementScheme + pub fn KeyAgreementScheme(&self) -> &Arc { + match self { + CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => KeyAgreementScheme, + } + } + /// Returns a borrow of the field curveSpec + pub fn curveSpec(&self) -> &Arc { + match self { + CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => curveSpec, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DBECommitmentPolicy { - REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} - } + impl Debug + for CreateRawEcdhKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DBECommitmentPolicy {} + impl DafnyPrint + for CreateRawEcdhKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawEcdhKeyringInput.CreateRawEcdhKeyringInput(")?; + DafnyPrint::fmt_print(KeyAgreementScheme, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(curveSpec, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DBECommitmentPolicy { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateRawEcdhKeyringInput {} + + impl Hash + for CreateRawEcdhKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput{KeyAgreementScheme, curveSpec, } => { + Hash::hash(KeyAgreementScheme, _state); + Hash::hash(curveSpec, _state) + }, + } + } + } - impl DafnyPrint - for DBECommitmentPolicy { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBECommitmentPolicy.REQUIRE__ENCRYPT__REQUIRE__DECRYPT")?; - Ok(()) - }, - } - } - } + impl Default + for CreateRawEcdhKeyringInput { + fn default() -> CreateRawEcdhKeyringInput { + CreateRawEcdhKeyringInput::CreateRawEcdhKeyringInput { + KeyAgreementScheme: Default::default(), + curveSpec: Default::default() + } + } + } - impl DBECommitmentPolicy { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {})].iter() - } - } + impl AsRef + for CreateRawEcdhKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DBECommitmentPolicy {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(977,3) + #[derive(PartialEq, Clone)] + pub enum CreateRawRsaKeyringInput { + CreateRawRsaKeyringInput { + keyNamespace: Sequence, + keyName: Sequence, + paddingScheme: Arc, + publicKey: Arc>>, + privateKey: Arc>> + } + } - impl Hash - for DBECommitmentPolicy { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { + impl CreateRawRsaKeyringInput { + /// Returns a borrow of the field keyNamespace + pub fn keyNamespace(&self) -> &Sequence { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => keyNamespace, + } + } + /// Returns a borrow of the field keyName + pub fn keyName(&self) -> &Sequence { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => keyName, + } + } + /// Returns a borrow of the field paddingScheme + pub fn paddingScheme(&self) -> &Arc { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => paddingScheme, + } + } + /// Returns a borrow of the field publicKey + pub fn publicKey(&self) -> &Arc>> { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => publicKey, + } + } + /// Returns a borrow of the field privateKey + pub fn privateKey(&self) -> &Arc>> { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => privateKey, + } + } + } - }, - } - } - } + impl Debug + for CreateRawRsaKeyringInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for DBECommitmentPolicy { - fn default() -> DBECommitmentPolicy { - DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} - } - } + impl DafnyPrint + for CreateRawRsaKeyringInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRawRsaKeyringInput.CreateRawRsaKeyringInput(")?; + DafnyPrint::fmt_print(keyNamespace, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(paddingScheme, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(publicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(privateKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &DBECommitmentPolicy { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for CreateRawRsaKeyringInput {} + + impl Hash + for CreateRawRsaKeyringInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput{keyNamespace, keyName, paddingScheme, publicKey, privateKey, } => { + Hash::hash(keyNamespace, _state); + Hash::hash(keyName, _state); + Hash::hash(paddingScheme, _state); + Hash::hash(publicKey, _state); + Hash::hash(privateKey, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DecryptionMaterials { - DecryptionMaterials { - algorithmSuite: Rc, - encryptionContext: Map, - requiredEncryptionContextKeys: Sequence, - plaintextDataKey: Rc>>, - verificationKey: Rc>>, - symmetricSigningKey: Rc>> - } - } - - impl DecryptionMaterials { - pub fn algorithmSuite(&self) -> &Rc { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => algorithmSuite, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => encryptionContext, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Sequence { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => requiredEncryptionContextKeys, - } - } - pub fn plaintextDataKey(&self) -> &Rc>> { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => plaintextDataKey, - } - } - pub fn verificationKey(&self) -> &Rc>> { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => verificationKey, - } - } - pub fn symmetricSigningKey(&self) -> &Rc>> { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => symmetricSigningKey, - } - } - } + impl Default + for CreateRawRsaKeyringInput { + fn default() -> CreateRawRsaKeyringInput { + CreateRawRsaKeyringInput::CreateRawRsaKeyringInput { + keyNamespace: Default::default(), + keyName: Default::default(), + paddingScheme: Default::default(), + publicKey: Default::default(), + privateKey: Default::default() + } + } + } - impl Debug - for DecryptionMaterials { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateRawRsaKeyringInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DecryptionMaterials { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptionMaterials.DecryptionMaterials(")?; - DafnyPrint::fmt_print(algorithmSuite, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextDataKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(verificationKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(symmetricSigningKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(984,3) + #[derive(PartialEq, Clone)] + pub enum CreateRequiredEncryptionContextCMMInput { + CreateRequiredEncryptionContextCMMInput { + underlyingCMM: Arc>>, + keyring: Arc>>, + requiredEncryptionContextKeys: Sequence + } + } - impl Eq - for DecryptionMaterials {} + impl CreateRequiredEncryptionContextCMMInput { + /// Returns a borrow of the field underlyingCMM + pub fn underlyingCMM(&self) -> &Arc>> { + match self { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => underlyingCMM, + } + } + /// Returns a borrow of the field keyring + pub fn keyring(&self) -> &Arc>> { + match self { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => keyring, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Sequence { + match self { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, + } + } + } - impl Hash - for DecryptionMaterials { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => { - Hash::hash(algorithmSuite, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(requiredEncryptionContextKeys, _state); - Hash::hash(plaintextDataKey, _state); - Hash::hash(verificationKey, _state); - Hash::hash(symmetricSigningKey, _state) - }, - } - } - } + impl Debug + for CreateRequiredEncryptionContextCMMInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for DecryptionMaterials { - fn default() -> DecryptionMaterials { - DecryptionMaterials::DecryptionMaterials { - algorithmSuite: Default::default(), - encryptionContext: Default::default(), - requiredEncryptionContextKeys: Default::default(), - plaintextDataKey: Default::default(), - verificationKey: Default::default(), - symmetricSigningKey: Default::default() - } - } - } - - impl AsRef - for &DecryptionMaterials { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for CreateRequiredEncryptionContextCMMInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.CreateRequiredEncryptionContextCMMInput.CreateRequiredEncryptionContextCMMInput(")?; + DafnyPrint::fmt_print(underlyingCMM, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyring, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DecryptMaterialsInput { - DecryptMaterialsInput { - algorithmSuiteId: Rc, - commitmentPolicy: Rc, - encryptedDataKeys: Sequence>, - encryptionContext: Map, - reproducedEncryptionContext: Rc>> - } - } - - impl DecryptMaterialsInput { - pub fn algorithmSuiteId(&self) -> &Rc { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => algorithmSuiteId, - } - } - pub fn commitmentPolicy(&self) -> &Rc { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => commitmentPolicy, - } - } - pub fn encryptedDataKeys(&self) -> &Sequence> { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => encryptedDataKeys, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => encryptionContext, - } - } - pub fn reproducedEncryptionContext(&self) -> &Rc>> { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => reproducedEncryptionContext, - } - } - } + impl Eq + for CreateRequiredEncryptionContextCMMInput {} + + impl Hash + for CreateRequiredEncryptionContextCMMInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput{underlyingCMM, keyring, requiredEncryptionContextKeys, } => { + Hash::hash(underlyingCMM, _state); + Hash::hash(keyring, _state); + Hash::hash(requiredEncryptionContextKeys, _state) + }, + } + } + } - impl Debug - for DecryptMaterialsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CreateRequiredEncryptionContextCMMInput { + fn default() -> CreateRequiredEncryptionContextCMMInput { + CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { + underlyingCMM: Default::default(), + keyring: Default::default(), + requiredEncryptionContextKeys: Default::default() + } + } + } - impl DafnyPrint - for DecryptMaterialsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptMaterialsInput.DecryptMaterialsInput(")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(reproducedEncryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CreateRequiredEncryptionContextCMMInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecryptMaterialsInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(989,3) + pub struct ICryptographicMaterialsCacheCallHistory {} - impl Hash - for DecryptMaterialsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => { - Hash::hash(algorithmSuiteId, _state); - Hash::hash(commitmentPolicy, _state); - Hash::hash(encryptedDataKeys, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(reproducedEncryptionContext, _state) - }, - } - } - } + impl ICryptographicMaterialsCacheCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Default - for DecryptMaterialsInput { - fn default() -> DecryptMaterialsInput { - DecryptMaterialsInput::DecryptMaterialsInput { - algorithmSuiteId: Default::default(), - commitmentPolicy: Default::default(), - encryptedDataKeys: Default::default(), - encryptionContext: Default::default(), - reproducedEncryptionContext: Default::default() - } - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCacheCallHistory { + UpcastObjectFn!(DynAny); + } - impl AsRef - for &DecryptMaterialsInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1001,3) + pub trait ICryptographicMaterialsCache: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1041,5) + fn PutCacheEntry(&self, input: &Arc) -> Arc>> { + let mut output: Arc>>; + let mut _out0: Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::_PutCacheEntry_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1064,5) + fn _PutCacheEntry_k(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1078,5) + fn UpdateUsageMetadata(&self, input: &Arc) -> Arc>> { + let mut output: Arc>>; + let mut _out0: Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::_UpdateUsageMetadata_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1101,5) + fn _UpdateUsageMetadata_k(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1115,5) + fn GetCacheEntry(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::_GetCacheEntry_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1138,5) + fn _GetCacheEntry_k(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1152,5) + fn DeleteCacheEntry(&self, input: &Arc) -> Arc>> { + let mut output: Arc>>; + let mut _out0: Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsCache::_DeleteCacheEntry_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1175,5) + fn _DeleteCacheEntry_k(&self, input: &Arc) -> Arc>>; + } - #[derive(PartialEq, Clone)] - pub enum DecryptMaterialsOutput { - DecryptMaterialsOutput { - decryptionMaterials: Rc - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1188,3) + pub struct ICryptographicMaterialsManagerCallHistory {} - impl DecryptMaterialsOutput { - pub fn decryptionMaterials(&self) -> &Rc { - match self { - DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => decryptionMaterials, - } - } - } + impl ICryptographicMaterialsManagerCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Debug - for DecryptMaterialsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManagerCallHistory { + UpcastObjectFn!(DynAny); + } - impl DafnyPrint - for DecryptMaterialsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptMaterialsOutput.DecryptMaterialsOutput(")?; - DafnyPrint::fmt_print(decryptionMaterials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1196,3) + pub trait ICryptographicMaterialsManager: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1225,5) + fn GetEncryptionMaterials(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager::_GetEncryptionMaterials_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1242,5) + fn _GetEncryptionMaterials_k(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1256,5) + fn DecryptMaterials(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager::_DecryptMaterials_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1273,5) + fn _DecryptMaterials_k(&self, input: &Arc) -> Arc, Arc>>; + } - impl Eq - for DecryptMaterialsOutput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1286,3) + #[derive(PartialEq, Clone)] + pub enum DBEAlgorithmSuiteId { + ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}, + ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {} + } - impl Hash - for DecryptMaterialsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => { - Hash::hash(decryptionMaterials, _state) - }, - } - } - } + impl DBEAlgorithmSuiteId {} - impl Default - for DecryptMaterialsOutput { - fn default() -> DecryptMaterialsOutput { - DecryptMaterialsOutput::DecryptMaterialsOutput { - decryptionMaterials: Default::default() - } - } - } + impl Debug + for DBEAlgorithmSuiteId { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DecryptMaterialsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DBEAlgorithmSuiteId { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBEAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__SYMSIG__HMAC__SHA384")?; + Ok(()) + }, + DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBEAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__ECDSA__P384__SYMSIG__HMAC__SHA384")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DefaultCache { - DefaultCache { - entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber - } - } + impl DBEAlgorithmSuiteId { + /// Enumerates all possible values of DBEAlgorithmSuiteId + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {}), Arc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {})].iter() + } + } - impl DefaultCache { - pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - DefaultCache::DefaultCache{entryCapacity, } => entryCapacity, - } - } - } + impl Eq + for DBEAlgorithmSuiteId {} - impl Debug - for DefaultCache { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DBEAlgorithmSuiteId { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384{} => { - impl DafnyPrint - for DefaultCache { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DefaultCache::DefaultCache{entryCapacity, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DefaultCache.DefaultCache(")?; - DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384{} => { - impl Eq - for DefaultCache {} + }, + } + } + } - impl Hash - for DefaultCache { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DefaultCache::DefaultCache{entryCapacity, } => { - Hash::hash(entryCapacity, _state) - }, - } - } - } + impl Default + for DBEAlgorithmSuiteId { + fn default() -> DBEAlgorithmSuiteId { + DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384 {} + } + } - impl Default - for DefaultCache { - fn default() -> DefaultCache { - DefaultCache::DefaultCache { - entryCapacity: Default::default() - } - } - } + impl AsRef + for DBEAlgorithmSuiteId { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DefaultCache { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1289,3) + #[derive(PartialEq, Clone)] + pub enum DBECommitmentPolicy { + REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} + } - #[derive(PartialEq, Clone)] - pub enum DeleteCacheEntryInput { - DeleteCacheEntryInput { - identifier: Sequence - } - } + impl DBECommitmentPolicy {} - impl DeleteCacheEntryInput { - pub fn identifier(&self) -> &Sequence { - match self { - DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => identifier, - } - } - } + impl Debug + for DBECommitmentPolicy { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteCacheEntryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DBECommitmentPolicy { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DBECommitmentPolicy.REQUIRE__ENCRYPT__REQUIRE__DECRYPT")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteCacheEntryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DeleteCacheEntryInput.DeleteCacheEntryInput(")?; - DafnyPrint::fmt_print(identifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DBECommitmentPolicy { + /// Enumerates all possible values of DBECommitmentPolicy + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {})].iter() + } + } - impl Eq - for DeleteCacheEntryInput {} + impl Eq + for DBECommitmentPolicy {} - impl Hash - for DeleteCacheEntryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => { - Hash::hash(identifier, _state) - }, - } - } - } + impl Hash + for DBECommitmentPolicy { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { - impl Default - for DeleteCacheEntryInput { - fn default() -> DeleteCacheEntryInput { - DeleteCacheEntryInput::DeleteCacheEntryInput { - identifier: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &DeleteCacheEntryInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DBECommitmentPolicy { + fn default() -> DBECommitmentPolicy { + DBECommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} + } + } - #[derive(PartialEq, Clone)] - pub enum DerivationAlgorithm { - HKDF { - HKDF: Rc - }, - IDENTITY { - IDENTITY: Rc - }, - None { - _None: Rc - } - } - - impl DerivationAlgorithm { - pub fn HKDF(&self) -> &Rc { - match self { - DerivationAlgorithm::HKDF{HKDF, } => HKDF, - DerivationAlgorithm::IDENTITY{IDENTITY, } => panic!("field does not exist on this variant"), - DerivationAlgorithm::None{_None, } => panic!("field does not exist on this variant"), - } - } - pub fn IDENTITY(&self) -> &Rc { - match self { - DerivationAlgorithm::HKDF{HKDF, } => panic!("field does not exist on this variant"), - DerivationAlgorithm::IDENTITY{IDENTITY, } => IDENTITY, - DerivationAlgorithm::None{_None, } => panic!("field does not exist on this variant"), - } - } - pub fn _None(&self) -> &Rc { - match self { - DerivationAlgorithm::HKDF{HKDF, } => panic!("field does not exist on this variant"), - DerivationAlgorithm::IDENTITY{IDENTITY, } => panic!("field does not exist on this variant"), - DerivationAlgorithm::None{_None, } => _None, - } - } - } + impl AsRef + for DBECommitmentPolicy { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for DerivationAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1292,3) + #[derive(PartialEq, Clone)] + pub enum DecryptionMaterials { + DecryptionMaterials { + algorithmSuite: Arc, + encryptionContext: Map, + requiredEncryptionContextKeys: Sequence, + plaintextDataKey: Arc>>, + verificationKey: Arc>>, + symmetricSigningKey: Arc>> + } + } - impl DafnyPrint - for DerivationAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DerivationAlgorithm::HKDF{HKDF, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.HKDF(")?; - DafnyPrint::fmt_print(HKDF, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - DerivationAlgorithm::IDENTITY{IDENTITY, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.IDENTITY(")?; - DafnyPrint::fmt_print(IDENTITY, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - DerivationAlgorithm::None{_None, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.None(")?; - DafnyPrint::fmt_print(_None, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DecryptionMaterials { + /// Returns a borrow of the field algorithmSuite + pub fn algorithmSuite(&self) -> &Arc { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => algorithmSuite, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => encryptionContext, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Sequence { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => requiredEncryptionContextKeys, + } + } + /// Returns a borrow of the field plaintextDataKey + pub fn plaintextDataKey(&self) -> &Arc>> { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => plaintextDataKey, + } + } + /// Returns a borrow of the field verificationKey + pub fn verificationKey(&self) -> &Arc>> { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => verificationKey, + } + } + /// Returns a borrow of the field symmetricSigningKey + pub fn symmetricSigningKey(&self) -> &Arc>> { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => symmetricSigningKey, + } + } + } - impl Eq - for DerivationAlgorithm {} + impl Debug + for DecryptionMaterials { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for DerivationAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DerivationAlgorithm::HKDF{HKDF, } => { - Hash::hash(HKDF, _state) - }, - DerivationAlgorithm::IDENTITY{IDENTITY, } => { - Hash::hash(IDENTITY, _state) - }, - DerivationAlgorithm::None{_None, } => { - Hash::hash(_None, _state) - }, - } - } - } + impl DafnyPrint + for DecryptionMaterials { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptionMaterials.DecryptionMaterials(")?; + DafnyPrint::fmt_print(algorithmSuite, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextDataKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(verificationKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(symmetricSigningKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for DerivationAlgorithm { - fn default() -> DerivationAlgorithm { - DerivationAlgorithm::HKDF { - HKDF: Default::default() - } - } - } + impl Eq + for DecryptionMaterials {} + + impl Hash + for DecryptionMaterials { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptionMaterials::DecryptionMaterials{algorithmSuite, encryptionContext, requiredEncryptionContextKeys, plaintextDataKey, verificationKey, symmetricSigningKey, } => { + Hash::hash(algorithmSuite, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(requiredEncryptionContextKeys, _state); + Hash::hash(plaintextDataKey, _state); + Hash::hash(verificationKey, _state); + Hash::hash(symmetricSigningKey, _state) + }, + } + } + } - impl AsRef - for &DerivationAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DecryptionMaterials { + fn default() -> DecryptionMaterials { + DecryptionMaterials::DecryptionMaterials { + algorithmSuite: Default::default(), + encryptionContext: Default::default(), + requiredEncryptionContextKeys: Default::default(), + plaintextDataKey: Default::default(), + verificationKey: Default::default(), + symmetricSigningKey: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING {} - } + impl AsRef + for DecryptionMaterials { + fn as_ref(&self) -> &Self { + self + } + } - impl DIRECT_KEY_WRAPPING {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1300,3) + #[derive(PartialEq, Clone)] + pub enum DecryptMaterialsInput { + DecryptMaterialsInput { + algorithmSuiteId: Arc, + commitmentPolicy: Arc, + encryptedDataKeys: Sequence>, + encryptionContext: Map, + reproducedEncryptionContext: Arc>> + } + } - impl Debug - for DIRECT_KEY_WRAPPING { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DecryptMaterialsInput { + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field commitmentPolicy + pub fn commitmentPolicy(&self) -> &Arc { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => commitmentPolicy, + } + } + /// Returns a borrow of the field encryptedDataKeys + pub fn encryptedDataKeys(&self) -> &Sequence> { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => encryptedDataKeys, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => encryptionContext, + } + } + /// Returns a borrow of the field reproducedEncryptionContext + pub fn reproducedEncryptionContext(&self) -> &Arc>> { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => reproducedEncryptionContext, + } + } + } - impl DafnyPrint - for DIRECT_KEY_WRAPPING { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DIRECT__KEY__WRAPPING.DIRECT__KEY__WRAPPING")?; - Ok(()) - }, - } - } - } + impl Debug + for DecryptMaterialsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DIRECT_KEY_WRAPPING { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {})].iter() - } - } + impl DafnyPrint + for DecryptMaterialsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptMaterialsInput.DecryptMaterialsInput(")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(reproducedEncryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DIRECT_KEY_WRAPPING {} + impl Eq + for DecryptMaterialsInput {} + + impl Hash + for DecryptMaterialsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptMaterialsInput::DecryptMaterialsInput{algorithmSuiteId, commitmentPolicy, encryptedDataKeys, encryptionContext, reproducedEncryptionContext, } => { + Hash::hash(algorithmSuiteId, _state); + Hash::hash(commitmentPolicy, _state); + Hash::hash(encryptedDataKeys, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(reproducedEncryptionContext, _state) + }, + } + } + } - impl Hash - for DIRECT_KEY_WRAPPING { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING{} => { + impl Default + for DecryptMaterialsInput { + fn default() -> DecryptMaterialsInput { + DecryptMaterialsInput::DecryptMaterialsInput { + algorithmSuiteId: Default::default(), + commitmentPolicy: Default::default(), + encryptedDataKeys: Default::default(), + encryptionContext: Default::default(), + reproducedEncryptionContext: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for DecryptMaterialsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DIRECT_KEY_WRAPPING { - fn default() -> DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1307,3) + #[derive(PartialEq, Clone)] + pub enum DecryptMaterialsOutput { + DecryptMaterialsOutput { + decryptionMaterials: Arc + } + } - impl AsRef - for &DIRECT_KEY_WRAPPING { - fn as_ref(&self) -> Self { - self - } - } + impl DecryptMaterialsOutput { + /// Returns a borrow of the field decryptionMaterials + pub fn decryptionMaterials(&self) -> &Arc { + match self { + DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => decryptionMaterials, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DiscoveryFilter { - DiscoveryFilter { - accountIds: Sequence>, - partition: Sequence - } - } + impl Debug + for DecryptMaterialsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DiscoveryFilter { - pub fn accountIds(&self) -> &Sequence> { - match self { - DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => accountIds, - } - } - pub fn partition(&self) -> &Sequence { - match self { - DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => partition, - } - } - } + impl DafnyPrint + for DecryptMaterialsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DecryptMaterialsOutput.DecryptMaterialsOutput(")?; + DafnyPrint::fmt_print(decryptionMaterials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DiscoveryFilter { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DecryptMaterialsOutput {} - impl DafnyPrint - for DiscoveryFilter { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DiscoveryFilter.DiscoveryFilter(")?; - DafnyPrint::fmt_print(accountIds, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partition, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DecryptMaterialsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptMaterialsOutput::DecryptMaterialsOutput{decryptionMaterials, } => { + Hash::hash(decryptionMaterials, _state) + }, + } + } + } - impl Eq - for DiscoveryFilter {} + impl Default + for DecryptMaterialsOutput { + fn default() -> DecryptMaterialsOutput { + DecryptMaterialsOutput::DecryptMaterialsOutput { + decryptionMaterials: Default::default() + } + } + } - impl Hash - for DiscoveryFilter { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => { - Hash::hash(accountIds, _state); - Hash::hash(partition, _state) - }, - } - } - } + impl AsRef + for DecryptMaterialsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DiscoveryFilter { - fn default() -> DiscoveryFilter { - DiscoveryFilter::DiscoveryFilter { - accountIds: Default::default(), - partition: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1310,3) + #[derive(PartialEq, Clone)] + pub enum DefaultCache { + DefaultCache { + entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber + } + } - impl AsRef - for &DiscoveryFilter { - fn as_ref(&self) -> Self { - self - } - } + impl DefaultCache { + /// Returns a borrow of the field entryCapacity + pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + DefaultCache::DefaultCache{entryCapacity, } => entryCapacity, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ECDSA { - ECDSA { - curve: Rc - } - } + impl Debug + for DefaultCache { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ECDSA { - pub fn curve(&self) -> &Rc { - match self { - ECDSA::ECDSA{curve, } => curve, - } - } - } + impl DafnyPrint + for DefaultCache { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DefaultCache::DefaultCache{entryCapacity, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DefaultCache.DefaultCache(")?; + DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ECDSA { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DefaultCache {} - impl DafnyPrint - for ECDSA { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ECDSA::ECDSA{curve, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ECDSA.ECDSA(")?; - DafnyPrint::fmt_print(curve, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DefaultCache { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DefaultCache::DefaultCache{entryCapacity, } => { + Hash::hash(entryCapacity, _state) + }, + } + } + } - impl Eq - for ECDSA {} + impl Default + for DefaultCache { + fn default() -> DefaultCache { + DefaultCache::DefaultCache { + entryCapacity: Default::default() + } + } + } - impl Hash - for ECDSA { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ECDSA::ECDSA{curve, } => { - Hash::hash(curve, _state) - }, - } - } - } + impl AsRef + for DefaultCache { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ECDSA { - fn default() -> ECDSA { - ECDSA::ECDSA { - curve: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1313,3) + #[derive(PartialEq, Clone)] + pub enum DeleteCacheEntryInput { + DeleteCacheEntryInput { + identifier: Sequence + } + } - impl AsRef - for &ECDSA { - fn as_ref(&self) -> Self { - self - } - } + impl DeleteCacheEntryInput { + /// Returns a borrow of the field identifier + pub fn identifier(&self) -> &Sequence { + match self { + DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => identifier, + } + } + } - #[derive(PartialEq, Clone)] - pub enum EdkWrappingAlgorithm { - DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Rc - }, - IntermediateKeyWrapping { - IntermediateKeyWrapping: Rc - } - } + impl Debug + for DeleteCacheEntryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl EdkWrappingAlgorithm { - pub fn DIRECT_KEY_WRAPPING(&self) -> &Rc { - match self { - EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => DIRECT_KEY_WRAPPING, - EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => panic!("field does not exist on this variant"), - } - } - pub fn IntermediateKeyWrapping(&self) -> &Rc { - match self { - EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => panic!("field does not exist on this variant"), - EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => IntermediateKeyWrapping, - } - } - } + impl DafnyPrint + for DeleteCacheEntryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DeleteCacheEntryInput.DeleteCacheEntryInput(")?; + DafnyPrint::fmt_print(identifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for EdkWrappingAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DeleteCacheEntryInput {} - impl DafnyPrint - for EdkWrappingAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EdkWrappingAlgorithm.DIRECT__KEY__WRAPPING(")?; - DafnyPrint::fmt_print(DIRECT_KEY_WRAPPING, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EdkWrappingAlgorithm.IntermediateKeyWrapping(")?; - DafnyPrint::fmt_print(IntermediateKeyWrapping, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DeleteCacheEntryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteCacheEntryInput::DeleteCacheEntryInput{identifier, } => { + Hash::hash(identifier, _state) + }, + } + } + } - impl Eq - for EdkWrappingAlgorithm {} + impl Default + for DeleteCacheEntryInput { + fn default() -> DeleteCacheEntryInput { + DeleteCacheEntryInput::DeleteCacheEntryInput { + identifier: Default::default() + } + } + } - impl Hash - for EdkWrappingAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => { - Hash::hash(DIRECT_KEY_WRAPPING, _state) - }, - EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => { - Hash::hash(IntermediateKeyWrapping, _state) - }, - } - } - } + impl AsRef + for DeleteCacheEntryInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for EdkWrappingAlgorithm { - fn default() -> EdkWrappingAlgorithm { - EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { - DIRECT_KEY_WRAPPING: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1316,3) + #[derive(PartialEq, Clone)] + pub enum DerivationAlgorithm { + HKDF { + HKDF: Arc + }, + IDENTITY { + IDENTITY: Arc + }, + None { + _None: Arc + } + } - impl AsRef - for &EdkWrappingAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl DerivationAlgorithm { + /// Gets the field HKDF for all enum members which have it + pub fn HKDF(&self) -> &Arc { + match self { + DerivationAlgorithm::HKDF{HKDF, } => HKDF, + DerivationAlgorithm::IDENTITY{IDENTITY, } => panic!("field does not exist on this variant"), + DerivationAlgorithm::None{_None, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field IDENTITY for all enum members which have it + pub fn IDENTITY(&self) -> &Arc { + match self { + DerivationAlgorithm::HKDF{HKDF, } => panic!("field does not exist on this variant"), + DerivationAlgorithm::IDENTITY{IDENTITY, } => IDENTITY, + DerivationAlgorithm::None{_None, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field _None for all enum members which have it + pub fn _None(&self) -> &Arc { + match self { + DerivationAlgorithm::HKDF{HKDF, } => panic!("field does not exist on this variant"), + DerivationAlgorithm::IDENTITY{IDENTITY, } => panic!("field does not exist on this variant"), + DerivationAlgorithm::None{_None, } => _None, + } + } + } - #[derive(PartialEq, Clone)] - pub enum Encrypt { - AES_GCM { - AES_GCM: Rc - } - } + impl Debug + for DerivationAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Encrypt { - pub fn AES_GCM(&self) -> &Rc { - match self { - Encrypt::AES_GCM{AES_GCM, } => AES_GCM, - } - } - } + impl DafnyPrint + for DerivationAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DerivationAlgorithm::HKDF{HKDF, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.HKDF(")?; + DafnyPrint::fmt_print(HKDF, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + DerivationAlgorithm::IDENTITY{IDENTITY, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.IDENTITY(")?; + DafnyPrint::fmt_print(IDENTITY, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + DerivationAlgorithm::None{_None, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DerivationAlgorithm.None(")?; + DafnyPrint::fmt_print(_None, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for Encrypt { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DerivationAlgorithm {} + + impl Hash + for DerivationAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DerivationAlgorithm::HKDF{HKDF, } => { + Hash::hash(HKDF, _state) + }, + DerivationAlgorithm::IDENTITY{IDENTITY, } => { + Hash::hash(IDENTITY, _state) + }, + DerivationAlgorithm::None{_None, } => { + Hash::hash(_None, _state) + }, + } + } + } - impl DafnyPrint - for Encrypt { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Encrypt::AES_GCM{AES_GCM, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Encrypt.AES__GCM(")?; - DafnyPrint::fmt_print(AES_GCM, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DerivationAlgorithm { + fn default() -> DerivationAlgorithm { + DerivationAlgorithm::HKDF { + HKDF: Default::default() + } + } + } - impl Eq - for Encrypt {} + impl AsRef + for DerivationAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for Encrypt { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Encrypt::AES_GCM{AES_GCM, } => { - Hash::hash(AES_GCM, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1320,3) + #[derive(PartialEq, Clone)] + pub enum DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING {} + } - impl Default - for Encrypt { - fn default() -> Encrypt { - Encrypt::AES_GCM { - AES_GCM: Default::default() - } - } - } + impl DIRECT_KEY_WRAPPING {} - impl AsRef - for &Encrypt { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DIRECT_KEY_WRAPPING { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum EncryptedDataKey { - EncryptedDataKey { - keyProviderId: ValidUTF8Bytes, - keyProviderInfo: Sequence, - ciphertext: Sequence - } - } + impl DafnyPrint + for DIRECT_KEY_WRAPPING { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DIRECT__KEY__WRAPPING.DIRECT__KEY__WRAPPING")?; + Ok(()) + }, + } + } + } - impl EncryptedDataKey { - pub fn keyProviderId(&self) -> &ValidUTF8Bytes { - match self { - EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => keyProviderId, - } - } - pub fn keyProviderInfo(&self) -> &Sequence { - match self { - EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => keyProviderInfo, - } - } - pub fn ciphertext(&self) -> &Sequence { - match self { - EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => ciphertext, - } - } - } + impl DIRECT_KEY_WRAPPING { + /// Enumerates all possible values of DIRECT_KEY_WRAPPING + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {})].iter() + } + } - impl Debug - for EncryptedDataKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DIRECT_KEY_WRAPPING {} - impl DafnyPrint - for EncryptedDataKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EncryptedDataKey.EncryptedDataKey(")?; - DafnyPrint::fmt_print(keyProviderId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(keyProviderInfo, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ciphertext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DIRECT_KEY_WRAPPING { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING{} => { - impl Eq - for EncryptedDataKey {} + }, + } + } + } - impl Hash - for EncryptedDataKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => { - Hash::hash(keyProviderId, _state); - Hash::hash(keyProviderInfo, _state); - Hash::hash(ciphertext, _state) - }, - } - } - } + impl Default + for DIRECT_KEY_WRAPPING { + fn default() -> DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING::DIRECT_KEY_WRAPPING {} + } + } - impl Default - for EncryptedDataKey { - fn default() -> EncryptedDataKey { - EncryptedDataKey::EncryptedDataKey { - keyProviderId: Default::default(), - keyProviderInfo: Default::default(), - ciphertext: Default::default() - } - } - } + impl AsRef + for DIRECT_KEY_WRAPPING { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &EncryptedDataKey { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1323,3) + #[derive(PartialEq, Clone)] + pub enum DiscoveryFilter { + DiscoveryFilter { + accountIds: Sequence>, + partition: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum EncryptionMaterials { - EncryptionMaterials { - algorithmSuite: Rc, - encryptionContext: Map, - encryptedDataKeys: Sequence>, - requiredEncryptionContextKeys: Sequence, - plaintextDataKey: Rc>>, - signingKey: Rc>>, - symmetricSigningKeys: Rc>>> - } - } - - impl EncryptionMaterials { - pub fn algorithmSuite(&self) -> &Rc { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => algorithmSuite, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => encryptionContext, - } - } - pub fn encryptedDataKeys(&self) -> &Sequence> { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => encryptedDataKeys, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Sequence { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => requiredEncryptionContextKeys, - } - } - pub fn plaintextDataKey(&self) -> &Rc>> { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => plaintextDataKey, - } - } - pub fn signingKey(&self) -> &Rc>> { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => signingKey, - } - } - pub fn symmetricSigningKeys(&self) -> &Rc>>> { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => symmetricSigningKeys, - } - } - } + impl DiscoveryFilter { + /// Returns a borrow of the field accountIds + pub fn accountIds(&self) -> &Sequence> { + match self { + DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => accountIds, + } + } + /// Returns a borrow of the field partition + pub fn partition(&self) -> &Sequence { + match self { + DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => partition, + } + } + } - impl Debug - for EncryptionMaterials { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DiscoveryFilter { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for EncryptionMaterials { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EncryptionMaterials.EncryptionMaterials(")?; - DafnyPrint::fmt_print(algorithmSuite, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextDataKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signingKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(symmetricSigningKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DiscoveryFilter { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.DiscoveryFilter.DiscoveryFilter(")?; + DafnyPrint::fmt_print(accountIds, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(partition, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for EncryptionMaterials {} + impl Eq + for DiscoveryFilter {} + + impl Hash + for DiscoveryFilter { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DiscoveryFilter::DiscoveryFilter{accountIds, partition, } => { + Hash::hash(accountIds, _state); + Hash::hash(partition, _state) + }, + } + } + } - impl Hash - for EncryptionMaterials { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => { - Hash::hash(algorithmSuite, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(encryptedDataKeys, _state); - Hash::hash(requiredEncryptionContextKeys, _state); - Hash::hash(plaintextDataKey, _state); - Hash::hash(signingKey, _state); - Hash::hash(symmetricSigningKeys, _state) - }, - } - } - } + impl Default + for DiscoveryFilter { + fn default() -> DiscoveryFilter { + DiscoveryFilter::DiscoveryFilter { + accountIds: Default::default(), + partition: Default::default() + } + } + } - impl Default - for EncryptionMaterials { - fn default() -> EncryptionMaterials { - EncryptionMaterials::EncryptionMaterials { - algorithmSuite: Default::default(), - encryptionContext: Default::default(), - encryptedDataKeys: Default::default(), - requiredEncryptionContextKeys: Default::default(), - plaintextDataKey: Default::default(), - signingKey: Default::default(), - symmetricSigningKeys: Default::default() - } - } - } - - impl AsRef - for &EncryptionMaterials { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DiscoveryFilter { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum EphemeralPrivateKeyToStaticPublicKeyInput { - EphemeralPrivateKeyToStaticPublicKeyInput { - recipientPublicKey: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1327,3) + #[derive(PartialEq, Clone)] + pub enum ECDSA { + ECDSA { + curve: Arc + } + } - impl EphemeralPrivateKeyToStaticPublicKeyInput { - pub fn recipientPublicKey(&self) -> &Sequence { - match self { - EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => recipientPublicKey, - } - } - } + impl ECDSA { + /// Returns a borrow of the field curve + pub fn curve(&self) -> &Arc { + match self { + ECDSA::ECDSA{curve, } => curve, + } + } + } - impl Debug - for EphemeralPrivateKeyToStaticPublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ECDSA { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for EphemeralPrivateKeyToStaticPublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EphemeralPrivateKeyToStaticPublicKeyInput.EphemeralPrivateKeyToStaticPublicKeyInput(")?; - DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ECDSA { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ECDSA::ECDSA{curve, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ECDSA.ECDSA(")?; + DafnyPrint::fmt_print(curve, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for EphemeralPrivateKeyToStaticPublicKeyInput {} + impl Eq + for ECDSA {} - impl Hash - for EphemeralPrivateKeyToStaticPublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => { - Hash::hash(recipientPublicKey, _state) - }, - } - } - } + impl Hash + for ECDSA { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ECDSA::ECDSA{curve, } => { + Hash::hash(curve, _state) + }, + } + } + } - impl Default - for EphemeralPrivateKeyToStaticPublicKeyInput { - fn default() -> EphemeralPrivateKeyToStaticPublicKeyInput { - EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput { - recipientPublicKey: Default::default() - } - } - } + impl Default + for ECDSA { + fn default() -> ECDSA { + ECDSA::ECDSA { + curve: Default::default() + } + } + } - impl AsRef - for &EphemeralPrivateKeyToStaticPublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ECDSA { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ESDKAlgorithmSuiteId { - ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}, - ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}, - ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}, - ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}, - ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}, - ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}, - ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}, - ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}, - ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}, - ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}, - ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {} - } - - impl ESDKAlgorithmSuiteId {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1330,3) + #[derive(PartialEq, Clone)] + pub enum EdkWrappingAlgorithm { + DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Arc + }, + IntermediateKeyWrapping { + IntermediateKeyWrapping: Arc + } + } - impl Debug - for ESDKAlgorithmSuiteId { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl EdkWrappingAlgorithm { + /// Gets the field DIRECT_KEY_WRAPPING for all enum members which have it + pub fn DIRECT_KEY_WRAPPING(&self) -> &Arc { + match self { + EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => DIRECT_KEY_WRAPPING, + EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field IntermediateKeyWrapping for all enum members which have it + pub fn IntermediateKeyWrapping(&self) -> &Arc { + match self { + EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => panic!("field does not exist on this variant"), + EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => IntermediateKeyWrapping, + } + } + } - impl DafnyPrint - for ESDKAlgorithmSuiteId { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__NO__KDF")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__NO__KDF")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__NO__KDF")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__HKDF__SHA256")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__HKDF__SHA256")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__HKDF__SHA256")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__HKDF__SHA256__ECDSA__P256")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__HKDF__SHA384__ECDSA__P384")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__HKDF__SHA384__ECDSA__P384")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY")?; - Ok(()) - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__ECDSA__P384")?; - Ok(()) - }, - } - } - } + impl Debug + for EdkWrappingAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ESDKAlgorithmSuiteId { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}), Rc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {})].iter() - } - } + impl DafnyPrint + for EdkWrappingAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EdkWrappingAlgorithm.DIRECT__KEY__WRAPPING(")?; + DafnyPrint::fmt_print(DIRECT_KEY_WRAPPING, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EdkWrappingAlgorithm.IntermediateKeyWrapping(")?; + DafnyPrint::fmt_print(IntermediateKeyWrapping, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ESDKAlgorithmSuiteId {} + impl Eq + for EdkWrappingAlgorithm {} + + impl Hash + for EdkWrappingAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING{DIRECT_KEY_WRAPPING, } => { + Hash::hash(DIRECT_KEY_WRAPPING, _state) + }, + EdkWrappingAlgorithm::IntermediateKeyWrapping{IntermediateKeyWrapping, } => { + Hash::hash(IntermediateKeyWrapping, _state) + }, + } + } + } - impl Hash - for ESDKAlgorithmSuiteId { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF{} => { + impl Default + for EdkWrappingAlgorithm { + fn default() -> EdkWrappingAlgorithm { + EdkWrappingAlgorithm::DIRECT_KEY_WRAPPING { + DIRECT_KEY_WRAPPING: Default::default() + } + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF{} => { + impl AsRef + for EdkWrappingAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1333,3) + #[derive(PartialEq, Clone)] + pub enum Encrypt { + AES_GCM { + AES_GCM: Arc + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{} => { + impl Encrypt { + /// Returns a borrow of the field AES_GCM + pub fn AES_GCM(&self) -> &Arc { + match self { + Encrypt::AES_GCM{AES_GCM, } => AES_GCM, + } + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{} => { + impl Debug + for Encrypt { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{} => { + impl DafnyPrint + for Encrypt { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Encrypt::AES_GCM{AES_GCM, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Encrypt.AES__GCM(")?; + DafnyPrint::fmt_print(AES_GCM, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{} => { + impl Eq + for Encrypt {} - }, - ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { + impl Hash + for Encrypt { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Encrypt::AES_GCM{AES_GCM, } => { + Hash::hash(AES_GCM, _state) + }, + } + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { + impl Default + for Encrypt { + fn default() -> Encrypt { + Encrypt::AES_GCM { + AES_GCM: Default::default() + } + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{} => { + impl AsRef + for Encrypt { + fn as_ref(&self) -> &Self { + self + } + } - }, - ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1335,3) + #[derive(PartialEq, Clone)] + pub enum EncryptedDataKey { + EncryptedDataKey { + keyProviderId: ValidUTF8Bytes, + keyProviderInfo: Sequence, + ciphertext: Sequence + } + } - }, - } - } - } + impl EncryptedDataKey { + /// Returns a borrow of the field keyProviderId + pub fn keyProviderId(&self) -> &ValidUTF8Bytes { + match self { + EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => keyProviderId, + } + } + /// Returns a borrow of the field keyProviderInfo + pub fn keyProviderInfo(&self) -> &Sequence { + match self { + EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => keyProviderInfo, + } + } + /// Returns a borrow of the field ciphertext + pub fn ciphertext(&self) -> &Sequence { + match self { + EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => ciphertext, + } + } + } - impl Default - for ESDKAlgorithmSuiteId { - fn default() -> ESDKAlgorithmSuiteId { - ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {} - } - } + impl Debug + for EncryptedDataKey { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ESDKAlgorithmSuiteId { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for EncryptedDataKey { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EncryptedDataKey.EncryptedDataKey(")?; + DafnyPrint::fmt_print(keyProviderId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(keyProviderInfo, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ciphertext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ESDKCommitmentPolicy { - FORBID_ENCRYPT_ALLOW_DECRYPT {}, - REQUIRE_ENCRYPT_ALLOW_DECRYPT {}, - REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} - } + impl Eq + for EncryptedDataKey {} + + impl Hash + for EncryptedDataKey { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptedDataKey::EncryptedDataKey{keyProviderId, keyProviderInfo, ciphertext, } => { + Hash::hash(keyProviderId, _state); + Hash::hash(keyProviderInfo, _state); + Hash::hash(ciphertext, _state) + }, + } + } + } - impl ESDKCommitmentPolicy {} + impl Default + for EncryptedDataKey { + fn default() -> EncryptedDataKey { + EncryptedDataKey::EncryptedDataKey { + keyProviderId: Default::default(), + keyProviderInfo: Default::default(), + ciphertext: Default::default() + } + } + } - impl Debug - for ESDKCommitmentPolicy { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for EncryptedDataKey { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ESDKCommitmentPolicy { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.FORBID__ENCRYPT__ALLOW__DECRYPT")?; - Ok(()) - }, - ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.REQUIRE__ENCRYPT__ALLOW__DECRYPT")?; - Ok(()) - }, - ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.REQUIRE__ENCRYPT__REQUIRE__DECRYPT")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1343,3) + #[derive(PartialEq, Clone)] + pub enum EncryptionMaterials { + EncryptionMaterials { + algorithmSuite: Arc, + encryptionContext: Map, + encryptedDataKeys: Sequence>, + requiredEncryptionContextKeys: Sequence, + plaintextDataKey: Arc>>, + signingKey: Arc>>, + symmetricSigningKeys: Arc>>> + } + } - impl ESDKCommitmentPolicy { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT {}), Rc::new(ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT {}), Rc::new(ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {})].iter() - } - } + impl EncryptionMaterials { + /// Returns a borrow of the field algorithmSuite + pub fn algorithmSuite(&self) -> &Arc { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => algorithmSuite, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => encryptionContext, + } + } + /// Returns a borrow of the field encryptedDataKeys + pub fn encryptedDataKeys(&self) -> &Sequence> { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => encryptedDataKeys, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Sequence { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => requiredEncryptionContextKeys, + } + } + /// Returns a borrow of the field plaintextDataKey + pub fn plaintextDataKey(&self) -> &Arc>> { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => plaintextDataKey, + } + } + /// Returns a borrow of the field signingKey + pub fn signingKey(&self) -> &Arc>> { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => signingKey, + } + } + /// Returns a borrow of the field symmetricSigningKeys + pub fn symmetricSigningKeys(&self) -> &Arc>>> { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => symmetricSigningKeys, + } + } + } - impl Eq - for ESDKCommitmentPolicy {} + impl Debug + for EncryptionMaterials { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ESDKCommitmentPolicy { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT{} => { + impl DafnyPrint + for EncryptionMaterials { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EncryptionMaterials.EncryptionMaterials(")?; + DafnyPrint::fmt_print(algorithmSuite, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(plaintextDataKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signingKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(symmetricSigningKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT{} => { + impl Eq + for EncryptionMaterials {} + + impl Hash + for EncryptionMaterials { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptionMaterials::EncryptionMaterials{algorithmSuite, encryptionContext, encryptedDataKeys, requiredEncryptionContextKeys, plaintextDataKey, signingKey, symmetricSigningKeys, } => { + Hash::hash(algorithmSuite, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(encryptedDataKeys, _state); + Hash::hash(requiredEncryptionContextKeys, _state); + Hash::hash(plaintextDataKey, _state); + Hash::hash(signingKey, _state); + Hash::hash(symmetricSigningKeys, _state) + }, + } + } + } - }, - ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { + impl Default + for EncryptionMaterials { + fn default() -> EncryptionMaterials { + EncryptionMaterials::EncryptionMaterials { + algorithmSuite: Default::default(), + encryptionContext: Default::default(), + encryptedDataKeys: Default::default(), + requiredEncryptionContextKeys: Default::default(), + plaintextDataKey: Default::default(), + signingKey: Default::default(), + symmetricSigningKeys: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for EncryptionMaterials { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ESDKCommitmentPolicy { - fn default() -> ESDKCommitmentPolicy { - ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT {} - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1352,3) + #[derive(PartialEq, Clone)] + pub enum EphemeralPrivateKeyToStaticPublicKeyInput { + EphemeralPrivateKeyToStaticPublicKeyInput { + recipientPublicKey: Sequence + } + } - impl AsRef - for &ESDKCommitmentPolicy { - fn as_ref(&self) -> Self { - self - } - } + impl EphemeralPrivateKeyToStaticPublicKeyInput { + /// Returns a borrow of the field recipientPublicKey + pub fn recipientPublicKey(&self) -> &Sequence { + match self { + EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => recipientPublicKey, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyIdInput { - GetBranchKeyIdInput { - encryptionContext: Map - } - } + impl Debug + for EphemeralPrivateKeyToStaticPublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl GetBranchKeyIdInput { - pub fn encryptionContext(&self) -> &Map { - match self { - GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => encryptionContext, - } - } - } + impl DafnyPrint + for EphemeralPrivateKeyToStaticPublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.EphemeralPrivateKeyToStaticPublicKeyInput.EphemeralPrivateKeyToStaticPublicKeyInput(")?; + DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for GetBranchKeyIdInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for EphemeralPrivateKeyToStaticPublicKeyInput {} - impl DafnyPrint - for GetBranchKeyIdInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetBranchKeyIdInput.GetBranchKeyIdInput(")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for EphemeralPrivateKeyToStaticPublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput{recipientPublicKey, } => { + Hash::hash(recipientPublicKey, _state) + }, + } + } + } - impl Eq - for GetBranchKeyIdInput {} + impl Default + for EphemeralPrivateKeyToStaticPublicKeyInput { + fn default() -> EphemeralPrivateKeyToStaticPublicKeyInput { + EphemeralPrivateKeyToStaticPublicKeyInput::EphemeralPrivateKeyToStaticPublicKeyInput { + recipientPublicKey: Default::default() + } + } + } - impl Hash - for GetBranchKeyIdInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => { - Hash::hash(encryptionContext, _state) - }, - } - } - } + impl AsRef + for EphemeralPrivateKeyToStaticPublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for GetBranchKeyIdInput { - fn default() -> GetBranchKeyIdInput { - GetBranchKeyIdInput::GetBranchKeyIdInput { - encryptionContext: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1355,3) + #[derive(PartialEq, Clone)] + pub enum ESDKAlgorithmSuiteId { + ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}, + ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}, + ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}, + ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}, + ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}, + ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}, + ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}, + ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}, + ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}, + ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}, + ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {} + } - impl AsRef - for &GetBranchKeyIdInput { - fn as_ref(&self) -> Self { - self - } - } + impl ESDKAlgorithmSuiteId {} - #[derive(PartialEq, Clone)] - pub enum GetBranchKeyIdOutput { - GetBranchKeyIdOutput { - branchKeyId: Sequence - } - } + impl Debug + for ESDKAlgorithmSuiteId { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl GetBranchKeyIdOutput { - pub fn branchKeyId(&self) -> &Sequence { - match self { - GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => branchKeyId, - } - } - } + impl DafnyPrint + for ESDKAlgorithmSuiteId { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__NO__KDF")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__NO__KDF")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__NO__KDF")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__HKDF__SHA256")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__HKDF__SHA256")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__HKDF__SHA256")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__128__GCM__IV12__TAG16__HKDF__SHA256__ECDSA__P256")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__192__GCM__IV12__TAG16__HKDF__SHA384__ECDSA__P384")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__IV12__TAG16__HKDF__SHA384__ECDSA__P384")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY")?; + Ok(()) + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKAlgorithmSuiteId.ALG__AES__256__GCM__HKDF__SHA512__COMMIT__KEY__ECDSA__P384")?; + Ok(()) + }, + } + } + } - impl Debug - for GetBranchKeyIdOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ESDKAlgorithmSuiteId { + /// Enumerates all possible values of ESDKAlgorithmSuiteId + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384 {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY {}), Arc::new(ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384 {})].iter() + } + } - impl DafnyPrint - for GetBranchKeyIdOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetBranchKeyIdOutput.GetBranchKeyIdOutput(")?; - DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ESDKAlgorithmSuiteId {} - impl Eq - for GetBranchKeyIdOutput {} + impl Hash + for ESDKAlgorithmSuiteId { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF{} => { - impl Hash - for GetBranchKeyIdOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => { - Hash::hash(branchKeyId, _state) - }, - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_NO_KDF{} => { - impl Default - for GetBranchKeyIdOutput { - fn default() -> GetBranchKeyIdOutput { - GetBranchKeyIdOutput::GetBranchKeyIdOutput { - branchKeyId: Default::default() - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_NO_KDF{} => { - impl AsRef - for &GetBranchKeyIdOutput { - fn as_ref(&self) -> Self { - self - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256{} => { - #[derive(PartialEq, Clone)] - pub enum GetCacheEntryInput { - GetCacheEntryInput { - identifier: Sequence, - bytesUsed: Rc> - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA256{} => { - impl GetCacheEntryInput { - pub fn identifier(&self) -> &Sequence { - match self { - GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => identifier, - } - } - pub fn bytesUsed(&self) -> &Rc> { - match self { - GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => bytesUsed, - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA256{} => { - impl Debug - for GetCacheEntryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_HKDF_SHA256_ECDSA_P256{} => { - impl DafnyPrint - for GetCacheEntryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetCacheEntryInput.GetCacheEntryInput(")?; - DafnyPrint::fmt_print(identifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_192_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { - impl Eq - for GetCacheEntryInput {} + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_IV12_TAG16_HKDF_SHA384_ECDSA_P384{} => { - impl Hash - for GetCacheEntryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => { - Hash::hash(identifier, _state); - Hash::hash(bytesUsed, _state) - }, - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY{} => { - impl Default - for GetCacheEntryInput { - fn default() -> GetCacheEntryInput { - GetCacheEntryInput::GetCacheEntryInput { - identifier: Default::default(), - bytesUsed: Default::default() - } - } - } + }, + ESDKAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384{} => { - impl AsRef - for &GetCacheEntryInput { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetCacheEntryOutput { - GetCacheEntryOutput { - materials: Rc, - creationTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, - expiryTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, - messagesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger, - bytesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger - } - } - - impl GetCacheEntryOutput { - pub fn materials(&self) -> &Rc { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => materials, - } - } - pub fn creationTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => creationTime, - } - } - pub fn expiryTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => expiryTime, - } - } - pub fn messagesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => messagesUsed, - } - } - pub fn bytesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => bytesUsed, - } - } - } + impl Default + for ESDKAlgorithmSuiteId { + fn default() -> ESDKAlgorithmSuiteId { + ESDKAlgorithmSuiteId::ALG_AES_128_GCM_IV12_TAG16_NO_KDF {} + } + } - impl Debug - for GetCacheEntryOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ESDKAlgorithmSuiteId { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GetCacheEntryOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetCacheEntryOutput.GetCacheEntryOutput(")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(creationTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expiryTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(messagesUsed, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1367,3) + #[derive(PartialEq, Clone)] + pub enum ESDKCommitmentPolicy { + FORBID_ENCRYPT_ALLOW_DECRYPT {}, + REQUIRE_ENCRYPT_ALLOW_DECRYPT {}, + REQUIRE_ENCRYPT_REQUIRE_DECRYPT {} + } - impl Eq - for GetCacheEntryOutput {} + impl ESDKCommitmentPolicy {} - impl Hash - for GetCacheEntryOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { - Hash::hash(materials, _state); - Hash::hash(creationTime, _state); - Hash::hash(expiryTime, _state); - Hash::hash(messagesUsed, _state); - Hash::hash(bytesUsed, _state) - }, - } - } - } + impl Debug + for ESDKCommitmentPolicy { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for GetCacheEntryOutput { - fn default() -> GetCacheEntryOutput { - GetCacheEntryOutput::GetCacheEntryOutput { - materials: Default::default(), - creationTime: Default::default(), - expiryTime: Default::default(), - messagesUsed: Default::default(), - bytesUsed: Default::default() - } - } - } + impl DafnyPrint + for ESDKCommitmentPolicy { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.FORBID__ENCRYPT__ALLOW__DECRYPT")?; + Ok(()) + }, + ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.REQUIRE__ENCRYPT__ALLOW__DECRYPT")?; + Ok(()) + }, + ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ESDKCommitmentPolicy.REQUIRE__ENCRYPT__REQUIRE__DECRYPT")?; + Ok(()) + }, + } + } + } - impl AsRef - for &GetCacheEntryOutput { - fn as_ref(&self) -> Self { - self - } - } + impl ESDKCommitmentPolicy { + /// Enumerates all possible values of ESDKCommitmentPolicy + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT {}), Arc::new(ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT {}), Arc::new(ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum GetClientInput { - GetClientInput { - region: Sequence - } - } + impl Eq + for ESDKCommitmentPolicy {} - impl GetClientInput { - pub fn region(&self) -> &Sequence { - match self { - GetClientInput::GetClientInput{region, } => region, - } - } - } + impl Hash + for ESDKCommitmentPolicy { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT{} => { - impl Debug - for GetClientInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ESDKCommitmentPolicy::REQUIRE_ENCRYPT_ALLOW_DECRYPT{} => { - impl DafnyPrint - for GetClientInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetClientInput::GetClientInput{region, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetClientInput.GetClientInput(")?; - DafnyPrint::fmt_print(region, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ESDKCommitmentPolicy::REQUIRE_ENCRYPT_REQUIRE_DECRYPT{} => { - impl Eq - for GetClientInput {} + }, + } + } + } - impl Hash - for GetClientInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetClientInput::GetClientInput{region, } => { - Hash::hash(region, _state) - }, - } - } - } + impl Default + for ESDKCommitmentPolicy { + fn default() -> ESDKCommitmentPolicy { + ESDKCommitmentPolicy::FORBID_ENCRYPT_ALLOW_DECRYPT {} + } + } - impl Default - for GetClientInput { - fn default() -> GetClientInput { - GetClientInput::GetClientInput { - region: Default::default() - } - } - } + impl AsRef + for ESDKCommitmentPolicy { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GetClientInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1371,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyIdInput { + GetBranchKeyIdInput { + encryptionContext: Map + } + } - #[derive(PartialEq, Clone)] - pub enum GetEncryptionMaterialsInput { - GetEncryptionMaterialsInput { - encryptionContext: Map, - commitmentPolicy: Rc, - algorithmSuiteId: Rc>>, - maxPlaintextLength: Rc>, - requiredEncryptionContextKeys: Rc>> - } - } - - impl GetEncryptionMaterialsInput { - pub fn encryptionContext(&self) -> &Map { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => encryptionContext, - } - } - pub fn commitmentPolicy(&self) -> &Rc { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => commitmentPolicy, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => algorithmSuiteId, - } - } - pub fn maxPlaintextLength(&self) -> &Rc> { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => maxPlaintextLength, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Rc>> { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, - } - } - } + impl GetBranchKeyIdInput { + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => encryptionContext, + } + } + } - impl Debug - for GetEncryptionMaterialsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetBranchKeyIdInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetEncryptionMaterialsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetEncryptionMaterialsInput.GetEncryptionMaterialsInput(")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(maxPlaintextLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetBranchKeyIdInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetBranchKeyIdInput.GetBranchKeyIdInput(")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetEncryptionMaterialsInput {} + impl Eq + for GetBranchKeyIdInput {} - impl Hash - for GetEncryptionMaterialsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => { - Hash::hash(encryptionContext, _state); - Hash::hash(commitmentPolicy, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(maxPlaintextLength, _state); - Hash::hash(requiredEncryptionContextKeys, _state) - }, - } - } - } + impl Hash + for GetBranchKeyIdInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyIdInput::GetBranchKeyIdInput{encryptionContext, } => { + Hash::hash(encryptionContext, _state) + }, + } + } + } - impl Default - for GetEncryptionMaterialsInput { - fn default() -> GetEncryptionMaterialsInput { - GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { - encryptionContext: Default::default(), - commitmentPolicy: Default::default(), - algorithmSuiteId: Default::default(), - maxPlaintextLength: Default::default(), - requiredEncryptionContextKeys: Default::default() - } - } - } + impl Default + for GetBranchKeyIdInput { + fn default() -> GetBranchKeyIdInput { + GetBranchKeyIdInput::GetBranchKeyIdInput { + encryptionContext: Default::default() + } + } + } - impl AsRef - for &GetEncryptionMaterialsInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetBranchKeyIdInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum GetEncryptionMaterialsOutput { - GetEncryptionMaterialsOutput { - encryptionMaterials: Rc - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1374,3) + #[derive(PartialEq, Clone)] + pub enum GetBranchKeyIdOutput { + GetBranchKeyIdOutput { + branchKeyId: Sequence + } + } - impl GetEncryptionMaterialsOutput { - pub fn encryptionMaterials(&self) -> &Rc { - match self { - GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => encryptionMaterials, - } - } - } + impl GetBranchKeyIdOutput { + /// Returns a borrow of the field branchKeyId + pub fn branchKeyId(&self) -> &Sequence { + match self { + GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => branchKeyId, + } + } + } - impl Debug - for GetEncryptionMaterialsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetBranchKeyIdOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetEncryptionMaterialsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetEncryptionMaterialsOutput.GetEncryptionMaterialsOutput(")?; - DafnyPrint::fmt_print(encryptionMaterials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetBranchKeyIdOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetBranchKeyIdOutput.GetBranchKeyIdOutput(")?; + DafnyPrint::fmt_print(branchKeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetEncryptionMaterialsOutput {} + impl Eq + for GetBranchKeyIdOutput {} - impl Hash - for GetEncryptionMaterialsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => { - Hash::hash(encryptionMaterials, _state) - }, - } - } - } + impl Hash + for GetBranchKeyIdOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetBranchKeyIdOutput::GetBranchKeyIdOutput{branchKeyId, } => { + Hash::hash(branchKeyId, _state) + }, + } + } + } - impl Default - for GetEncryptionMaterialsOutput { - fn default() -> GetEncryptionMaterialsOutput { - GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput { - encryptionMaterials: Default::default() - } - } - } + impl Default + for GetBranchKeyIdOutput { + fn default() -> GetBranchKeyIdOutput { + GetBranchKeyIdOutput::GetBranchKeyIdOutput { + branchKeyId: Default::default() + } + } + } - impl AsRef - for &GetEncryptionMaterialsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetBranchKeyIdOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum HKDF { - HKDF { - hmac: Rc, - saltLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, - inputKeyLength: SymmetricKeyLength, - outputKeyLength: SymmetricKeyLength - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1377,3) + #[derive(PartialEq, Clone)] + pub enum GetCacheEntryInput { + GetCacheEntryInput { + identifier: Sequence, + bytesUsed: Arc> + } + } - impl HKDF { - pub fn hmac(&self) -> &Rc { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => hmac, - } - } - pub fn saltLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => saltLength, - } - } - pub fn inputKeyLength(&self) -> &SymmetricKeyLength { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => inputKeyLength, - } - } - pub fn outputKeyLength(&self) -> &SymmetricKeyLength { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => outputKeyLength, - } - } - } + impl GetCacheEntryInput { + /// Returns a borrow of the field identifier + pub fn identifier(&self) -> &Sequence { + match self { + GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => identifier, + } + } + /// Returns a borrow of the field bytesUsed + pub fn bytesUsed(&self) -> &Arc> { + match self { + GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => bytesUsed, + } + } + } - impl Debug - for HKDF { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetCacheEntryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for HKDF { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.HKDF.HKDF(")?; - DafnyPrint::fmt_print(hmac, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(saltLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(inputKeyLength, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(outputKeyLength, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetCacheEntryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetCacheEntryInput.GetCacheEntryInput(")?; + DafnyPrint::fmt_print(identifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for HKDF {} + impl Eq + for GetCacheEntryInput {} + + impl Hash + for GetCacheEntryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetCacheEntryInput::GetCacheEntryInput{identifier, bytesUsed, } => { + Hash::hash(identifier, _state); + Hash::hash(bytesUsed, _state) + }, + } + } + } - impl Hash - for HKDF { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => { - Hash::hash(hmac, _state); - Hash::hash(saltLength, _state); - Hash::hash(inputKeyLength, _state); - Hash::hash(outputKeyLength, _state) - }, - } - } - } + impl Default + for GetCacheEntryInput { + fn default() -> GetCacheEntryInput { + GetCacheEntryInput::GetCacheEntryInput { + identifier: Default::default(), + bytesUsed: Default::default() + } + } + } - impl Default - for HKDF { - fn default() -> HKDF { - HKDF::HKDF { - hmac: Default::default(), - saltLength: Default::default(), - inputKeyLength: Default::default(), - outputKeyLength: Default::default() - } - } - } + impl AsRef + for GetCacheEntryInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &HKDF { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1381,3) + #[derive(PartialEq, Clone)] + pub enum GetCacheEntryOutput { + GetCacheEntryOutput { + materials: Arc, + creationTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, + expiryTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, + messagesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger, + bytesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger + } + } - #[derive(PartialEq, Clone)] - pub enum IDENTITY { - IDENTITY {} - } + impl GetCacheEntryOutput { + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => materials, + } + } + /// Returns a borrow of the field creationTime + pub fn creationTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => creationTime, + } + } + /// Returns a borrow of the field expiryTime + pub fn expiryTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => expiryTime, + } + } + /// Returns a borrow of the field messagesUsed + pub fn messagesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => messagesUsed, + } + } + /// Returns a borrow of the field bytesUsed + pub fn bytesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => bytesUsed, + } + } + } - impl IDENTITY {} + impl Debug + for GetCacheEntryOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for IDENTITY { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GetCacheEntryOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetCacheEntryOutput.GetCacheEntryOutput(")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(creationTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expiryTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(messagesUsed, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for IDENTITY { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - IDENTITY::IDENTITY{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.IDENTITY.IDENTITY")?; - Ok(()) - }, - } - } - } + impl Eq + for GetCacheEntryOutput {} + + impl Hash + for GetCacheEntryOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetCacheEntryOutput::GetCacheEntryOutput{materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { + Hash::hash(materials, _state); + Hash::hash(creationTime, _state); + Hash::hash(expiryTime, _state); + Hash::hash(messagesUsed, _state); + Hash::hash(bytesUsed, _state) + }, + } + } + } - impl IDENTITY { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(IDENTITY::IDENTITY {})].iter() - } - } + impl Default + for GetCacheEntryOutput { + fn default() -> GetCacheEntryOutput { + GetCacheEntryOutput::GetCacheEntryOutput { + materials: Default::default(), + creationTime: Default::default(), + expiryTime: Default::default(), + messagesUsed: Default::default(), + bytesUsed: Default::default() + } + } + } - impl Eq - for IDENTITY {} + impl AsRef + for GetCacheEntryOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for IDENTITY { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - IDENTITY::IDENTITY{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1388,3) + #[derive(PartialEq, Clone)] + pub enum GetClientInput { + GetClientInput { + region: Sequence + } + } - }, - } - } - } + impl GetClientInput { + /// Returns a borrow of the field region + pub fn region(&self) -> &Sequence { + match self { + GetClientInput::GetClientInput{region, } => region, + } + } + } - impl Default - for IDENTITY { - fn default() -> IDENTITY { - IDENTITY::IDENTITY {} - } - } + impl Debug + for GetClientInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &IDENTITY { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetClientInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetClientInput::GetClientInput{region, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetClientInput.GetClientInput(")?; + DafnyPrint::fmt_print(region, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum InitializeDecryptionMaterialsInput { - InitializeDecryptionMaterialsInput { - algorithmSuiteId: Rc, - encryptionContext: Map, - requiredEncryptionContextKeys: Sequence - } - } + impl Eq + for GetClientInput {} - impl InitializeDecryptionMaterialsInput { - pub fn algorithmSuiteId(&self) -> &Rc { - match self { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => algorithmSuiteId, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => encryptionContext, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Sequence { - match self { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, - } - } - } + impl Hash + for GetClientInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetClientInput::GetClientInput{region, } => { + Hash::hash(region, _state) + }, + } + } + } - impl Debug - for InitializeDecryptionMaterialsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetClientInput { + fn default() -> GetClientInput { + GetClientInput::GetClientInput { + region: Default::default() + } + } + } - impl DafnyPrint - for InitializeDecryptionMaterialsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.InitializeDecryptionMaterialsInput.InitializeDecryptionMaterialsInput(")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetClientInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for InitializeDecryptionMaterialsInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1391,3) + #[derive(PartialEq, Clone)] + pub enum GetEncryptionMaterialsInput { + GetEncryptionMaterialsInput { + encryptionContext: Map, + commitmentPolicy: Arc, + algorithmSuiteId: Arc>>, + maxPlaintextLength: Arc>, + requiredEncryptionContextKeys: Arc>> + } + } - impl Hash - for InitializeDecryptionMaterialsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => { - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(requiredEncryptionContextKeys, _state) - }, - } - } - } + impl GetEncryptionMaterialsInput { + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => encryptionContext, + } + } + /// Returns a borrow of the field commitmentPolicy + pub fn commitmentPolicy(&self) -> &Arc { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => commitmentPolicy, + } + } + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc>> { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field maxPlaintextLength + pub fn maxPlaintextLength(&self) -> &Arc> { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => maxPlaintextLength, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Arc>> { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, + } + } + } - impl Default - for InitializeDecryptionMaterialsInput { - fn default() -> InitializeDecryptionMaterialsInput { - InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput { - algorithmSuiteId: Default::default(), - encryptionContext: Default::default(), - requiredEncryptionContextKeys: Default::default() - } - } - } + impl Debug + for GetEncryptionMaterialsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &InitializeDecryptionMaterialsInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetEncryptionMaterialsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetEncryptionMaterialsInput.GetEncryptionMaterialsInput(")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(maxPlaintextLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum InitializeEncryptionMaterialsInput { - InitializeEncryptionMaterialsInput { - algorithmSuiteId: Rc, - encryptionContext: Map, - requiredEncryptionContextKeys: Sequence, - signingKey: Rc>>, - verificationKey: Rc>> - } - } - - impl InitializeEncryptionMaterialsInput { - pub fn algorithmSuiteId(&self) -> &Rc { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => algorithmSuiteId, - } - } - pub fn encryptionContext(&self) -> &Map { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => encryptionContext, - } - } - pub fn requiredEncryptionContextKeys(&self) -> &Sequence { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => requiredEncryptionContextKeys, - } - } - pub fn signingKey(&self) -> &Rc>> { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => signingKey, - } - } - pub fn verificationKey(&self) -> &Rc>> { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => verificationKey, - } - } - } + impl Eq + for GetEncryptionMaterialsInput {} + + impl Hash + for GetEncryptionMaterialsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput{encryptionContext, commitmentPolicy, algorithmSuiteId, maxPlaintextLength, requiredEncryptionContextKeys, } => { + Hash::hash(encryptionContext, _state); + Hash::hash(commitmentPolicy, _state); + Hash::hash(algorithmSuiteId, _state); + Hash::hash(maxPlaintextLength, _state); + Hash::hash(requiredEncryptionContextKeys, _state) + }, + } + } + } - impl Debug - for InitializeEncryptionMaterialsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetEncryptionMaterialsInput { + fn default() -> GetEncryptionMaterialsInput { + GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { + encryptionContext: Default::default(), + commitmentPolicy: Default::default(), + algorithmSuiteId: Default::default(), + maxPlaintextLength: Default::default(), + requiredEncryptionContextKeys: Default::default() + } + } + } - impl DafnyPrint - for InitializeEncryptionMaterialsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.InitializeEncryptionMaterialsInput.InitializeEncryptionMaterialsInput(")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(signingKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(verificationKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetEncryptionMaterialsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for InitializeEncryptionMaterialsInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1398,3) + #[derive(PartialEq, Clone)] + pub enum GetEncryptionMaterialsOutput { + GetEncryptionMaterialsOutput { + encryptionMaterials: Arc + } + } - impl Hash - for InitializeEncryptionMaterialsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => { - Hash::hash(algorithmSuiteId, _state); - Hash::hash(encryptionContext, _state); - Hash::hash(requiredEncryptionContextKeys, _state); - Hash::hash(signingKey, _state); - Hash::hash(verificationKey, _state) - }, - } - } - } + impl GetEncryptionMaterialsOutput { + /// Returns a borrow of the field encryptionMaterials + pub fn encryptionMaterials(&self) -> &Arc { + match self { + GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => encryptionMaterials, + } + } + } - impl Default - for InitializeEncryptionMaterialsInput { - fn default() -> InitializeEncryptionMaterialsInput { - InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput { - algorithmSuiteId: Default::default(), - encryptionContext: Default::default(), - requiredEncryptionContextKeys: Default::default(), - signingKey: Default::default(), - verificationKey: Default::default() - } - } - } + impl Debug + for GetEncryptionMaterialsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &InitializeEncryptionMaterialsInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetEncryptionMaterialsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.GetEncryptionMaterialsOutput.GetEncryptionMaterialsOutput(")?; + DafnyPrint::fmt_print(encryptionMaterials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum IntermediateKeyWrapping { - IntermediateKeyWrapping { - keyEncryptionKeyKdf: Rc, - macKeyKdf: Rc, - pdkEncryptAlgorithm: Rc - } - } + impl Eq + for GetEncryptionMaterialsOutput {} - impl IntermediateKeyWrapping { - pub fn keyEncryptionKeyKdf(&self) -> &Rc { - match self { - IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => keyEncryptionKeyKdf, - } - } - pub fn macKeyKdf(&self) -> &Rc { - match self { - IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => macKeyKdf, - } - } - pub fn pdkEncryptAlgorithm(&self) -> &Rc { - match self { - IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => pdkEncryptAlgorithm, - } - } - } + impl Hash + for GetEncryptionMaterialsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput{encryptionMaterials, } => { + Hash::hash(encryptionMaterials, _state) + }, + } + } + } - impl Debug - for IntermediateKeyWrapping { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GetEncryptionMaterialsOutput { + fn default() -> GetEncryptionMaterialsOutput { + GetEncryptionMaterialsOutput::GetEncryptionMaterialsOutput { + encryptionMaterials: Default::default() + } + } + } - impl DafnyPrint - for IntermediateKeyWrapping { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.IntermediateKeyWrapping.IntermediateKeyWrapping(")?; - DafnyPrint::fmt_print(keyEncryptionKeyKdf, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(macKeyKdf, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(pdkEncryptAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GetEncryptionMaterialsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for IntermediateKeyWrapping {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1402,3) + #[derive(PartialEq, Clone)] + pub enum HKDF { + HKDF { + hmac: Arc, + saltLength: crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger, + inputKeyLength: SymmetricKeyLength, + outputKeyLength: SymmetricKeyLength + } + } - impl Hash - for IntermediateKeyWrapping { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => { - Hash::hash(keyEncryptionKeyKdf, _state); - Hash::hash(macKeyKdf, _state); - Hash::hash(pdkEncryptAlgorithm, _state) - }, - } - } - } + impl HKDF { + /// Returns a borrow of the field hmac + pub fn hmac(&self) -> &Arc { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => hmac, + } + } + /// Returns a borrow of the field saltLength + pub fn saltLength(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::PositiveInteger { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => saltLength, + } + } + /// Returns a borrow of the field inputKeyLength + pub fn inputKeyLength(&self) -> &SymmetricKeyLength { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => inputKeyLength, + } + } + /// Returns a borrow of the field outputKeyLength + pub fn outputKeyLength(&self) -> &SymmetricKeyLength { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => outputKeyLength, + } + } + } - impl Default - for IntermediateKeyWrapping { - fn default() -> IntermediateKeyWrapping { - IntermediateKeyWrapping::IntermediateKeyWrapping { - keyEncryptionKeyKdf: Default::default(), - macKeyKdf: Default::default(), - pdkEncryptAlgorithm: Default::default() - } - } - } + impl Debug + for HKDF { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &IntermediateKeyWrapping { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for HKDF { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.HKDF.HKDF(")?; + DafnyPrint::fmt_print(hmac, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(saltLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(inputKeyLength, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(outputKeyLength, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KeyAgreementScheme { - StaticConfiguration { - StaticConfiguration: Rc - } - } + impl Eq + for HKDF {} + + impl Hash + for HKDF { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + HKDF::HKDF{hmac, saltLength, inputKeyLength, outputKeyLength, } => { + Hash::hash(hmac, _state); + Hash::hash(saltLength, _state); + Hash::hash(inputKeyLength, _state); + Hash::hash(outputKeyLength, _state) + }, + } + } + } - impl KeyAgreementScheme { - pub fn StaticConfiguration(&self) -> &Rc { - match self { - KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => StaticConfiguration, - } - } - } + impl Default + for HKDF { + fn default() -> HKDF { + HKDF::HKDF { + hmac: Default::default(), + saltLength: Default::default(), + inputKeyLength: Default::default(), + outputKeyLength: Default::default() + } + } + } - impl Debug - for KeyAgreementScheme { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for HKDF { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for KeyAgreementScheme { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KeyAgreementScheme.StaticConfiguration(")?; - DafnyPrint::fmt_print(StaticConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1408,3) + #[derive(PartialEq, Clone)] + pub enum IDENTITY { + IDENTITY {} + } - impl Eq - for KeyAgreementScheme {} + impl IDENTITY {} - impl Hash - for KeyAgreementScheme { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => { - Hash::hash(StaticConfiguration, _state) - }, - } - } - } + impl Debug + for IDENTITY { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for KeyAgreementScheme { - fn default() -> KeyAgreementScheme { - KeyAgreementScheme::StaticConfiguration { - StaticConfiguration: Default::default() - } - } - } + impl DafnyPrint + for IDENTITY { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + IDENTITY::IDENTITY{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.IDENTITY.IDENTITY")?; + Ok(()) + }, + } + } + } - impl AsRef - for &KeyAgreementScheme { - fn as_ref(&self) -> Self { - self - } - } + impl IDENTITY { + /// Enumerates all possible values of IDENTITY + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(IDENTITY::IDENTITY {})].iter() + } + } - pub struct IKeyringCallHistory {} + impl Eq + for IDENTITY {} - impl IKeyringCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } + impl Hash + for IDENTITY { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + IDENTITY::IDENTITY{} => { - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyringCallHistory { - UpcastObjectFn!(dyn Any); - } + }, + } + } + } - pub trait IKeyring: Any + UpcastObject { - fn OnEncrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring::r#_OnEncrypt_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_OnEncrypt_k(&self, input: &Rc) -> Rc, Rc>>; - fn OnDecrypt(&self, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring::r#_OnDecrypt_k(md!(Object::<_>::from_ref(self)), input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - fn r#_OnDecrypt_k(&self, input: &Rc) -> Rc, Rc>>; - } + impl Default + for IDENTITY { + fn default() -> IDENTITY { + IDENTITY::IDENTITY {} + } + } - #[derive(PartialEq, Clone)] - pub enum KmsEcdhStaticConfigurations { - KmsPublicKeyDiscovery { - KmsPublicKeyDiscovery: Rc - }, - KmsPrivateKeyToStaticPublicKey { - KmsPrivateKeyToStaticPublicKey: Rc - } - } + impl AsRef + for IDENTITY { + fn as_ref(&self) -> &Self { + self + } + } - impl KmsEcdhStaticConfigurations { - pub fn KmsPublicKeyDiscovery(&self) -> &Rc { - match self { - KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => KmsPublicKeyDiscovery, - KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), - } - } - pub fn KmsPrivateKeyToStaticPublicKey(&self) -> &Rc { - match self { - KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => panic!("field does not exist on this variant"), - KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => KmsPrivateKeyToStaticPublicKey, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1411,3) + #[derive(PartialEq, Clone)] + pub enum InitializeDecryptionMaterialsInput { + InitializeDecryptionMaterialsInput { + algorithmSuiteId: Arc, + encryptionContext: Map, + requiredEncryptionContextKeys: Sequence + } + } - impl Debug - for KmsEcdhStaticConfigurations { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl InitializeDecryptionMaterialsInput { + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc { + match self { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => encryptionContext, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Sequence { + match self { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => requiredEncryptionContextKeys, + } + } + } - impl DafnyPrint - for KmsEcdhStaticConfigurations { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsEcdhStaticConfigurations.KmsPublicKeyDiscovery(")?; - DafnyPrint::fmt_print(KmsPublicKeyDiscovery, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsEcdhStaticConfigurations.KmsPrivateKeyToStaticPublicKey(")?; - DafnyPrint::fmt_print(KmsPrivateKeyToStaticPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for InitializeDecryptionMaterialsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for KmsEcdhStaticConfigurations {} + impl DafnyPrint + for InitializeDecryptionMaterialsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.InitializeDecryptionMaterialsInput.InitializeDecryptionMaterialsInput(")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for KmsEcdhStaticConfigurations { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => { - Hash::hash(KmsPublicKeyDiscovery, _state) - }, - KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => { - Hash::hash(KmsPrivateKeyToStaticPublicKey, _state) - }, - } - } - } + impl Eq + for InitializeDecryptionMaterialsInput {} + + impl Hash + for InitializeDecryptionMaterialsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, } => { + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(requiredEncryptionContextKeys, _state) + }, + } + } + } - impl Default - for KmsEcdhStaticConfigurations { - fn default() -> KmsEcdhStaticConfigurations { - KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery { - KmsPublicKeyDiscovery: Default::default() - } - } - } + impl Default + for InitializeDecryptionMaterialsInput { + fn default() -> InitializeDecryptionMaterialsInput { + InitializeDecryptionMaterialsInput::InitializeDecryptionMaterialsInput { + algorithmSuiteId: Default::default(), + encryptionContext: Default::default(), + requiredEncryptionContextKeys: Default::default() + } + } + } - impl AsRef - for &KmsEcdhStaticConfigurations { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for InitializeDecryptionMaterialsInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum KmsPrivateKeyToStaticPublicKeyInput { - KmsPrivateKeyToStaticPublicKeyInput { - senderKmsIdentifier: Sequence, - senderPublicKey: Rc>>, - recipientPublicKey: Sequence - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1416,3) + #[derive(PartialEq, Clone)] + pub enum InitializeEncryptionMaterialsInput { + InitializeEncryptionMaterialsInput { + algorithmSuiteId: Arc, + encryptionContext: Map, + requiredEncryptionContextKeys: Sequence, + signingKey: Arc>>, + verificationKey: Arc>> + } + } - impl KmsPrivateKeyToStaticPublicKeyInput { - pub fn senderKmsIdentifier(&self) -> &Sequence { - match self { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => senderKmsIdentifier, - } - } - pub fn senderPublicKey(&self) -> &Rc>> { - match self { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => senderPublicKey, - } - } - pub fn recipientPublicKey(&self) -> &Sequence { - match self { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => recipientPublicKey, - } - } - } + impl InitializeEncryptionMaterialsInput { + /// Returns a borrow of the field algorithmSuiteId + pub fn algorithmSuiteId(&self) -> &Arc { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => algorithmSuiteId, + } + } + /// Returns a borrow of the field encryptionContext + pub fn encryptionContext(&self) -> &Map { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => encryptionContext, + } + } + /// Returns a borrow of the field requiredEncryptionContextKeys + pub fn requiredEncryptionContextKeys(&self) -> &Sequence { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => requiredEncryptionContextKeys, + } + } + /// Returns a borrow of the field signingKey + pub fn signingKey(&self) -> &Arc>> { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => signingKey, + } + } + /// Returns a borrow of the field verificationKey + pub fn verificationKey(&self) -> &Arc>> { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => verificationKey, + } + } + } - impl Debug - for KmsPrivateKeyToStaticPublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for InitializeEncryptionMaterialsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for KmsPrivateKeyToStaticPublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsPrivateKeyToStaticPublicKeyInput.KmsPrivateKeyToStaticPublicKeyInput(")?; - DafnyPrint::fmt_print(senderKmsIdentifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(senderPublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for InitializeEncryptionMaterialsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.InitializeEncryptionMaterialsInput.InitializeEncryptionMaterialsInput(")?; + DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(requiredEncryptionContextKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(signingKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(verificationKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for KmsPrivateKeyToStaticPublicKeyInput {} + impl Eq + for InitializeEncryptionMaterialsInput {} + + impl Hash + for InitializeEncryptionMaterialsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput{algorithmSuiteId, encryptionContext, requiredEncryptionContextKeys, signingKey, verificationKey, } => { + Hash::hash(algorithmSuiteId, _state); + Hash::hash(encryptionContext, _state); + Hash::hash(requiredEncryptionContextKeys, _state); + Hash::hash(signingKey, _state); + Hash::hash(verificationKey, _state) + }, + } + } + } - impl Hash - for KmsPrivateKeyToStaticPublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => { - Hash::hash(senderKmsIdentifier, _state); - Hash::hash(senderPublicKey, _state); - Hash::hash(recipientPublicKey, _state) - }, - } - } - } + impl Default + for InitializeEncryptionMaterialsInput { + fn default() -> InitializeEncryptionMaterialsInput { + InitializeEncryptionMaterialsInput::InitializeEncryptionMaterialsInput { + algorithmSuiteId: Default::default(), + encryptionContext: Default::default(), + requiredEncryptionContextKeys: Default::default(), + signingKey: Default::default(), + verificationKey: Default::default() + } + } + } - impl Default - for KmsPrivateKeyToStaticPublicKeyInput { - fn default() -> KmsPrivateKeyToStaticPublicKeyInput { - KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput { - senderKmsIdentifier: Default::default(), - senderPublicKey: Default::default(), - recipientPublicKey: Default::default() - } - } - } + impl AsRef + for InitializeEncryptionMaterialsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &KmsPrivateKeyToStaticPublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1423,3) + #[derive(PartialEq, Clone)] + pub enum IntermediateKeyWrapping { + IntermediateKeyWrapping { + keyEncryptionKeyKdf: Arc, + macKeyKdf: Arc, + pdkEncryptAlgorithm: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum KmsPublicKeyDiscoveryInput { - KmsPublicKeyDiscoveryInput { - recipientKmsIdentifier: Sequence - } - } + impl IntermediateKeyWrapping { + /// Returns a borrow of the field keyEncryptionKeyKdf + pub fn keyEncryptionKeyKdf(&self) -> &Arc { + match self { + IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => keyEncryptionKeyKdf, + } + } + /// Returns a borrow of the field macKeyKdf + pub fn macKeyKdf(&self) -> &Arc { + match self { + IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => macKeyKdf, + } + } + /// Returns a borrow of the field pdkEncryptAlgorithm + pub fn pdkEncryptAlgorithm(&self) -> &Arc { + match self { + IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => pdkEncryptAlgorithm, + } + } + } - impl KmsPublicKeyDiscoveryInput { - pub fn recipientKmsIdentifier(&self) -> &Sequence { - match self { - KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => recipientKmsIdentifier, - } - } - } + impl Debug + for IntermediateKeyWrapping { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for KmsPublicKeyDiscoveryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for IntermediateKeyWrapping { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.IntermediateKeyWrapping.IntermediateKeyWrapping(")?; + DafnyPrint::fmt_print(keyEncryptionKeyKdf, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(macKeyKdf, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(pdkEncryptAlgorithm, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for KmsPublicKeyDiscoveryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsPublicKeyDiscoveryInput.KmsPublicKeyDiscoveryInput(")?; - DafnyPrint::fmt_print(recipientKmsIdentifier, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for IntermediateKeyWrapping {} + + impl Hash + for IntermediateKeyWrapping { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + IntermediateKeyWrapping::IntermediateKeyWrapping{keyEncryptionKeyKdf, macKeyKdf, pdkEncryptAlgorithm, } => { + Hash::hash(keyEncryptionKeyKdf, _state); + Hash::hash(macKeyKdf, _state); + Hash::hash(pdkEncryptAlgorithm, _state) + }, + } + } + } - impl Eq - for KmsPublicKeyDiscoveryInput {} + impl Default + for IntermediateKeyWrapping { + fn default() -> IntermediateKeyWrapping { + IntermediateKeyWrapping::IntermediateKeyWrapping { + keyEncryptionKeyKdf: Default::default(), + macKeyKdf: Default::default(), + pdkEncryptAlgorithm: Default::default() + } + } + } - impl Hash - for KmsPublicKeyDiscoveryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => { - Hash::hash(recipientKmsIdentifier, _state) - }, - } - } - } + impl AsRef + for IntermediateKeyWrapping { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for KmsPublicKeyDiscoveryInput { - fn default() -> KmsPublicKeyDiscoveryInput { - KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput { - recipientKmsIdentifier: Default::default() - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1428,3) + #[derive(PartialEq, Clone)] + pub enum KeyAgreementScheme { + StaticConfiguration { + StaticConfiguration: Arc + } + } - impl AsRef - for &KmsPublicKeyDiscoveryInput { - fn as_ref(&self) -> Self { - self - } - } + impl KeyAgreementScheme { + /// Returns a borrow of the field StaticConfiguration + pub fn StaticConfiguration(&self) -> &Arc { + match self { + KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => StaticConfiguration, + } + } + } - #[derive(PartialEq, Clone)] - pub enum MaterialProvidersConfig { - MaterialProvidersConfig {} - } + impl Debug + for KeyAgreementScheme { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl MaterialProvidersConfig {} + impl DafnyPrint + for KeyAgreementScheme { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KeyAgreementScheme.StaticConfiguration(")?; + DafnyPrint::fmt_print(StaticConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for MaterialProvidersConfig { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for KeyAgreementScheme {} - impl DafnyPrint - for MaterialProvidersConfig { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MaterialProvidersConfig::MaterialProvidersConfig{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.MaterialProvidersConfig.MaterialProvidersConfig")?; - Ok(()) - }, - } - } - } + impl Hash + for KeyAgreementScheme { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyAgreementScheme::StaticConfiguration{StaticConfiguration, } => { + Hash::hash(StaticConfiguration, _state) + }, + } + } + } - impl MaterialProvidersConfig { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(MaterialProvidersConfig::MaterialProvidersConfig {})].iter() - } - } + impl Default + for KeyAgreementScheme { + fn default() -> KeyAgreementScheme { + KeyAgreementScheme::StaticConfiguration { + StaticConfiguration: Default::default() + } + } + } - impl Eq - for MaterialProvidersConfig {} + impl AsRef + for KeyAgreementScheme { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for MaterialProvidersConfig { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MaterialProvidersConfig::MaterialProvidersConfig{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1431,3) + pub struct IKeyringCallHistory {} - }, - } - } - } + impl IKeyringCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Default - for MaterialProvidersConfig { - fn default() -> MaterialProvidersConfig { - MaterialProvidersConfig::MaterialProvidersConfig {} - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyringCallHistory { + UpcastObjectFn!(DynAny); + } - impl AsRef - for &MaterialProvidersConfig { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1439,3) + pub trait IKeyring: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1468,5) + fn OnEncrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring::_OnEncrypt_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1485,5) + fn _OnEncrypt_k(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1499,5) + fn OnDecrypt(&self, input: &Arc) -> Arc, Arc>> { + let mut output: Arc, Arc>>; + let mut _out0: Arc, Arc>>; + _out0 = crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring::_OnDecrypt_k(rd!(Object::<_>::from_ref(self)), input); + output = _out0.clone(); + return output.clone(); + } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1516,5) + fn _OnDecrypt_k(&self, input: &Arc) -> Arc, Arc>>; + } - #[derive(PartialEq, Clone)] - pub enum Materials { - Encryption { - Encryption: Rc - }, - Decryption { - Decryption: Rc - }, - BranchKey { - BranchKey: Rc - }, - BeaconKey { - BeaconKey: Rc - } - } - - impl Materials { - pub fn Encryption(&self) -> &Rc { - match self { - Materials::Encryption{Encryption, } => Encryption, - Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), - Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), - Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), - } - } - pub fn Decryption(&self) -> &Rc { - match self { - Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), - Materials::Decryption{Decryption, } => Decryption, - Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), - Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), - } - } - pub fn BranchKey(&self) -> &Rc { - match self { - Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), - Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), - Materials::BranchKey{BranchKey, } => BranchKey, - Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), - } - } - pub fn BeaconKey(&self) -> &Rc { - match self { - Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), - Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), - Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), - Materials::BeaconKey{BeaconKey, } => BeaconKey, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1529,3) + #[derive(PartialEq, Clone)] + pub enum KmsEcdhStaticConfigurations { + KmsPublicKeyDiscovery { + KmsPublicKeyDiscovery: Arc + }, + KmsPrivateKeyToStaticPublicKey { + KmsPrivateKeyToStaticPublicKey: Arc + } + } - impl Debug - for Materials { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl KmsEcdhStaticConfigurations { + /// Gets the field KmsPublicKeyDiscovery for all enum members which have it + pub fn KmsPublicKeyDiscovery(&self) -> &Arc { + match self { + KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => KmsPublicKeyDiscovery, + KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field KmsPrivateKeyToStaticPublicKey for all enum members which have it + pub fn KmsPrivateKeyToStaticPublicKey(&self) -> &Arc { + match self { + KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => panic!("field does not exist on this variant"), + KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => KmsPrivateKeyToStaticPublicKey, + } + } + } - impl DafnyPrint - for Materials { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Materials::Encryption{Encryption, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.Encryption(")?; - DafnyPrint::fmt_print(Encryption, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Materials::Decryption{Decryption, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.Decryption(")?; - DafnyPrint::fmt_print(Decryption, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Materials::BranchKey{BranchKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.BranchKey(")?; - DafnyPrint::fmt_print(BranchKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Materials::BeaconKey{BeaconKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.BeaconKey(")?; - DafnyPrint::fmt_print(BeaconKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for KmsEcdhStaticConfigurations { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for Materials {} + impl DafnyPrint + for KmsEcdhStaticConfigurations { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsEcdhStaticConfigurations.KmsPublicKeyDiscovery(")?; + DafnyPrint::fmt_print(KmsPublicKeyDiscovery, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsEcdhStaticConfigurations.KmsPrivateKeyToStaticPublicKey(")?; + DafnyPrint::fmt_print(KmsPrivateKeyToStaticPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for Materials { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Materials::Encryption{Encryption, } => { - Hash::hash(Encryption, _state) - }, - Materials::Decryption{Decryption, } => { - Hash::hash(Decryption, _state) - }, - Materials::BranchKey{BranchKey, } => { - Hash::hash(BranchKey, _state) - }, - Materials::BeaconKey{BeaconKey, } => { - Hash::hash(BeaconKey, _state) - }, - } - } - } + impl Eq + for KmsEcdhStaticConfigurations {} + + impl Hash + for KmsEcdhStaticConfigurations { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery{KmsPublicKeyDiscovery, } => { + Hash::hash(KmsPublicKeyDiscovery, _state) + }, + KmsEcdhStaticConfigurations::KmsPrivateKeyToStaticPublicKey{KmsPrivateKeyToStaticPublicKey, } => { + Hash::hash(KmsPrivateKeyToStaticPublicKey, _state) + }, + } + } + } - impl Default - for Materials { - fn default() -> Materials { - Materials::Encryption { - Encryption: Default::default() - } - } - } + impl Default + for KmsEcdhStaticConfigurations { + fn default() -> KmsEcdhStaticConfigurations { + KmsEcdhStaticConfigurations::KmsPublicKeyDiscovery { + KmsPublicKeyDiscovery: Default::default() + } + } + } - impl AsRef - for &Materials { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for KmsEcdhStaticConfigurations { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum MultiThreadedCache { - MultiThreadedCache { - entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - entryPruningTailSize: Rc> - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1534,3) + #[derive(PartialEq, Clone)] + pub enum KmsPrivateKeyToStaticPublicKeyInput { + KmsPrivateKeyToStaticPublicKeyInput { + senderKmsIdentifier: Sequence, + senderPublicKey: Arc>>, + recipientPublicKey: Sequence + } + } - impl MultiThreadedCache { - pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => entryCapacity, - } - } - pub fn entryPruningTailSize(&self) -> &Rc> { - match self { - MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => entryPruningTailSize, - } - } - } + impl KmsPrivateKeyToStaticPublicKeyInput { + /// Returns a borrow of the field senderKmsIdentifier + pub fn senderKmsIdentifier(&self) -> &Sequence { + match self { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => senderKmsIdentifier, + } + } + /// Returns a borrow of the field senderPublicKey + pub fn senderPublicKey(&self) -> &Arc>> { + match self { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => senderPublicKey, + } + } + /// Returns a borrow of the field recipientPublicKey + pub fn recipientPublicKey(&self) -> &Sequence { + match self { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => recipientPublicKey, + } + } + } - impl Debug - for MultiThreadedCache { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for KmsPrivateKeyToStaticPublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for MultiThreadedCache { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.MultiThreadedCache.MultiThreadedCache(")?; - DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for KmsPrivateKeyToStaticPublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsPrivateKeyToStaticPublicKeyInput.KmsPrivateKeyToStaticPublicKeyInput(")?; + DafnyPrint::fmt_print(senderKmsIdentifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(senderPublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for MultiThreadedCache {} + impl Eq + for KmsPrivateKeyToStaticPublicKeyInput {} + + impl Hash + for KmsPrivateKeyToStaticPublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput{senderKmsIdentifier, senderPublicKey, recipientPublicKey, } => { + Hash::hash(senderKmsIdentifier, _state); + Hash::hash(senderPublicKey, _state); + Hash::hash(recipientPublicKey, _state) + }, + } + } + } - impl Hash - for MultiThreadedCache { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => { - Hash::hash(entryCapacity, _state); - Hash::hash(entryPruningTailSize, _state) - }, - } - } - } + impl Default + for KmsPrivateKeyToStaticPublicKeyInput { + fn default() -> KmsPrivateKeyToStaticPublicKeyInput { + KmsPrivateKeyToStaticPublicKeyInput::KmsPrivateKeyToStaticPublicKeyInput { + senderKmsIdentifier: Default::default(), + senderPublicKey: Default::default(), + recipientPublicKey: Default::default() + } + } + } - impl Default - for MultiThreadedCache { - fn default() -> MultiThreadedCache { - MultiThreadedCache::MultiThreadedCache { - entryCapacity: Default::default(), - entryPruningTailSize: Default::default() - } - } - } + impl AsRef + for KmsPrivateKeyToStaticPublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &MultiThreadedCache { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1539,3) + #[derive(PartialEq, Clone)] + pub enum KmsPublicKeyDiscoveryInput { + KmsPublicKeyDiscoveryInput { + recipientKmsIdentifier: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum NoCache { - NoCache {} - } + impl KmsPublicKeyDiscoveryInput { + /// Returns a borrow of the field recipientKmsIdentifier + pub fn recipientKmsIdentifier(&self) -> &Sequence { + match self { + KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => recipientKmsIdentifier, + } + } + } - impl NoCache {} + impl Debug + for KmsPublicKeyDiscoveryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for NoCache { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for KmsPublicKeyDiscoveryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.KmsPublicKeyDiscoveryInput.KmsPublicKeyDiscoveryInput(")?; + DafnyPrint::fmt_print(recipientKmsIdentifier, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for NoCache { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - NoCache::NoCache{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.NoCache.NoCache")?; - Ok(()) - }, - } - } - } + impl Eq + for KmsPublicKeyDiscoveryInput {} - impl NoCache { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(NoCache::NoCache {})].iter() - } - } + impl Hash + for KmsPublicKeyDiscoveryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput{recipientKmsIdentifier, } => { + Hash::hash(recipientKmsIdentifier, _state) + }, + } + } + } - impl Eq - for NoCache {} + impl Default + for KmsPublicKeyDiscoveryInput { + fn default() -> KmsPublicKeyDiscoveryInput { + KmsPublicKeyDiscoveryInput::KmsPublicKeyDiscoveryInput { + recipientKmsIdentifier: Default::default() + } + } + } - impl Hash - for NoCache { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - NoCache::NoCache{} => { + impl AsRef + for KmsPublicKeyDiscoveryInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1542,3) + #[derive(PartialEq, Clone)] + pub enum MaterialProvidersConfig { + MaterialProvidersConfig {} + } - impl Default - for NoCache { - fn default() -> NoCache { - NoCache::NoCache {} - } - } + impl MaterialProvidersConfig {} - impl AsRef - for &NoCache { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for MaterialProvidersConfig { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum None { - None {} - } + impl DafnyPrint + for MaterialProvidersConfig { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + MaterialProvidersConfig::MaterialProvidersConfig{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.MaterialProvidersConfig.MaterialProvidersConfig")?; + Ok(()) + }, + } + } + } - impl None {} + impl MaterialProvidersConfig { + /// Enumerates all possible values of MaterialProvidersConfig + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(MaterialProvidersConfig::MaterialProvidersConfig {})].iter() + } + } - impl Debug - for None { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for MaterialProvidersConfig {} - impl DafnyPrint - for None { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - None::None{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.None.None")?; - Ok(()) - }, - } - } - } + impl Hash + for MaterialProvidersConfig { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + MaterialProvidersConfig::MaterialProvidersConfig{} => { - impl None { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(None::None {})].iter() - } - } + }, + } + } + } - impl Eq - for None {} + impl Default + for MaterialProvidersConfig { + fn default() -> MaterialProvidersConfig { + MaterialProvidersConfig::MaterialProvidersConfig {} + } + } - impl Hash - for None { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - None::None{} => { + impl AsRef + for MaterialProvidersConfig { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1545,3) + #[derive(PartialEq, Clone)] + pub enum Materials { + Encryption { + Encryption: Arc + }, + Decryption { + Decryption: Arc + }, + BranchKey { + BranchKey: Arc + }, + BeaconKey { + BeaconKey: Arc + } + } - impl Default - for None { - fn default() -> None { - None::None {} - } - } + impl Materials { + /// Gets the field Encryption for all enum members which have it + pub fn Encryption(&self) -> &Arc { + match self { + Materials::Encryption{Encryption, } => Encryption, + Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), + Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), + Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field Decryption for all enum members which have it + pub fn Decryption(&self) -> &Arc { + match self { + Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), + Materials::Decryption{Decryption, } => Decryption, + Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), + Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field BranchKey for all enum members which have it + pub fn BranchKey(&self) -> &Arc { + match self { + Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), + Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), + Materials::BranchKey{BranchKey, } => BranchKey, + Materials::BeaconKey{BeaconKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field BeaconKey for all enum members which have it + pub fn BeaconKey(&self) -> &Arc { + match self { + Materials::Encryption{Encryption, } => panic!("field does not exist on this variant"), + Materials::Decryption{Decryption, } => panic!("field does not exist on this variant"), + Materials::BranchKey{BranchKey, } => panic!("field does not exist on this variant"), + Materials::BeaconKey{BeaconKey, } => BeaconKey, + } + } + } - impl AsRef - for &None { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for Materials { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum OnDecryptInput { - OnDecryptInput { - materials: Rc, - encryptedDataKeys: Sequence> - } - } + impl DafnyPrint + for Materials { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Materials::Encryption{Encryption, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.Encryption(")?; + DafnyPrint::fmt_print(Encryption, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Materials::Decryption{Decryption, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.Decryption(")?; + DafnyPrint::fmt_print(Decryption, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Materials::BranchKey{BranchKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.BranchKey(")?; + DafnyPrint::fmt_print(BranchKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Materials::BeaconKey{BeaconKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Materials.BeaconKey(")?; + DafnyPrint::fmt_print(BeaconKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl OnDecryptInput { - pub fn materials(&self) -> &Rc { - match self { - OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => materials, - } - } - pub fn encryptedDataKeys(&self) -> &Sequence> { - match self { - OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => encryptedDataKeys, - } - } - } + impl Eq + for Materials {} + + impl Hash + for Materials { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Materials::Encryption{Encryption, } => { + Hash::hash(Encryption, _state) + }, + Materials::Decryption{Decryption, } => { + Hash::hash(Decryption, _state) + }, + Materials::BranchKey{BranchKey, } => { + Hash::hash(BranchKey, _state) + }, + Materials::BeaconKey{BeaconKey, } => { + Hash::hash(BeaconKey, _state) + }, + } + } + } - impl Debug - for OnDecryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for Materials { + fn default() -> Materials { + Materials::Encryption { + Encryption: Default::default() + } + } + } - impl DafnyPrint - for OnDecryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnDecryptInput.OnDecryptInput(")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for Materials { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for OnDecryptInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1550,3) + #[derive(PartialEq, Clone)] + pub enum MultiThreadedCache { + MultiThreadedCache { + entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + entryPruningTailSize: Arc> + } + } - impl Hash - for OnDecryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => { - Hash::hash(materials, _state); - Hash::hash(encryptedDataKeys, _state) - }, - } - } - } + impl MultiThreadedCache { + /// Returns a borrow of the field entryCapacity + pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => entryCapacity, + } + } + /// Returns a borrow of the field entryPruningTailSize + pub fn entryPruningTailSize(&self) -> &Arc> { + match self { + MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => entryPruningTailSize, + } + } + } - impl Default - for OnDecryptInput { - fn default() -> OnDecryptInput { - OnDecryptInput::OnDecryptInput { - materials: Default::default(), - encryptedDataKeys: Default::default() - } - } - } + impl Debug + for MultiThreadedCache { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &OnDecryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for MultiThreadedCache { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.MultiThreadedCache.MultiThreadedCache(")?; + DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum OnDecryptOutput { - OnDecryptOutput { - materials: Rc - } - } + impl Eq + for MultiThreadedCache {} + + impl Hash + for MultiThreadedCache { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + MultiThreadedCache::MultiThreadedCache{entryCapacity, entryPruningTailSize, } => { + Hash::hash(entryCapacity, _state); + Hash::hash(entryPruningTailSize, _state) + }, + } + } + } - impl OnDecryptOutput { - pub fn materials(&self) -> &Rc { - match self { - OnDecryptOutput::OnDecryptOutput{materials, } => materials, - } - } - } + impl Default + for MultiThreadedCache { + fn default() -> MultiThreadedCache { + MultiThreadedCache::MultiThreadedCache { + entryCapacity: Default::default(), + entryPruningTailSize: Default::default() + } + } + } - impl Debug - for OnDecryptOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for MultiThreadedCache { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for OnDecryptOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnDecryptOutput::OnDecryptOutput{materials, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnDecryptOutput.OnDecryptOutput(")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1554,3) + #[derive(PartialEq, Clone)] + pub enum NoCache { + NoCache {} + } - impl Eq - for OnDecryptOutput {} + impl NoCache {} - impl Hash - for OnDecryptOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnDecryptOutput::OnDecryptOutput{materials, } => { - Hash::hash(materials, _state) - }, - } - } - } + impl Debug + for NoCache { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for OnDecryptOutput { - fn default() -> OnDecryptOutput { - OnDecryptOutput::OnDecryptOutput { - materials: Default::default() - } - } - } + impl DafnyPrint + for NoCache { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + NoCache::NoCache{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.NoCache.NoCache")?; + Ok(()) + }, + } + } + } - impl AsRef - for &OnDecryptOutput { - fn as_ref(&self) -> Self { - self - } - } + impl NoCache { + /// Enumerates all possible values of NoCache + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(NoCache::NoCache {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum OnEncryptInput { - OnEncryptInput { - materials: Rc - } - } + impl Eq + for NoCache {} - impl OnEncryptInput { - pub fn materials(&self) -> &Rc { - match self { - OnEncryptInput::OnEncryptInput{materials, } => materials, - } - } - } + impl Hash + for NoCache { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + NoCache::NoCache{} => { - impl Debug - for OnEncryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for OnEncryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnEncryptInput::OnEncryptInput{materials, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnEncryptInput.OnEncryptInput(")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for NoCache { + fn default() -> NoCache { + NoCache::NoCache {} + } + } - impl Eq - for OnEncryptInput {} + impl AsRef + for NoCache { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for OnEncryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnEncryptInput::OnEncryptInput{materials, } => { - Hash::hash(materials, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1557,3) + #[derive(PartialEq, Clone)] + pub enum None { + None {} + } - impl Default - for OnEncryptInput { - fn default() -> OnEncryptInput { - OnEncryptInput::OnEncryptInput { - materials: Default::default() - } - } - } + impl None {} - impl AsRef - for &OnEncryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for None { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum OnEncryptOutput { - OnEncryptOutput { - materials: Rc - } - } + impl DafnyPrint + for None { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + None::None{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.None.None")?; + Ok(()) + }, + } + } + } - impl OnEncryptOutput { - pub fn materials(&self) -> &Rc { - match self { - OnEncryptOutput::OnEncryptOutput{materials, } => materials, - } - } - } + impl None { + /// Enumerates all possible values of None + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(None::None {})].iter() + } + } - impl Debug - for OnEncryptOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for None {} - impl DafnyPrint - for OnEncryptOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnEncryptOutput::OnEncryptOutput{materials, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnEncryptOutput.OnEncryptOutput(")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for None { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + None::None{} => { - impl Eq - for OnEncryptOutput {} + }, + } + } + } - impl Hash - for OnEncryptOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnEncryptOutput::OnEncryptOutput{materials, } => { - Hash::hash(materials, _state) - }, - } - } - } + impl Default + for None { + fn default() -> None { + None::None {} + } + } - impl Default - for OnEncryptOutput { - fn default() -> OnEncryptOutput { - OnEncryptOutput::OnEncryptOutput { - materials: Default::default() - } - } - } + impl AsRef + for None { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &OnEncryptOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1560,3) + #[derive(PartialEq, Clone)] + pub enum OnDecryptInput { + OnDecryptInput { + materials: Arc, + encryptedDataKeys: Sequence> + } + } - #[derive(PartialEq, Clone)] - pub enum PaddingScheme { - PKCS1 {}, - OAEP_SHA1_MGF1 {}, - OAEP_SHA256_MGF1 {}, - OAEP_SHA384_MGF1 {}, - OAEP_SHA512_MGF1 {} - } + impl OnDecryptInput { + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => materials, + } + } + /// Returns a borrow of the field encryptedDataKeys + pub fn encryptedDataKeys(&self) -> &Sequence> { + match self { + OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => encryptedDataKeys, + } + } + } - impl PaddingScheme {} + impl Debug + for OnDecryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for PaddingScheme { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for OnDecryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnDecryptInput.OnDecryptInput(")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(encryptedDataKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for PaddingScheme { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PaddingScheme::PKCS1{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.PKCS1")?; - Ok(()) - }, - PaddingScheme::OAEP_SHA1_MGF1{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA1__MGF1")?; - Ok(()) - }, - PaddingScheme::OAEP_SHA256_MGF1{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA256__MGF1")?; - Ok(()) - }, - PaddingScheme::OAEP_SHA384_MGF1{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA384__MGF1")?; - Ok(()) - }, - PaddingScheme::OAEP_SHA512_MGF1{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA512__MGF1")?; - Ok(()) - }, - } - } - } - - impl PaddingScheme { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(PaddingScheme::PKCS1 {}), Rc::new(PaddingScheme::OAEP_SHA1_MGF1 {}), Rc::new(PaddingScheme::OAEP_SHA256_MGF1 {}), Rc::new(PaddingScheme::OAEP_SHA384_MGF1 {}), Rc::new(PaddingScheme::OAEP_SHA512_MGF1 {})].iter() - } - } + impl Eq + for OnDecryptInput {} + + impl Hash + for OnDecryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnDecryptInput::OnDecryptInput{materials, encryptedDataKeys, } => { + Hash::hash(materials, _state); + Hash::hash(encryptedDataKeys, _state) + }, + } + } + } - impl Eq - for PaddingScheme {} + impl Default + for OnDecryptInput { + fn default() -> OnDecryptInput { + OnDecryptInput::OnDecryptInput { + materials: Default::default(), + encryptedDataKeys: Default::default() + } + } + } - impl Hash - for PaddingScheme { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PaddingScheme::PKCS1{} => { + impl AsRef + for OnDecryptInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - PaddingScheme::OAEP_SHA1_MGF1{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1564,3) + #[derive(PartialEq, Clone)] + pub enum OnDecryptOutput { + OnDecryptOutput { + materials: Arc + } + } - }, - PaddingScheme::OAEP_SHA256_MGF1{} => { + impl OnDecryptOutput { + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + OnDecryptOutput::OnDecryptOutput{materials, } => materials, + } + } + } - }, - PaddingScheme::OAEP_SHA384_MGF1{} => { + impl Debug + for OnDecryptOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - PaddingScheme::OAEP_SHA512_MGF1{} => { + impl DafnyPrint + for OnDecryptOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnDecryptOutput::OnDecryptOutput{materials, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnDecryptOutput.OnDecryptOutput(")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for OnDecryptOutput {} - impl Default - for PaddingScheme { - fn default() -> PaddingScheme { - PaddingScheme::PKCS1 {} - } - } + impl Hash + for OnDecryptOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnDecryptOutput::OnDecryptOutput{materials, } => { + Hash::hash(materials, _state) + }, + } + } + } - impl AsRef - for &PaddingScheme { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for OnDecryptOutput { + fn default() -> OnDecryptOutput { + OnDecryptOutput::OnDecryptOutput { + materials: Default::default() + } + } + } - pub type PositiveInteger = i32; + impl AsRef + for OnDecryptOutput { + fn as_ref(&self) -> &Self { + self + } + } - pub type PositiveLong = i64; + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1567,3) + #[derive(PartialEq, Clone)] + pub enum OnEncryptInput { + OnEncryptInput { + materials: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum PublicKeyDiscoveryInput { - PublicKeyDiscoveryInput { - recipientStaticPrivateKey: Sequence - } - } + impl OnEncryptInput { + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + OnEncryptInput::OnEncryptInput{materials, } => materials, + } + } + } - impl PublicKeyDiscoveryInput { - pub fn recipientStaticPrivateKey(&self) -> &Sequence { - match self { - PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => recipientStaticPrivateKey, - } - } - } + impl Debug + for OnEncryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for PublicKeyDiscoveryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for OnEncryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnEncryptInput::OnEncryptInput{materials, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnEncryptInput.OnEncryptInput(")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for PublicKeyDiscoveryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PublicKeyDiscoveryInput.PublicKeyDiscoveryInput(")?; - DafnyPrint::fmt_print(recipientStaticPrivateKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for OnEncryptInput {} - impl Eq - for PublicKeyDiscoveryInput {} + impl Hash + for OnEncryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnEncryptInput::OnEncryptInput{materials, } => { + Hash::hash(materials, _state) + }, + } + } + } - impl Hash - for PublicKeyDiscoveryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => { - Hash::hash(recipientStaticPrivateKey, _state) - }, - } - } - } + impl Default + for OnEncryptInput { + fn default() -> OnEncryptInput { + OnEncryptInput::OnEncryptInput { + materials: Default::default() + } + } + } - impl Default - for PublicKeyDiscoveryInput { - fn default() -> PublicKeyDiscoveryInput { - PublicKeyDiscoveryInput::PublicKeyDiscoveryInput { - recipientStaticPrivateKey: Default::default() - } - } - } + impl AsRef + for OnEncryptInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &PublicKeyDiscoveryInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1570,3) + #[derive(PartialEq, Clone)] + pub enum OnEncryptOutput { + OnEncryptOutput { + materials: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum PutCacheEntryInput { - PutCacheEntryInput { - identifier: Sequence, - materials: Rc, - creationTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, - expiryTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, - messagesUsed: Rc>, - bytesUsed: Rc> - } - } - - impl PutCacheEntryInput { - pub fn identifier(&self) -> &Sequence { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => identifier, - } - } - pub fn materials(&self) -> &Rc { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => materials, - } - } - pub fn creationTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => creationTime, - } - } - pub fn expiryTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => expiryTime, - } - } - pub fn messagesUsed(&self) -> &Rc> { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => messagesUsed, - } - } - pub fn bytesUsed(&self) -> &Rc> { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => bytesUsed, - } - } - } + impl OnEncryptOutput { + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + OnEncryptOutput::OnEncryptOutput{materials, } => materials, + } + } + } - impl Debug - for PutCacheEntryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for OnEncryptOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for PutCacheEntryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PutCacheEntryInput.PutCacheEntryInput(")?; - DafnyPrint::fmt_print(identifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(materials, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(creationTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(expiryTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(messagesUsed, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for OnEncryptOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnEncryptOutput::OnEncryptOutput{materials, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.OnEncryptOutput.OnEncryptOutput(")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for PutCacheEntryInput {} + impl Eq + for OnEncryptOutput {} - impl Hash - for PutCacheEntryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { - Hash::hash(identifier, _state); - Hash::hash(materials, _state); - Hash::hash(creationTime, _state); - Hash::hash(expiryTime, _state); - Hash::hash(messagesUsed, _state); - Hash::hash(bytesUsed, _state) - }, - } - } - } + impl Hash + for OnEncryptOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnEncryptOutput::OnEncryptOutput{materials, } => { + Hash::hash(materials, _state) + }, + } + } + } - impl Default - for PutCacheEntryInput { - fn default() -> PutCacheEntryInput { - PutCacheEntryInput::PutCacheEntryInput { - identifier: Default::default(), - materials: Default::default(), - creationTime: Default::default(), - expiryTime: Default::default(), - messagesUsed: Default::default(), - bytesUsed: Default::default() - } - } - } - - impl AsRef - for &PutCacheEntryInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for OnEncryptOutput { + fn default() -> OnEncryptOutput { + OnEncryptOutput::OnEncryptOutput { + materials: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum RawEcdhStaticConfigurations { - PublicKeyDiscovery { - PublicKeyDiscovery: Rc - }, - RawPrivateKeyToStaticPublicKey { - RawPrivateKeyToStaticPublicKey: Rc - }, - EphemeralPrivateKeyToStaticPublicKey { - EphemeralPrivateKeyToStaticPublicKey: Rc - } - } - - impl RawEcdhStaticConfigurations { - pub fn PublicKeyDiscovery(&self) -> &Rc { - match self { - RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => PublicKeyDiscovery, - RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), - RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), - } - } - pub fn RawPrivateKeyToStaticPublicKey(&self) -> &Rc { - match self { - RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => panic!("field does not exist on this variant"), - RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => RawPrivateKeyToStaticPublicKey, - RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), - } - } - pub fn EphemeralPrivateKeyToStaticPublicKey(&self) -> &Rc { - match self { - RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => panic!("field does not exist on this variant"), - RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), - RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => EphemeralPrivateKeyToStaticPublicKey, - } - } - } + impl AsRef + for OnEncryptOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for RawEcdhStaticConfigurations { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1573,3) + #[derive(PartialEq, Clone)] + pub enum PaddingScheme { + PKCS1 {}, + OAEP_SHA1_MGF1 {}, + OAEP_SHA256_MGF1 {}, + OAEP_SHA384_MGF1 {}, + OAEP_SHA512_MGF1 {} + } - impl DafnyPrint - for RawEcdhStaticConfigurations { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.PublicKeyDiscovery(")?; - DafnyPrint::fmt_print(PublicKeyDiscovery, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.RawPrivateKeyToStaticPublicKey(")?; - DafnyPrint::fmt_print(RawPrivateKeyToStaticPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.EphemeralPrivateKeyToStaticPublicKey(")?; - DafnyPrint::fmt_print(EphemeralPrivateKeyToStaticPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl PaddingScheme {} - impl Eq - for RawEcdhStaticConfigurations {} + impl Debug + for PaddingScheme { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for RawEcdhStaticConfigurations { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => { - Hash::hash(PublicKeyDiscovery, _state) - }, - RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => { - Hash::hash(RawPrivateKeyToStaticPublicKey, _state) - }, - RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => { - Hash::hash(EphemeralPrivateKeyToStaticPublicKey, _state) - }, - } - } - } + impl DafnyPrint + for PaddingScheme { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PaddingScheme::PKCS1{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.PKCS1")?; + Ok(()) + }, + PaddingScheme::OAEP_SHA1_MGF1{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA1__MGF1")?; + Ok(()) + }, + PaddingScheme::OAEP_SHA256_MGF1{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA256__MGF1")?; + Ok(()) + }, + PaddingScheme::OAEP_SHA384_MGF1{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA384__MGF1")?; + Ok(()) + }, + PaddingScheme::OAEP_SHA512_MGF1{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PaddingScheme.OAEP__SHA512__MGF1")?; + Ok(()) + }, + } + } + } - impl Default - for RawEcdhStaticConfigurations { - fn default() -> RawEcdhStaticConfigurations { - RawEcdhStaticConfigurations::PublicKeyDiscovery { - PublicKeyDiscovery: Default::default() - } - } - } + impl PaddingScheme { + /// Enumerates all possible values of PaddingScheme + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(PaddingScheme::PKCS1 {}), Arc::new(PaddingScheme::OAEP_SHA1_MGF1 {}), Arc::new(PaddingScheme::OAEP_SHA256_MGF1 {}), Arc::new(PaddingScheme::OAEP_SHA384_MGF1 {}), Arc::new(PaddingScheme::OAEP_SHA512_MGF1 {})].iter() + } + } - impl AsRef - for &RawEcdhStaticConfigurations { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for PaddingScheme {} - #[derive(PartialEq, Clone)] - pub enum RawPrivateKeyToStaticPublicKeyInput { - RawPrivateKeyToStaticPublicKeyInput { - senderStaticPrivateKey: Sequence, - recipientPublicKey: Sequence - } - } + impl Hash + for PaddingScheme { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PaddingScheme::PKCS1{} => { - impl RawPrivateKeyToStaticPublicKeyInput { - pub fn senderStaticPrivateKey(&self) -> &Sequence { - match self { - RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => senderStaticPrivateKey, - } - } - pub fn recipientPublicKey(&self) -> &Sequence { - match self { - RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => recipientPublicKey, - } - } - } + }, + PaddingScheme::OAEP_SHA1_MGF1{} => { - impl Debug - for RawPrivateKeyToStaticPublicKeyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + PaddingScheme::OAEP_SHA256_MGF1{} => { - impl DafnyPrint - for RawPrivateKeyToStaticPublicKeyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawPrivateKeyToStaticPublicKeyInput.RawPrivateKeyToStaticPublicKeyInput(")?; - DafnyPrint::fmt_print(senderStaticPrivateKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + PaddingScheme::OAEP_SHA384_MGF1{} => { - impl Eq - for RawPrivateKeyToStaticPublicKeyInput {} + }, + PaddingScheme::OAEP_SHA512_MGF1{} => { - impl Hash - for RawPrivateKeyToStaticPublicKeyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => { - Hash::hash(senderStaticPrivateKey, _state); - Hash::hash(recipientPublicKey, _state) - }, - } - } - } + }, + } + } + } - impl Default - for RawPrivateKeyToStaticPublicKeyInput { - fn default() -> RawPrivateKeyToStaticPublicKeyInput { - RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput { - senderStaticPrivateKey: Default::default(), - recipientPublicKey: Default::default() - } - } - } + impl Default + for PaddingScheme { + fn default() -> PaddingScheme { + PaddingScheme::PKCS1 {} + } + } - impl AsRef - for &RawPrivateKeyToStaticPublicKeyInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for PaddingScheme { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum SignatureAlgorithm { - ECDSA { - ECDSA: Rc - }, - None { - _None: Rc - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1579,3) + pub type PositiveInteger = i32; - impl SignatureAlgorithm { - pub fn ECDSA(&self) -> &Rc { - match self { - SignatureAlgorithm::ECDSA{ECDSA, } => ECDSA, - SignatureAlgorithm::None{_None, } => panic!("field does not exist on this variant"), - } - } - pub fn _None(&self) -> &Rc { - match self { - SignatureAlgorithm::ECDSA{ECDSA, } => panic!("field does not exist on this variant"), - SignatureAlgorithm::None{_None, } => _None, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1583,3) + pub type PositiveLong = i64; - impl Debug - for SignatureAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1587,3) + #[derive(PartialEq, Clone)] + pub enum PublicKeyDiscoveryInput { + PublicKeyDiscoveryInput { + recipientStaticPrivateKey: Sequence + } + } - impl DafnyPrint - for SignatureAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SignatureAlgorithm::ECDSA{ECDSA, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SignatureAlgorithm.ECDSA(")?; - DafnyPrint::fmt_print(ECDSA, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - SignatureAlgorithm::None{_None, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SignatureAlgorithm.None(")?; - DafnyPrint::fmt_print(_None, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl PublicKeyDiscoveryInput { + /// Returns a borrow of the field recipientStaticPrivateKey + pub fn recipientStaticPrivateKey(&self) -> &Sequence { + match self { + PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => recipientStaticPrivateKey, + } + } + } - impl Eq - for SignatureAlgorithm {} + impl Debug + for PublicKeyDiscoveryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for SignatureAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SignatureAlgorithm::ECDSA{ECDSA, } => { - Hash::hash(ECDSA, _state) - }, - SignatureAlgorithm::None{_None, } => { - Hash::hash(_None, _state) - }, - } - } - } + impl DafnyPrint + for PublicKeyDiscoveryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PublicKeyDiscoveryInput.PublicKeyDiscoveryInput(")?; + DafnyPrint::fmt_print(recipientStaticPrivateKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for SignatureAlgorithm { - fn default() -> SignatureAlgorithm { - SignatureAlgorithm::ECDSA { - ECDSA: Default::default() - } - } - } + impl Eq + for PublicKeyDiscoveryInput {} - impl AsRef - for &SignatureAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for PublicKeyDiscoveryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PublicKeyDiscoveryInput::PublicKeyDiscoveryInput{recipientStaticPrivateKey, } => { + Hash::hash(recipientStaticPrivateKey, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum SingleThreadedCache { - SingleThreadedCache { - entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - entryPruningTailSize: Rc> - } - } + impl Default + for PublicKeyDiscoveryInput { + fn default() -> PublicKeyDiscoveryInput { + PublicKeyDiscoveryInput::PublicKeyDiscoveryInput { + recipientStaticPrivateKey: Default::default() + } + } + } - impl SingleThreadedCache { - pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => entryCapacity, - } - } - pub fn entryPruningTailSize(&self) -> &Rc> { - match self { - SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => entryPruningTailSize, - } - } - } + impl AsRef + for PublicKeyDiscoveryInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for SingleThreadedCache { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1590,3) + #[derive(PartialEq, Clone)] + pub enum PutCacheEntryInput { + PutCacheEntryInput { + identifier: Sequence, + materials: Arc, + creationTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, + expiryTime: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong, + messagesUsed: Arc>, + bytesUsed: Arc> + } + } - impl DafnyPrint - for SingleThreadedCache { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SingleThreadedCache.SingleThreadedCache(")?; - DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl PutCacheEntryInput { + /// Returns a borrow of the field identifier + pub fn identifier(&self) -> &Sequence { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => identifier, + } + } + /// Returns a borrow of the field materials + pub fn materials(&self) -> &Arc { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => materials, + } + } + /// Returns a borrow of the field creationTime + pub fn creationTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => creationTime, + } + } + /// Returns a borrow of the field expiryTime + pub fn expiryTime(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveLong { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => expiryTime, + } + } + /// Returns a borrow of the field messagesUsed + pub fn messagesUsed(&self) -> &Arc> { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => messagesUsed, + } + } + /// Returns a borrow of the field bytesUsed + pub fn bytesUsed(&self) -> &Arc> { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => bytesUsed, + } + } + } - impl Eq - for SingleThreadedCache {} + impl Debug + for PutCacheEntryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for SingleThreadedCache { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => { - Hash::hash(entryCapacity, _state); - Hash::hash(entryPruningTailSize, _state) - }, - } - } - } + impl DafnyPrint + for PutCacheEntryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.PutCacheEntryInput.PutCacheEntryInput(")?; + DafnyPrint::fmt_print(identifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(materials, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(creationTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(expiryTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(messagesUsed, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for SingleThreadedCache { - fn default() -> SingleThreadedCache { - SingleThreadedCache::SingleThreadedCache { - entryCapacity: Default::default(), - entryPruningTailSize: Default::default() - } - } - } + impl Eq + for PutCacheEntryInput {} + + impl Hash + for PutCacheEntryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutCacheEntryInput::PutCacheEntryInput{identifier, materials, creationTime, expiryTime, messagesUsed, bytesUsed, } => { + Hash::hash(identifier, _state); + Hash::hash(materials, _state); + Hash::hash(creationTime, _state); + Hash::hash(expiryTime, _state); + Hash::hash(messagesUsed, _state); + Hash::hash(bytesUsed, _state) + }, + } + } + } - impl AsRef - for &SingleThreadedCache { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for PutCacheEntryInput { + fn default() -> PutCacheEntryInput { + PutCacheEntryInput::PutCacheEntryInput { + identifier: Default::default(), + materials: Default::default(), + creationTime: Default::default(), + expiryTime: Default::default(), + messagesUsed: Default::default(), + bytesUsed: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum StaticConfigurations { - AWS_KMS_ECDH { - AWS_KMS_ECDH: Rc - }, - RAW_ECDH { - RAW_ECDH: Rc - } - } + impl AsRef + for PutCacheEntryInput { + fn as_ref(&self) -> &Self { + self + } + } - impl StaticConfigurations { - pub fn AWS_KMS_ECDH(&self) -> &Rc { - match self { - StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => AWS_KMS_ECDH, - StaticConfigurations::RAW_ECDH{RAW_ECDH, } => panic!("field does not exist on this variant"), - } - } - pub fn RAW_ECDH(&self) -> &Rc { - match self { - StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => panic!("field does not exist on this variant"), - StaticConfigurations::RAW_ECDH{RAW_ECDH, } => RAW_ECDH, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1598,3) + #[derive(PartialEq, Clone)] + pub enum RawEcdhStaticConfigurations { + PublicKeyDiscovery { + PublicKeyDiscovery: Arc + }, + RawPrivateKeyToStaticPublicKey { + RawPrivateKeyToStaticPublicKey: Arc + }, + EphemeralPrivateKeyToStaticPublicKey { + EphemeralPrivateKeyToStaticPublicKey: Arc + } + } - impl Debug - for StaticConfigurations { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl RawEcdhStaticConfigurations { + /// Gets the field PublicKeyDiscovery for all enum members which have it + pub fn PublicKeyDiscovery(&self) -> &Arc { + match self { + RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => PublicKeyDiscovery, + RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), + RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field RawPrivateKeyToStaticPublicKey for all enum members which have it + pub fn RawPrivateKeyToStaticPublicKey(&self) -> &Arc { + match self { + RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => panic!("field does not exist on this variant"), + RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => RawPrivateKeyToStaticPublicKey, + RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field EphemeralPrivateKeyToStaticPublicKey for all enum members which have it + pub fn EphemeralPrivateKeyToStaticPublicKey(&self) -> &Arc { + match self { + RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => panic!("field does not exist on this variant"), + RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => panic!("field does not exist on this variant"), + RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => EphemeralPrivateKeyToStaticPublicKey, + } + } + } - impl DafnyPrint - for StaticConfigurations { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StaticConfigurations.AWS__KMS__ECDH(")?; - DafnyPrint::fmt_print(AWS_KMS_ECDH, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - StaticConfigurations::RAW_ECDH{RAW_ECDH, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StaticConfigurations.RAW__ECDH(")?; - DafnyPrint::fmt_print(RAW_ECDH, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for RawEcdhStaticConfigurations { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for StaticConfigurations {} + impl DafnyPrint + for RawEcdhStaticConfigurations { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.PublicKeyDiscovery(")?; + DafnyPrint::fmt_print(PublicKeyDiscovery, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.RawPrivateKeyToStaticPublicKey(")?; + DafnyPrint::fmt_print(RawPrivateKeyToStaticPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawEcdhStaticConfigurations.EphemeralPrivateKeyToStaticPublicKey(")?; + DafnyPrint::fmt_print(EphemeralPrivateKeyToStaticPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for StaticConfigurations { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => { - Hash::hash(AWS_KMS_ECDH, _state) - }, - StaticConfigurations::RAW_ECDH{RAW_ECDH, } => { - Hash::hash(RAW_ECDH, _state) - }, - } - } - } + impl Eq + for RawEcdhStaticConfigurations {} + + impl Hash + for RawEcdhStaticConfigurations { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RawEcdhStaticConfigurations::PublicKeyDiscovery{PublicKeyDiscovery, } => { + Hash::hash(PublicKeyDiscovery, _state) + }, + RawEcdhStaticConfigurations::RawPrivateKeyToStaticPublicKey{RawPrivateKeyToStaticPublicKey, } => { + Hash::hash(RawPrivateKeyToStaticPublicKey, _state) + }, + RawEcdhStaticConfigurations::EphemeralPrivateKeyToStaticPublicKey{EphemeralPrivateKeyToStaticPublicKey, } => { + Hash::hash(EphemeralPrivateKeyToStaticPublicKey, _state) + }, + } + } + } - impl Default - for StaticConfigurations { - fn default() -> StaticConfigurations { - StaticConfigurations::AWS_KMS_ECDH { - AWS_KMS_ECDH: Default::default() - } - } - } + impl Default + for RawEcdhStaticConfigurations { + fn default() -> RawEcdhStaticConfigurations { + RawEcdhStaticConfigurations::PublicKeyDiscovery { + PublicKeyDiscovery: Default::default() + } + } + } - impl AsRef - for &StaticConfigurations { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for RawEcdhStaticConfigurations { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum StormTrackingCache { - StormTrackingCache { - entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - entryPruningTailSize: Rc>, - gracePeriod: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - graceInterval: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - fanOut: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - inFlightTTL: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - sleepMilli: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, - timeUnits: Rc>> - } - } - - impl StormTrackingCache { - pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => entryCapacity, - } - } - pub fn entryPruningTailSize(&self) -> &Rc> { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => entryPruningTailSize, - } - } - pub fn gracePeriod(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => gracePeriod, - } - } - pub fn graceInterval(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => graceInterval, - } - } - pub fn fanOut(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => fanOut, - } - } - pub fn inFlightTTL(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => inFlightTTL, - } - } - pub fn sleepMilli(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => sleepMilli, - } - } - pub fn timeUnits(&self) -> &Rc>> { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => timeUnits, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1602,3) + #[derive(PartialEq, Clone)] + pub enum RawPrivateKeyToStaticPublicKeyInput { + RawPrivateKeyToStaticPublicKeyInput { + senderStaticPrivateKey: Sequence, + recipientPublicKey: Sequence + } + } - impl Debug - for StormTrackingCache { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl RawPrivateKeyToStaticPublicKeyInput { + /// Returns a borrow of the field senderStaticPrivateKey + pub fn senderStaticPrivateKey(&self) -> &Sequence { + match self { + RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => senderStaticPrivateKey, + } + } + /// Returns a borrow of the field recipientPublicKey + pub fn recipientPublicKey(&self) -> &Sequence { + match self { + RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => recipientPublicKey, + } + } + } - impl DafnyPrint - for StormTrackingCache { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StormTrackingCache.StormTrackingCache(")?; - DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(gracePeriod, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(graceInterval, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(fanOut, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(inFlightTTL, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(sleepMilli, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(timeUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for RawPrivateKeyToStaticPublicKeyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for StormTrackingCache {} + impl DafnyPrint + for RawPrivateKeyToStaticPublicKeyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.RawPrivateKeyToStaticPublicKeyInput.RawPrivateKeyToStaticPublicKeyInput(")?; + DafnyPrint::fmt_print(senderStaticPrivateKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(recipientPublicKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for StormTrackingCache { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => { - Hash::hash(entryCapacity, _state); - Hash::hash(entryPruningTailSize, _state); - Hash::hash(gracePeriod, _state); - Hash::hash(graceInterval, _state); - Hash::hash(fanOut, _state); - Hash::hash(inFlightTTL, _state); - Hash::hash(sleepMilli, _state); - Hash::hash(timeUnits, _state) - }, - } - } - } + impl Eq + for RawPrivateKeyToStaticPublicKeyInput {} + + impl Hash + for RawPrivateKeyToStaticPublicKeyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput{senderStaticPrivateKey, recipientPublicKey, } => { + Hash::hash(senderStaticPrivateKey, _state); + Hash::hash(recipientPublicKey, _state) + }, + } + } + } - impl Default - for StormTrackingCache { - fn default() -> StormTrackingCache { - StormTrackingCache::StormTrackingCache { - entryCapacity: Default::default(), - entryPruningTailSize: Default::default(), - gracePeriod: Default::default(), - graceInterval: Default::default(), - fanOut: Default::default(), - inFlightTTL: Default::default(), - sleepMilli: Default::default(), - timeUnits: Default::default() - } - } - } - - impl AsRef - for &StormTrackingCache { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for RawPrivateKeyToStaticPublicKeyInput { + fn default() -> RawPrivateKeyToStaticPublicKeyInput { + RawPrivateKeyToStaticPublicKeyInput::RawPrivateKeyToStaticPublicKeyInput { + senderStaticPrivateKey: Default::default(), + recipientPublicKey: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum SymmetricSignatureAlgorithm { - HMAC { - HMAC: Rc - }, - None { - _None: Rc - } - } + impl AsRef + for RawPrivateKeyToStaticPublicKeyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl SymmetricSignatureAlgorithm { - pub fn HMAC(&self) -> &Rc { - match self { - SymmetricSignatureAlgorithm::HMAC{HMAC, } => HMAC, - SymmetricSignatureAlgorithm::None{_None, } => panic!("field does not exist on this variant"), - } - } - pub fn _None(&self) -> &Rc { - match self { - SymmetricSignatureAlgorithm::HMAC{HMAC, } => panic!("field does not exist on this variant"), - SymmetricSignatureAlgorithm::None{_None, } => _None, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1609,3) + #[derive(PartialEq, Clone)] + pub enum SignatureAlgorithm { + ECDSA { + ECDSA: Arc + }, + None { + _None: Arc + } + } - impl Debug - for SymmetricSignatureAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl SignatureAlgorithm { + /// Gets the field ECDSA for all enum members which have it + pub fn ECDSA(&self) -> &Arc { + match self { + SignatureAlgorithm::ECDSA{ECDSA, } => ECDSA, + SignatureAlgorithm::None{_None, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field _None for all enum members which have it + pub fn _None(&self) -> &Arc { + match self { + SignatureAlgorithm::ECDSA{ECDSA, } => panic!("field does not exist on this variant"), + SignatureAlgorithm::None{_None, } => _None, + } + } + } - impl DafnyPrint - for SymmetricSignatureAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SymmetricSignatureAlgorithm::HMAC{HMAC, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SymmetricSignatureAlgorithm.HMAC(")?; - DafnyPrint::fmt_print(HMAC, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - SymmetricSignatureAlgorithm::None{_None, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SymmetricSignatureAlgorithm.None(")?; - DafnyPrint::fmt_print(_None, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for SignatureAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for SymmetricSignatureAlgorithm {} + impl DafnyPrint + for SignatureAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SignatureAlgorithm::ECDSA{ECDSA, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SignatureAlgorithm.ECDSA(")?; + DafnyPrint::fmt_print(ECDSA, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + SignatureAlgorithm::None{_None, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SignatureAlgorithm.None(")?; + DafnyPrint::fmt_print(_None, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for SymmetricSignatureAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SymmetricSignatureAlgorithm::HMAC{HMAC, } => { - Hash::hash(HMAC, _state) - }, - SymmetricSignatureAlgorithm::None{_None, } => { - Hash::hash(_None, _state) - }, - } - } - } + impl Eq + for SignatureAlgorithm {} + + impl Hash + for SignatureAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SignatureAlgorithm::ECDSA{ECDSA, } => { + Hash::hash(ECDSA, _state) + }, + SignatureAlgorithm::None{_None, } => { + Hash::hash(_None, _state) + }, + } + } + } - impl Default - for SymmetricSignatureAlgorithm { - fn default() -> SymmetricSignatureAlgorithm { - SymmetricSignatureAlgorithm::HMAC { - HMAC: Default::default() - } - } - } + impl Default + for SignatureAlgorithm { + fn default() -> SignatureAlgorithm { + SignatureAlgorithm::ECDSA { + ECDSA: Default::default() + } + } + } - impl AsRef - for &SymmetricSignatureAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for SignatureAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum TimeUnits { - Seconds {}, - Milliseconds {} - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1612,3) + #[derive(PartialEq, Clone)] + pub enum SingleThreadedCache { + SingleThreadedCache { + entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + entryPruningTailSize: Arc> + } + } - impl TimeUnits {} + impl SingleThreadedCache { + /// Returns a borrow of the field entryCapacity + pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => entryCapacity, + } + } + /// Returns a borrow of the field entryPruningTailSize + pub fn entryPruningTailSize(&self) -> &Arc> { + match self { + SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => entryPruningTailSize, + } + } + } - impl Debug - for TimeUnits { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for SingleThreadedCache { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for TimeUnits { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TimeUnits::Seconds{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.TimeUnits.Seconds")?; - Ok(()) - }, - TimeUnits::Milliseconds{} => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.TimeUnits.Milliseconds")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for SingleThreadedCache { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SingleThreadedCache.SingleThreadedCache(")?; + DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl TimeUnits { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(TimeUnits::Seconds {}), Rc::new(TimeUnits::Milliseconds {})].iter() - } - } + impl Eq + for SingleThreadedCache {} + + impl Hash + for SingleThreadedCache { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SingleThreadedCache::SingleThreadedCache{entryCapacity, entryPruningTailSize, } => { + Hash::hash(entryCapacity, _state); + Hash::hash(entryPruningTailSize, _state) + }, + } + } + } - impl Eq - for TimeUnits {} + impl Default + for SingleThreadedCache { + fn default() -> SingleThreadedCache { + SingleThreadedCache::SingleThreadedCache { + entryCapacity: Default::default(), + entryPruningTailSize: Default::default() + } + } + } - impl Hash - for TimeUnits { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TimeUnits::Seconds{} => { + impl AsRef + for SingleThreadedCache { + fn as_ref(&self) -> &Self { + self + } + } - }, - TimeUnits::Milliseconds{} => { + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1616,3) + #[derive(PartialEq, Clone)] + pub enum StaticConfigurations { + AWS_KMS_ECDH { + AWS_KMS_ECDH: Arc + }, + RAW_ECDH { + RAW_ECDH: Arc + } + } - }, - } - } - } + impl StaticConfigurations { + /// Gets the field AWS_KMS_ECDH for all enum members which have it + pub fn AWS_KMS_ECDH(&self) -> &Arc { + match self { + StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => AWS_KMS_ECDH, + StaticConfigurations::RAW_ECDH{RAW_ECDH, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field RAW_ECDH for all enum members which have it + pub fn RAW_ECDH(&self) -> &Arc { + match self { + StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => panic!("field does not exist on this variant"), + StaticConfigurations::RAW_ECDH{RAW_ECDH, } => RAW_ECDH, + } + } + } - impl Default - for TimeUnits { - fn default() -> TimeUnits { - TimeUnits::Seconds {} - } - } + impl Debug + for StaticConfigurations { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &TimeUnits { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for StaticConfigurations { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StaticConfigurations.AWS__KMS__ECDH(")?; + DafnyPrint::fmt_print(AWS_KMS_ECDH, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + StaticConfigurations::RAW_ECDH{RAW_ECDH, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StaticConfigurations.RAW__ECDH(")?; + DafnyPrint::fmt_print(RAW_ECDH, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateUsageMetadataInput { - UpdateUsageMetadataInput { - identifier: Sequence, - bytesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger - } - } + impl Eq + for StaticConfigurations {} + + impl Hash + for StaticConfigurations { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StaticConfigurations::AWS_KMS_ECDH{AWS_KMS_ECDH, } => { + Hash::hash(AWS_KMS_ECDH, _state) + }, + StaticConfigurations::RAW_ECDH{RAW_ECDH, } => { + Hash::hash(RAW_ECDH, _state) + }, + } + } + } - impl UpdateUsageMetadataInput { - pub fn identifier(&self) -> &Sequence { - match self { - UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => identifier, - } - } - pub fn bytesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { - match self { - UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => bytesUsed, - } - } - } + impl Default + for StaticConfigurations { + fn default() -> StaticConfigurations { + StaticConfigurations::AWS_KMS_ECDH { + AWS_KMS_ECDH: Default::default() + } + } + } - impl Debug - for UpdateUsageMetadataInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for StaticConfigurations { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for UpdateUsageMetadataInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.UpdateUsageMetadataInput.UpdateUsageMetadataInput(")?; - DafnyPrint::fmt_print(identifier, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1619,3) + #[derive(PartialEq, Clone)] + pub enum StormTrackingCache { + StormTrackingCache { + entryCapacity: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + entryPruningTailSize: Arc>, + gracePeriod: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + graceInterval: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + fanOut: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + inFlightTTL: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + sleepMilli: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber, + timeUnits: Arc>> + } + } - impl Eq - for UpdateUsageMetadataInput {} + impl StormTrackingCache { + /// Returns a borrow of the field entryCapacity + pub fn entryCapacity(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => entryCapacity, + } + } + /// Returns a borrow of the field entryPruningTailSize + pub fn entryPruningTailSize(&self) -> &Arc> { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => entryPruningTailSize, + } + } + /// Returns a borrow of the field gracePeriod + pub fn gracePeriod(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => gracePeriod, + } + } + /// Returns a borrow of the field graceInterval + pub fn graceInterval(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => graceInterval, + } + } + /// Returns a borrow of the field fanOut + pub fn fanOut(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => fanOut, + } + } + /// Returns a borrow of the field inFlightTTL + pub fn inFlightTTL(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => inFlightTTL, + } + } + /// Returns a borrow of the field sleepMilli + pub fn sleepMilli(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CountingNumber { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => sleepMilli, + } + } + /// Returns a borrow of the field timeUnits + pub fn timeUnits(&self) -> &Arc>> { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => timeUnits, + } + } + } - impl Hash - for UpdateUsageMetadataInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => { - Hash::hash(identifier, _state); - Hash::hash(bytesUsed, _state) - }, - } - } - } + impl Debug + for StormTrackingCache { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for UpdateUsageMetadataInput { - fn default() -> UpdateUsageMetadataInput { - UpdateUsageMetadataInput::UpdateUsageMetadataInput { - identifier: Default::default(), - bytesUsed: Default::default() - } - } - } + impl DafnyPrint + for StormTrackingCache { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.StormTrackingCache.StormTrackingCache(")?; + DafnyPrint::fmt_print(entryCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(entryPruningTailSize, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(gracePeriod, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(graceInterval, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(fanOut, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(inFlightTTL, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(sleepMilli, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(timeUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &UpdateUsageMetadataInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for StormTrackingCache {} + + impl Hash + for StormTrackingCache { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StormTrackingCache::StormTrackingCache{entryCapacity, entryPruningTailSize, gracePeriod, graceInterval, fanOut, inFlightTTL, sleepMilli, timeUnits, } => { + Hash::hash(entryCapacity, _state); + Hash::hash(entryPruningTailSize, _state); + Hash::hash(gracePeriod, _state); + Hash::hash(graceInterval, _state); + Hash::hash(fanOut, _state); + Hash::hash(inFlightTTL, _state); + Hash::hash(sleepMilli, _state); + Hash::hash(timeUnits, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ValidateCommitmentPolicyOnDecryptInput { - ValidateCommitmentPolicyOnDecryptInput { - algorithm: Rc, - commitmentPolicy: Rc - } - } + impl Default + for StormTrackingCache { + fn default() -> StormTrackingCache { + StormTrackingCache::StormTrackingCache { + entryCapacity: Default::default(), + entryPruningTailSize: Default::default(), + gracePeriod: Default::default(), + graceInterval: Default::default(), + fanOut: Default::default(), + inFlightTTL: Default::default(), + sleepMilli: Default::default(), + timeUnits: Default::default() + } + } + } - impl ValidateCommitmentPolicyOnDecryptInput { - pub fn algorithm(&self) -> &Rc { - match self { - ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => algorithm, - } - } - pub fn commitmentPolicy(&self) -> &Rc { - match self { - ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => commitmentPolicy, - } - } - } + impl AsRef + for StormTrackingCache { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ValidateCommitmentPolicyOnDecryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1629,3) + #[derive(PartialEq, Clone)] + pub enum SymmetricSignatureAlgorithm { + HMAC { + HMAC: Arc + }, + None { + _None: Arc + } + } - impl DafnyPrint - for ValidateCommitmentPolicyOnDecryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidateCommitmentPolicyOnDecryptInput.ValidateCommitmentPolicyOnDecryptInput(")?; - DafnyPrint::fmt_print(algorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl SymmetricSignatureAlgorithm { + /// Gets the field HMAC for all enum members which have it + pub fn HMAC(&self) -> &Arc { + match self { + SymmetricSignatureAlgorithm::HMAC{HMAC, } => HMAC, + SymmetricSignatureAlgorithm::None{_None, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field _None for all enum members which have it + pub fn _None(&self) -> &Arc { + match self { + SymmetricSignatureAlgorithm::HMAC{HMAC, } => panic!("field does not exist on this variant"), + SymmetricSignatureAlgorithm::None{_None, } => _None, + } + } + } - impl Eq - for ValidateCommitmentPolicyOnDecryptInput {} + impl Debug + for SymmetricSignatureAlgorithm { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ValidateCommitmentPolicyOnDecryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => { - Hash::hash(algorithm, _state); - Hash::hash(commitmentPolicy, _state) - }, - } - } - } + impl DafnyPrint + for SymmetricSignatureAlgorithm { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SymmetricSignatureAlgorithm::HMAC{HMAC, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SymmetricSignatureAlgorithm.HMAC(")?; + DafnyPrint::fmt_print(HMAC, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + SymmetricSignatureAlgorithm::None{_None, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.SymmetricSignatureAlgorithm.None(")?; + DafnyPrint::fmt_print(_None, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ValidateCommitmentPolicyOnDecryptInput { - fn default() -> ValidateCommitmentPolicyOnDecryptInput { - ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput { - algorithm: Default::default(), - commitmentPolicy: Default::default() - } - } - } + impl Eq + for SymmetricSignatureAlgorithm {} + + impl Hash + for SymmetricSignatureAlgorithm { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SymmetricSignatureAlgorithm::HMAC{HMAC, } => { + Hash::hash(HMAC, _state) + }, + SymmetricSignatureAlgorithm::None{_None, } => { + Hash::hash(_None, _state) + }, + } + } + } - impl AsRef - for &ValidateCommitmentPolicyOnDecryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for SymmetricSignatureAlgorithm { + fn default() -> SymmetricSignatureAlgorithm { + SymmetricSignatureAlgorithm::HMAC { + HMAC: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ValidateCommitmentPolicyOnEncryptInput { - ValidateCommitmentPolicyOnEncryptInput { - algorithm: Rc, - commitmentPolicy: Rc - } - } + impl AsRef + for SymmetricSignatureAlgorithm { + fn as_ref(&self) -> &Self { + self + } + } - impl ValidateCommitmentPolicyOnEncryptInput { - pub fn algorithm(&self) -> &Rc { - match self { - ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => algorithm, - } - } - pub fn commitmentPolicy(&self) -> &Rc { - match self { - ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => commitmentPolicy, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1633,3) + #[derive(PartialEq, Clone)] + pub enum TimeUnits { + Seconds {}, + Milliseconds {} + } - impl Debug - for ValidateCommitmentPolicyOnEncryptInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl TimeUnits {} - impl DafnyPrint - for ValidateCommitmentPolicyOnEncryptInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidateCommitmentPolicyOnEncryptInput.ValidateCommitmentPolicyOnEncryptInput(")?; - DafnyPrint::fmt_print(algorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for TimeUnits { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ValidateCommitmentPolicyOnEncryptInput {} + impl DafnyPrint + for TimeUnits { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TimeUnits::Seconds{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.TimeUnits.Seconds")?; + Ok(()) + }, + TimeUnits::Milliseconds{} => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.TimeUnits.Milliseconds")?; + Ok(()) + }, + } + } + } - impl Hash - for ValidateCommitmentPolicyOnEncryptInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => { - Hash::hash(algorithm, _state); - Hash::hash(commitmentPolicy, _state) - }, - } - } - } + impl TimeUnits { + /// Enumerates all possible values of TimeUnits + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(TimeUnits::Seconds {}), Arc::new(TimeUnits::Milliseconds {})].iter() + } + } - impl Default - for ValidateCommitmentPolicyOnEncryptInput { - fn default() -> ValidateCommitmentPolicyOnEncryptInput { - ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput { - algorithm: Default::default(), - commitmentPolicy: Default::default() - } - } - } + impl Eq + for TimeUnits {} - impl AsRef - for &ValidateCommitmentPolicyOnEncryptInput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for TimeUnits { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TimeUnits::Seconds{} => { - #[derive(PartialEq, Clone)] - pub enum ValidDecryptionMaterialsTransitionInput { - ValidDecryptionMaterialsTransitionInput { - start: Rc, - stop: Rc - } - } + }, + TimeUnits::Milliseconds{} => { - impl ValidDecryptionMaterialsTransitionInput { - pub fn start(&self) -> &Rc { - match self { - ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => start, - } - } - pub fn stop(&self) -> &Rc { - match self { - ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => stop, - } - } - } + }, + } + } + } - impl Debug - for ValidDecryptionMaterialsTransitionInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for TimeUnits { + fn default() -> TimeUnits { + TimeUnits::Seconds {} + } + } - impl DafnyPrint - for ValidDecryptionMaterialsTransitionInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidDecryptionMaterialsTransitionInput.ValidDecryptionMaterialsTransitionInput(")?; - DafnyPrint::fmt_print(start, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(stop, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for TimeUnits { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ValidDecryptionMaterialsTransitionInput {} + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1636,3) + #[derive(PartialEq, Clone)] + pub enum UpdateUsageMetadataInput { + UpdateUsageMetadataInput { + identifier: Sequence, + bytesUsed: crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger + } + } - impl Hash - for ValidDecryptionMaterialsTransitionInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => { - Hash::hash(start, _state); - Hash::hash(stop, _state) - }, - } - } - } + impl UpdateUsageMetadataInput { + /// Returns a borrow of the field identifier + pub fn identifier(&self) -> &Sequence { + match self { + UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => identifier, + } + } + /// Returns a borrow of the field bytesUsed + pub fn bytesUsed(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::PositiveInteger { + match self { + UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => bytesUsed, + } + } + } - impl Default - for ValidDecryptionMaterialsTransitionInput { - fn default() -> ValidDecryptionMaterialsTransitionInput { - ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput { - start: Default::default(), - stop: Default::default() - } - } - } + impl Debug + for UpdateUsageMetadataInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ValidDecryptionMaterialsTransitionInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for UpdateUsageMetadataInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.UpdateUsageMetadataInput.UpdateUsageMetadataInput(")?; + DafnyPrint::fmt_print(identifier, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(bytesUsed, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ValidEncryptionMaterialsTransitionInput { - ValidEncryptionMaterialsTransitionInput { - start: Rc, - stop: Rc - } - } + impl Eq + for UpdateUsageMetadataInput {} + + impl Hash + for UpdateUsageMetadataInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateUsageMetadataInput::UpdateUsageMetadataInput{identifier, bytesUsed, } => { + Hash::hash(identifier, _state); + Hash::hash(bytesUsed, _state) + }, + } + } + } - impl ValidEncryptionMaterialsTransitionInput { - pub fn start(&self) -> &Rc { - match self { - ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => start, - } - } - pub fn stop(&self) -> &Rc { - match self { - ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => stop, - } - } - } + impl Default + for UpdateUsageMetadataInput { + fn default() -> UpdateUsageMetadataInput { + UpdateUsageMetadataInput::UpdateUsageMetadataInput { + identifier: Default::default(), + bytesUsed: Default::default() + } + } + } - impl Debug - for ValidEncryptionMaterialsTransitionInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UpdateUsageMetadataInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ValidEncryptionMaterialsTransitionInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidEncryptionMaterialsTransitionInput.ValidEncryptionMaterialsTransitionInput(")?; - DafnyPrint::fmt_print(start, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(stop, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1641,3) + #[derive(PartialEq, Clone)] + pub enum ValidateCommitmentPolicyOnDecryptInput { + ValidateCommitmentPolicyOnDecryptInput { + algorithm: Arc, + commitmentPolicy: Arc + } + } - impl Eq - for ValidEncryptionMaterialsTransitionInput {} + impl ValidateCommitmentPolicyOnDecryptInput { + /// Returns a borrow of the field algorithm + pub fn algorithm(&self) -> &Arc { + match self { + ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => algorithm, + } + } + /// Returns a borrow of the field commitmentPolicy + pub fn commitmentPolicy(&self) -> &Arc { + match self { + ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => commitmentPolicy, + } + } + } - impl Hash - for ValidEncryptionMaterialsTransitionInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => { - Hash::hash(start, _state); - Hash::hash(stop, _state) - }, - } - } - } + impl Debug + for ValidateCommitmentPolicyOnDecryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ValidEncryptionMaterialsTransitionInput { - fn default() -> ValidEncryptionMaterialsTransitionInput { - ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput { - start: Default::default(), - stop: Default::default() - } - } - } + impl DafnyPrint + for ValidateCommitmentPolicyOnDecryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidateCommitmentPolicyOnDecryptInput.ValidateCommitmentPolicyOnDecryptInput(")?; + DafnyPrint::fmt_print(algorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ValidEncryptionMaterialsTransitionInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ValidateCommitmentPolicyOnDecryptInput {} + + impl Hash + for ValidateCommitmentPolicyOnDecryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput{algorithm, commitmentPolicy, } => { + Hash::hash(algorithm, _state); + Hash::hash(commitmentPolicy, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - AwsCryptographicMaterialProvidersException { - message: Sequence - }, - EntryAlreadyExists { - message: Sequence - }, - EntryDoesNotExist { - message: Sequence - }, - InFlightTTLExceeded { - message: Sequence - }, - InvalidAlgorithmSuiteInfo { - message: Sequence - }, - InvalidAlgorithmSuiteInfoOnDecrypt { - message: Sequence - }, - InvalidAlgorithmSuiteInfoOnEncrypt { - message: Sequence - }, - InvalidDecryptionMaterials { - message: Sequence - }, - InvalidDecryptionMaterialsTransition { - message: Sequence - }, - InvalidEncryptionMaterials { - message: Sequence - }, - InvalidEncryptionMaterialsTransition { - message: Sequence - }, - AwsCryptographyKeyStore { - AwsCryptographyKeyStore: Rc - }, - AwsCryptographyPrimitives { - AwsCryptographyPrimitives: Rc - }, - ComAmazonawsDynamodb { - ComAmazonawsDynamodb: Rc - }, - ComAmazonawsKms { - ComAmazonawsKms: Rc - }, - CollectionOfErrors { - list: Sequence>, - message: Sequence - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Sequence { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => message, - Error::EntryAlreadyExists{message, } => message, - Error::EntryDoesNotExist{message, } => message, - Error::InFlightTTLExceeded{message, } => message, - Error::InvalidAlgorithmSuiteInfo{message, } => message, - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => message, - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => message, - Error::InvalidDecryptionMaterials{message, } => message, - Error::InvalidDecryptionMaterialsTransition{message, } => message, - Error::InvalidEncryptionMaterials{message, } => message, - Error::InvalidEncryptionMaterialsTransition{message, } => message, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyKeyStore(&self) -> &Rc { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => AwsCryptographyKeyStore, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn AwsCryptographyPrimitives(&self) -> &Rc { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsDynamodb(&self) -> &Rc { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn ComAmazonawsKms(&self) -> &Rc { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => ComAmazonawsKms, - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn list(&self) -> &Sequence> { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => list, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), - Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), - Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), - Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), - Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), - Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), - Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } + impl Default + for ValidateCommitmentPolicyOnDecryptInput { + fn default() -> ValidateCommitmentPolicyOnDecryptInput { + ValidateCommitmentPolicyOnDecryptInput::ValidateCommitmentPolicyOnDecryptInput { + algorithm: Default::default(), + commitmentPolicy: Default::default() + } + } + } - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ValidateCommitmentPolicyOnDecryptInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographicMaterialProvidersException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::EntryAlreadyExists{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.EntryAlreadyExists(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::EntryDoesNotExist{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.EntryDoesNotExist(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InFlightTTLExceeded{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InFlightTTLExceeded(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidAlgorithmSuiteInfo{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfo(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfoOnDecrypt(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfoOnEncrypt(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidDecryptionMaterials{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidDecryptionMaterials(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidDecryptionMaterialsTransition{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidDecryptionMaterialsTransition(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidEncryptionMaterials{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidEncryptionMaterials(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidEncryptionMaterialsTransition{message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidEncryptionMaterialsTransition(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographyKeyStore(")?; - DafnyPrint::fmt_print(AwsCryptographyKeyStore, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographyPrimitives(")?; - DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.ComAmazonawsDynamodb(")?; - DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ComAmazonawsKms{ComAmazonawsKms, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.ComAmazonawsKms(")?; - DafnyPrint::fmt_print(ComAmazonawsKms, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CollectionOfErrors{list, message, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.CollectionOfErrors(")?; - DafnyPrint::fmt_print(list, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1645,3) + #[derive(PartialEq, Clone)] + pub enum ValidateCommitmentPolicyOnEncryptInput { + ValidateCommitmentPolicyOnEncryptInput { + algorithm: Arc, + commitmentPolicy: Arc + } + } - impl Eq - for Error {} + impl ValidateCommitmentPolicyOnEncryptInput { + /// Returns a borrow of the field algorithm + pub fn algorithm(&self) -> &Arc { + match self { + ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => algorithm, + } + } + /// Returns a borrow of the field commitmentPolicy + pub fn commitmentPolicy(&self) -> &Arc { + match self { + ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => commitmentPolicy, + } + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::AwsCryptographicMaterialProvidersException{message, } => { - Hash::hash(message, _state) - }, - Error::EntryAlreadyExists{message, } => { - Hash::hash(message, _state) - }, - Error::EntryDoesNotExist{message, } => { - Hash::hash(message, _state) - }, - Error::InFlightTTLExceeded{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidAlgorithmSuiteInfo{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidDecryptionMaterials{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidDecryptionMaterialsTransition{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidEncryptionMaterials{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidEncryptionMaterialsTransition{message, } => { - Hash::hash(message, _state) - }, - Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { - Hash::hash(AwsCryptographyKeyStore, _state) - }, - Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { - Hash::hash(AwsCryptographyPrimitives, _state) - }, - Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { - Hash::hash(ComAmazonawsDynamodb, _state) - }, - Error::ComAmazonawsKms{ComAmazonawsKms, } => { - Hash::hash(ComAmazonawsKms, _state) - }, - Error::CollectionOfErrors{list, message, } => { - Hash::hash(list, _state); - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl Debug + for ValidateCommitmentPolicyOnEncryptInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for Error { - fn default() -> Error { - Error::AwsCryptographicMaterialProvidersException { - message: Default::default() - } - } - } + impl DafnyPrint + for ValidateCommitmentPolicyOnEncryptInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidateCommitmentPolicyOnEncryptInput.ValidateCommitmentPolicyOnEncryptInput(")?; + DafnyPrint::fmt_print(algorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(commitmentPolicy, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ValidateCommitmentPolicyOnEncryptInput {} + + impl Hash + for ValidateCommitmentPolicyOnEncryptInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput{algorithm, commitmentPolicy, } => { + Hash::hash(algorithm, _state); + Hash::hash(commitmentPolicy, _state) + }, + } + } + } - pub type OpaqueError = Rc; + impl Default + for ValidateCommitmentPolicyOnEncryptInput { + fn default() -> ValidateCommitmentPolicyOnEncryptInput { + ValidateCommitmentPolicyOnEncryptInput::ValidateCommitmentPolicyOnEncryptInput { + algorithm: Default::default(), + commitmentPolicy: Default::default() + } + } + } - pub type DummySubsetType = DafnyInt; + impl AsRef + for ValidateCommitmentPolicyOnEncryptInput { + fn as_ref(&self) -> &Self { + self + } + } - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1649,3) + #[derive(PartialEq, Clone)] + pub enum ValidDecryptionMaterialsTransitionInput { + ValidDecryptionMaterialsTransitionInput { + start: Arc, + stop: Arc + } + } - pub mod services { - pub mod dynamodb { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::Error; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; + impl ValidDecryptionMaterialsTransitionInput { + /// Returns a borrow of the field start + pub fn start(&self) -> &Arc { + match self { + ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => start, + } + } + /// Returns a borrow of the field stop + pub fn stop(&self) -> &Arc { + match self { + ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => stop, + } + } + } - pub struct _default {} + impl Debug + for ValidDecryptionMaterialsTransitionInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl _default { - pub fn DefaultDynamoDBClientConfigType() -> Rc { - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::DynamoDBClientConfigType::DynamoDBClientConfigType {}) - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: error.clone() - }) - } - } + impl DafnyPrint + for ValidDecryptionMaterialsTransitionInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidDecryptionMaterialsTransitionInput.ValidDecryptionMaterialsTransitionInput(")?; + DafnyPrint::fmt_print(start, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(stop, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DynamoDBClientConfigType { - DynamoDBClientConfigType {} - } + impl Eq + for ValidDecryptionMaterialsTransitionInput {} + + impl Hash + for ValidDecryptionMaterialsTransitionInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput{start, stop, } => { + Hash::hash(start, _state); + Hash::hash(stop, _state) + }, + } + } + } + + impl Default + for ValidDecryptionMaterialsTransitionInput { + fn default() -> ValidDecryptionMaterialsTransitionInput { + ValidDecryptionMaterialsTransitionInput::ValidDecryptionMaterialsTransitionInput { + start: Default::default(), + stop: Default::default() + } + } + } - impl DynamoDBClientConfigType {} + impl AsRef + for ValidDecryptionMaterialsTransitionInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for DynamoDBClientConfigType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1653,3) + #[derive(PartialEq, Clone)] + pub enum ValidEncryptionMaterialsTransitionInput { + ValidEncryptionMaterialsTransitionInput { + start: Arc, + stop: Arc + } + } - impl DafnyPrint - for DynamoDBClientConfigType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DynamoDBClientConfigType::DynamoDBClientConfigType{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.DynamoDBClientConfigType.DynamoDBClientConfigType")?; - Ok(()) - }, - } - } - } + impl ValidEncryptionMaterialsTransitionInput { + /// Returns a borrow of the field start + pub fn start(&self) -> &Arc { + match self { + ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => start, + } + } + /// Returns a borrow of the field stop + pub fn stop(&self) -> &Arc { + match self { + ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => stop, + } + } + } - impl DynamoDBClientConfigType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DynamoDBClientConfigType::DynamoDBClientConfigType {})].iter() - } - } + impl Debug + for ValidEncryptionMaterialsTransitionInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DynamoDBClientConfigType {} + impl DafnyPrint + for ValidEncryptionMaterialsTransitionInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.ValidEncryptionMaterialsTransitionInput.ValidEncryptionMaterialsTransitionInput(")?; + DafnyPrint::fmt_print(start, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(stop, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DynamoDBClientConfigType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DynamoDBClientConfigType::DynamoDBClientConfigType{} => { + impl Eq + for ValidEncryptionMaterialsTransitionInput {} + + impl Hash + for ValidEncryptionMaterialsTransitionInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput{start, stop, } => { + Hash::hash(start, _state); + Hash::hash(stop, _state) + }, + } + } + } + + impl Default + for ValidEncryptionMaterialsTransitionInput { + fn default() -> ValidEncryptionMaterialsTransitionInput { + ValidEncryptionMaterialsTransitionInput::ValidEncryptionMaterialsTransitionInput { + start: Default::default(), + stop: Default::default() + } + } + } + + impl AsRef + for ValidEncryptionMaterialsTransitionInput { + fn as_ref(&self) -> &Self { + self + } + } + + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1657,3) + #[derive(PartialEq, Clone)] + pub enum Error { + AwsCryptographicMaterialProvidersException { + message: Sequence + }, + EntryAlreadyExists { + message: Sequence + }, + EntryDoesNotExist { + message: Sequence + }, + InFlightTTLExceeded { + message: Sequence + }, + InvalidAlgorithmSuiteInfo { + message: Sequence + }, + InvalidAlgorithmSuiteInfoOnDecrypt { + message: Sequence + }, + InvalidAlgorithmSuiteInfoOnEncrypt { + message: Sequence + }, + InvalidDecryptionMaterials { + message: Sequence + }, + InvalidDecryptionMaterialsTransition { + message: Sequence + }, + InvalidEncryptionMaterials { + message: Sequence + }, + InvalidEncryptionMaterialsTransition { + message: Sequence + }, + AwsCryptographyKeyStore { + AwsCryptographyKeyStore: Arc + }, + AwsCryptographyPrimitives { + AwsCryptographyPrimitives: Arc + }, + ComAmazonawsDynamodb { + ComAmazonawsDynamodb: Arc + }, + ComAmazonawsKms { + ComAmazonawsKms: Arc + }, + CollectionOfErrors { + list: Sequence>, + message: Sequence + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } + + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Sequence { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => message, + Error::EntryAlreadyExists{message, } => message, + Error::EntryDoesNotExist{message, } => message, + Error::InFlightTTLExceeded{message, } => message, + Error::InvalidAlgorithmSuiteInfo{message, } => message, + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => message, + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => message, + Error::InvalidDecryptionMaterials{message, } => message, + Error::InvalidDecryptionMaterialsTransition{message, } => message, + Error::InvalidEncryptionMaterials{message, } => message, + Error::InvalidEncryptionMaterialsTransition{message, } => message, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyKeyStore for all enum members which have it + pub fn AwsCryptographyKeyStore(&self) -> &Arc { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => AwsCryptographyKeyStore, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field AwsCryptographyPrimitives for all enum members which have it + pub fn AwsCryptographyPrimitives(&self) -> &Arc { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => AwsCryptographyPrimitives, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsDynamodb for all enum members which have it + pub fn ComAmazonawsDynamodb(&self) -> &Arc { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => ComAmazonawsDynamodb, + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field ComAmazonawsKms for all enum members which have it + pub fn ComAmazonawsKms(&self) -> &Arc { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => ComAmazonawsKms, + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field list for all enum members which have it + pub fn list(&self) -> &Sequence> { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => list, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => panic!("field does not exist on this variant"), + Error::EntryAlreadyExists{message, } => panic!("field does not exist on this variant"), + Error::EntryDoesNotExist{message, } => panic!("field does not exist on this variant"), + Error::InFlightTTLExceeded{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfo{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidDecryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterials{message, } => panic!("field does not exist on this variant"), + Error::InvalidEncryptionMaterialsTransition{message, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => panic!("field does not exist on this variant"), + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => panic!("field does not exist on this variant"), + Error::ComAmazonawsKms{ComAmazonawsKms, } => panic!("field does not exist on this variant"), + Error::CollectionOfErrors{list, message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } + + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } + + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographicMaterialProvidersException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::EntryAlreadyExists{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.EntryAlreadyExists(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::EntryDoesNotExist{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.EntryDoesNotExist(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InFlightTTLExceeded{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InFlightTTLExceeded(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidAlgorithmSuiteInfo{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfo(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfoOnDecrypt(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidAlgorithmSuiteInfoOnEncrypt(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidDecryptionMaterials{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidDecryptionMaterials(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidDecryptionMaterialsTransition{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidDecryptionMaterialsTransition(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidEncryptionMaterials{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidEncryptionMaterials(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidEncryptionMaterialsTransition{message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.InvalidEncryptionMaterialsTransition(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographyKeyStore(")?; + DafnyPrint::fmt_print(AwsCryptographyKeyStore, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.AwsCryptographyPrimitives(")?; + DafnyPrint::fmt_print(AwsCryptographyPrimitives, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.ComAmazonawsDynamodb(")?; + DafnyPrint::fmt_print(ComAmazonawsDynamodb, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ComAmazonawsKms{ComAmazonawsKms, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.ComAmazonawsKms(")?; + DafnyPrint::fmt_print(ComAmazonawsKms, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::CollectionOfErrors{list, message, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.CollectionOfErrors(")?; + DafnyPrint::fmt_print(list, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.materialproviders.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } + + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::AwsCryptographicMaterialProvidersException{message, } => { + Hash::hash(message, _state) + }, + Error::EntryAlreadyExists{message, } => { + Hash::hash(message, _state) + }, + Error::EntryDoesNotExist{message, } => { + Hash::hash(message, _state) + }, + Error::InFlightTTLExceeded{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidAlgorithmSuiteInfo{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidAlgorithmSuiteInfoOnDecrypt{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidAlgorithmSuiteInfoOnEncrypt{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidDecryptionMaterials{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidDecryptionMaterialsTransition{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidEncryptionMaterials{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidEncryptionMaterialsTransition{message, } => { + Hash::hash(message, _state) + }, + Error::AwsCryptographyKeyStore{AwsCryptographyKeyStore, } => { + Hash::hash(AwsCryptographyKeyStore, _state) + }, + Error::AwsCryptographyPrimitives{AwsCryptographyPrimitives, } => { + Hash::hash(AwsCryptographyPrimitives, _state) + }, + Error::ComAmazonawsDynamodb{ComAmazonawsDynamodb, } => { + Hash::hash(ComAmazonawsDynamodb, _state) + }, + Error::ComAmazonawsKms{ComAmazonawsKms, } => { + Hash::hash(ComAmazonawsKms, _state) + }, + Error::CollectionOfErrors{list, message, } => { + Hash::hash(list, _state); + Hash::hash(message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } + + impl Default + for Error { + fn default() -> Error { + Error::AwsCryptographicMaterialProvidersException { + message: Default::default() + } + } + } + + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } + + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1725,3) + pub type OpaqueError = Arc; + + /// ../submodules/MaterialProviders/AwsCryptographicMaterialProviders/dafny/AwsCryptographicMaterialProviders/Model/AwsCryptographyMaterialProvidersTypes.dfy(1728,3) + pub type DummySubsetType = DafnyInt; - }, + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } } - } } - impl Default - for DynamoDBClientConfigType { - fn default() -> DynamoDBClientConfigType { - DynamoDBClientConfigType::DynamoDBClientConfigType {} - } - } + pub mod services { + pub mod dynamodb { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/src/Index.dfy(6,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::Error; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/src/Index.dfy(8,3) + pub fn DefaultDynamoDBClientConfigType() -> Arc { + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::DynamoDBClientConfigType::DynamoDBClientConfigType {}) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2933,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, Arc>::Success { + value: client.clone() + }) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2936,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl AsRef - for &DynamoDBClientConfigType { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2923,3) + #[derive(PartialEq, Clone)] + pub enum DynamoDBClientConfigType { + DynamoDBClientConfigType {} + } - pub mod types { - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::truncate; - pub use ::dafny_runtime::Map; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; + impl DynamoDBClientConfigType {} - pub struct _default {} + impl Debug + for DynamoDBClientConfigType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl _default { - pub fn IsValid_AttributeName(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(b"65535") < x.cardinality()) - } - pub fn IsValid_AttributeNameList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_AutoScalingPolicyName(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_AutoScalingRoleArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1600) < x.cardinality()) - } - pub fn IsValid_BackupArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_BackupName(x: &Sequence) -> bool { - !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_BackupsInputLimit(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(100), i32) < x) - } - pub fn IsValid_BackupSizeBytes(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_BatchGetRequestMap(x: &Map, Rc>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_BatchWriteItemRequestMap(x: &Map, crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequests>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) - } - pub fn IsValid_BilledSizeBytes(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_CancellationReasonList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_ClientRequestToken(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(36) < x.cardinality()) - } - pub fn IsValid_CloudWatchLogGroupArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_ConsumedCapacityUnits(x: &Sequence) -> bool { - !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) - } - pub fn IsValid_CsvDelimiter(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) - } - pub fn IsValid_CsvHeader(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(b"65536") < x.cardinality()) - } - pub fn IsValid_CsvHeaderList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_DoubleObject(x: &Sequence) -> bool { - !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) - } - pub fn IsValid_ErrorCount(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_ExportArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_GlobalSecondaryIndexAutoScalingUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_GlobalTableGlobalSecondaryIndexSettingsUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) - } - pub fn IsValid_ImportArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_ImportedItemCount(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_ImportNextToken(x: &Sequence) -> bool { - !(x.cardinality() < int!(112)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_IndexName(x: &Sequence) -> bool { - !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_ItemCollectionSizeEstimateBound(x: &Sequence) -> bool { - !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) - } - pub fn IsValid_ItemCount(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_ItemResponseList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_KeyList(x: &Sequence, Rc>>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_KeySchema(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(2) < x.cardinality()) - } - pub fn IsValid_KeySchemaAttributeName(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_ListContributorInsightsLimit(x: i32) -> bool { - !(truncate!(int!(100), i32) < x) - } - pub fn IsValid_ListExportsMaxLimit(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(25), i32) < x) - } - pub fn IsValid_ListImportsMaxLimit(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(25), i32) < x) - } - pub fn IsValid_ListTablesInputLimit(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(100), i32) < x) - } - pub fn IsValid_NonKeyAttributeName(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_NonKeyAttributeNameList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) - } - pub fn IsValid_NonNegativeLongObject(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_ParameterizedStatements(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_PartiQLBatchRequest(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) - } - pub fn IsValid_PartiQLNextToken(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(b"32768") < x.cardinality()) - } - pub fn IsValid_PartiQLStatement(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) - } - pub fn IsValid_PolicyRevisionId(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_PositiveIntegerObject(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) - } - pub fn IsValid_PositiveLongObject(x: i64) -> bool { - !(x < truncate!(int!(1), i64)) - } - pub fn IsValid_PreparedStatementParameters(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ProcessedItemCount(x: i64) -> bool { - !(x < truncate!(int!(0), i64)) - } - pub fn IsValid_ReplicaAutoScalingUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ReplicaGlobalSecondaryIndexList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ReplicaGlobalSecondaryIndexSettingsUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) - } - pub fn IsValid_ReplicaSettingsUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(50) < x.cardinality()) - } - pub fn IsValid_ReplicationGroupUpdateList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) - } - pub fn IsValid_ResourceArnString(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1283) < x.cardinality()) - } - pub fn IsValid_S3Bucket(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_S3Prefix(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_S3SseKmsKeyId(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(2048) < x.cardinality()) - } - pub fn IsValid_ScanSegment(x: i32) -> bool { - !(x < truncate!(int!(0), i32)) && !(truncate!(int!(b"999999"), i32) < x) - } - pub fn IsValid_ScanTotalSegments(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(b"1000000"), i32) < x) - } - pub fn IsValid_StreamArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_TableArn(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_TableName(x: &Sequence) -> bool { - !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_TagKeyString(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_TagValueString(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_TimeToLiveAttributeName(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) - } - pub fn IsValid_TransactGetItemList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_TransactWriteItemList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) - } - pub fn IsValid_WriteRequests(x: &Sequence>) -> bool { - !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } - - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } - - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } - - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DynamoDBClientConfigType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DynamoDBClientConfigType::DynamoDBClientConfigType{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.DynamoDBClientConfigType.DynamoDBClientConfigType")?; + Ok(()) + }, + } + } + } - impl Eq - for DafnyCallEvent {} + impl DynamoDBClientConfigType { + /// Enumerates all possible values of DynamoDBClientConfigType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DynamoDBClientConfigType::DynamoDBClientConfigType {})].iter() + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl Eq + for DynamoDBClientConfigType {} - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl Hash + for DynamoDBClientConfigType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DynamoDBClientConfigType::DynamoDBClientConfigType{} => { - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ApproximateCreationDateTimePrecision { - MILLISECOND {}, - MICROSECOND {} - } + impl Default + for DynamoDBClientConfigType { + fn default() -> DynamoDBClientConfigType { + DynamoDBClientConfigType::DynamoDBClientConfigType {} + } + } - impl ApproximateCreationDateTimePrecision {} + impl AsRef + for DynamoDBClientConfigType { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ApproximateCreationDateTimePrecision { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(5,1) + pub mod types { + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::truncate; + pub use ::dafny_runtime::Map; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(35,3) + pub fn IsValid_AttributeName(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(b"65535") < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(39,3) + pub fn IsValid_AttributeNameList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(65,3) + pub fn IsValid_AutoScalingPolicyName(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(73,3) + pub fn IsValid_AutoScalingRoleArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1600) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(104,3) + pub fn IsValid_BackupArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(122,3) + pub fn IsValid_BackupName(x: &Sequence) -> bool { + !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(126,3) + pub fn IsValid_BackupsInputLimit(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(100), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(130,3) + pub fn IsValid_BackupSizeBytes(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(177,3) + pub fn IsValid_BatchGetRequestMap(x: &Map, Arc>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(218,3) + pub fn IsValid_BatchWriteItemRequestMap(x: &Map, crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequests>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(222,3) + pub fn IsValid_BilledSizeBytes(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(242,3) + pub fn IsValid_CancellationReasonList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(251,3) + pub fn IsValid_ClientRequestToken(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(36) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(256,3) + pub fn IsValid_CloudWatchLogGroupArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(303,3) + pub fn IsValid_ConsumedCapacityUnits(x: &Sequence) -> bool { + !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(382,3) + pub fn IsValid_CsvDelimiter(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(386,3) + pub fn IsValid_CsvHeader(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(b"65536") < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(390,3) + pub fn IsValid_CsvHeaderList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(562,3) + pub fn IsValid_DoubleObject(x: &Sequence) -> bool { + !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1586,3) + pub fn IsValid_ErrorCount(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1623,3) + pub fn IsValid_ExportArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1735,3) + pub fn IsValid_GlobalSecondaryIndexAutoScalingUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1784,3) + pub fn IsValid_GlobalTableGlobalSecondaryIndexSettingsUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1794,3) + pub fn IsValid_ImportArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1798,3) + pub fn IsValid_ImportedItemCount(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1802,3) + pub fn IsValid_ImportNextToken(x: &Sequence) -> bool { + !(x.cardinality() < int!(112)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1860,3) + pub fn IsValid_IndexName(x: &Sequence) -> bool { + !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1889,3) + pub fn IsValid_ItemCollectionSizeEstimateBound(x: &Sequence) -> bool { + !(x.cardinality() < int!(8)) && !(int!(8) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1894,3) + pub fn IsValid_ItemCount(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1902,3) + pub fn IsValid_ItemResponseList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1909,3) + pub fn IsValid_KeyList(x: &Sequence, Arc>>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1920,3) + pub fn IsValid_KeySchema(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(2) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1924,3) + pub fn IsValid_KeySchemaAttributeName(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1973,3) + pub fn IsValid_ListContributorInsightsLimit(x: i32) -> bool { + !(truncate!(int!(100), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1986,3) + pub fn IsValid_ListExportsMaxLimit(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(25), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2008,3) + pub fn IsValid_ListImportsMaxLimit(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(25), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2020,3) + pub fn IsValid_ListTablesInputLimit(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(100), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2061,3) + pub fn IsValid_NonKeyAttributeName(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2065,3) + pub fn IsValid_NonKeyAttributeNameList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2069,3) + pub fn IsValid_NonNegativeLongObject(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2087,3) + pub fn IsValid_ParameterizedStatements(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2091,3) + pub fn IsValid_PartiQLBatchRequest(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2096,3) + pub fn IsValid_PartiQLNextToken(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(b"32768") < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2100,3) + pub fn IsValid_PartiQLStatement(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2115,3) + pub fn IsValid_PolicyRevisionId(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2119,3) + pub fn IsValid_PositiveIntegerObject(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2123,3) + pub fn IsValid_PositiveLongObject(x: i64) -> bool { + !(x < truncate!(int!(1), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2127,3) + pub fn IsValid_PreparedStatementParameters(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2131,3) + pub fn IsValid_ProcessedItemCount(x: i64) -> bool { + !(x < truncate!(int!(0), i64)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2239,3) + pub fn IsValid_ReplicaAutoScalingUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2279,3) + pub fn IsValid_ReplicaGlobalSecondaryIndexList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2297,3) + pub fn IsValid_ReplicaGlobalSecondaryIndexSettingsUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(20) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2321,3) + pub fn IsValid_ReplicaSettingsUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(50) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2340,3) + pub fn IsValid_ReplicationGroupUpdateList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2349,3) + pub fn IsValid_ResourceArnString(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1283) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2406,3) + pub fn IsValid_S3Bucket(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2416,3) + pub fn IsValid_S3Prefix(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2423,3) + pub fn IsValid_S3SseKmsKeyId(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(2048) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2456,3) + pub fn IsValid_ScanSegment(x: i32) -> bool { + !(x < truncate!(int!(0), i32)) && !(truncate!(int!(b"999999"), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2460,3) + pub fn IsValid_ScanTotalSegments(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(b"1000000"), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2510,3) + pub fn IsValid_StreamArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(37)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2527,3) + pub fn IsValid_TableArn(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2580,3) + pub fn IsValid_TableName(x: &Sequence) -> bool { + !(x.cardinality() < int!(3)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2598,3) + pub fn IsValid_TagKeyString(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2607,3) + pub fn IsValid_TagValueString(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2611,3) + pub fn IsValid_TimeToLiveAttributeName(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(255) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2632,3) + pub fn IsValid_TransactGetItemList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2650,3) + pub fn IsValid_TransactWriteItemList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(100) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2796,3) + pub fn IsValid_WriteRequests(x: &Sequence>) -> bool { + !(x.cardinality() < int!(1)) && !(int!(25) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2913,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - impl DafnyPrint - for ApproximateCreationDateTimePrecision { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ApproximateCreationDateTimePrecision::MILLISECOND{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ApproximateCreationDateTimePrecision.MILLISECOND")?; - Ok(()) - }, - ApproximateCreationDateTimePrecision::MICROSECOND{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ApproximateCreationDateTimePrecision.MICROSECOND")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(11,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl ApproximateCreationDateTimePrecision { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ApproximateCreationDateTimePrecision::MILLISECOND {}), Rc::new(ApproximateCreationDateTimePrecision::MICROSECOND {})].iter() - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl Eq - for ApproximateCreationDateTimePrecision {} + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ApproximateCreationDateTimePrecision { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ApproximateCreationDateTimePrecision::MILLISECOND{} => { + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ApproximateCreationDateTimePrecision::MICROSECOND{} => { + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - }, - } - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl Default - for ApproximateCreationDateTimePrecision { - fn default() -> ApproximateCreationDateTimePrecision { - ApproximateCreationDateTimePrecision::MILLISECOND {} - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ApproximateCreationDateTimePrecision { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(15,3) + #[derive(PartialEq, Clone)] + pub enum ApproximateCreationDateTimePrecision { + MILLISECOND {}, + MICROSECOND {} + } - #[derive(PartialEq, Clone)] - pub enum ArchivalSummary { - ArchivalSummary { - ArchivalDateTime: Rc>>, - ArchivalReason: Rc>>, - ArchivalBackupArn: Rc>> - } - } + impl ApproximateCreationDateTimePrecision {} - impl ArchivalSummary { - pub fn ArchivalDateTime(&self) -> &Rc>> { - match self { - ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalDateTime, - } - } - pub fn ArchivalReason(&self) -> &Rc>> { - match self { - ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalReason, - } - } - pub fn ArchivalBackupArn(&self) -> &Rc>> { - match self { - ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalBackupArn, - } - } - } + impl Debug + for ApproximateCreationDateTimePrecision { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ArchivalSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ApproximateCreationDateTimePrecision { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ApproximateCreationDateTimePrecision::MILLISECOND{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ApproximateCreationDateTimePrecision.MILLISECOND")?; + Ok(()) + }, + ApproximateCreationDateTimePrecision::MICROSECOND{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ApproximateCreationDateTimePrecision.MICROSECOND")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ArchivalSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ArchivalSummary.ArchivalSummary(")?; - DafnyPrint::fmt_print(ArchivalDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ArchivalReason, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ArchivalBackupArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ApproximateCreationDateTimePrecision { + /// Enumerates all possible values of ApproximateCreationDateTimePrecision + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ApproximateCreationDateTimePrecision::MILLISECOND {}), Arc::new(ApproximateCreationDateTimePrecision::MICROSECOND {})].iter() + } + } - impl Eq - for ArchivalSummary {} + impl Eq + for ApproximateCreationDateTimePrecision {} - impl Hash - for ArchivalSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => { - Hash::hash(ArchivalDateTime, _state); - Hash::hash(ArchivalReason, _state); - Hash::hash(ArchivalBackupArn, _state) - }, - } - } - } + impl Hash + for ApproximateCreationDateTimePrecision { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ApproximateCreationDateTimePrecision::MILLISECOND{} => { - impl Default - for ArchivalSummary { - fn default() -> ArchivalSummary { - ArchivalSummary::ArchivalSummary { - ArchivalDateTime: Default::default(), - ArchivalReason: Default::default(), - ArchivalBackupArn: Default::default() - } - } - } + }, + ApproximateCreationDateTimePrecision::MICROSECOND{} => { - impl AsRef - for &ArchivalSummary { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum AttributeAction { - ADD {}, - PUT {}, - DELETE {} - } + impl Default + for ApproximateCreationDateTimePrecision { + fn default() -> ApproximateCreationDateTimePrecision { + ApproximateCreationDateTimePrecision::MILLISECOND {} + } + } - impl AttributeAction {} + impl AsRef + for ApproximateCreationDateTimePrecision { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for AttributeAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(19,3) + #[derive(PartialEq, Clone)] + pub enum ArchivalSummary { + ArchivalSummary { + ArchivalDateTime: Arc>>, + ArchivalReason: Arc>>, + ArchivalBackupArn: Arc>> + } + } - impl DafnyPrint - for AttributeAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AttributeAction::ADD{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.ADD")?; - Ok(()) - }, - AttributeAction::PUT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.PUT")?; - Ok(()) - }, - AttributeAction::DELETE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.DELETE")?; - Ok(()) - }, - } - } - } + impl ArchivalSummary { + /// Returns a borrow of the field ArchivalDateTime + pub fn ArchivalDateTime(&self) -> &Arc>> { + match self { + ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalDateTime, + } + } + /// Returns a borrow of the field ArchivalReason + pub fn ArchivalReason(&self) -> &Arc>> { + match self { + ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalReason, + } + } + /// Returns a borrow of the field ArchivalBackupArn + pub fn ArchivalBackupArn(&self) -> &Arc>> { + match self { + ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => ArchivalBackupArn, + } + } + } - impl AttributeAction { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(AttributeAction::ADD {}), Rc::new(AttributeAction::PUT {}), Rc::new(AttributeAction::DELETE {})].iter() - } - } + impl Debug + for ArchivalSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AttributeAction {} + impl DafnyPrint + for ArchivalSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ArchivalSummary.ArchivalSummary(")?; + DafnyPrint::fmt_print(ArchivalDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ArchivalReason, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ArchivalBackupArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AttributeAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AttributeAction::ADD{} => { + impl Eq + for ArchivalSummary {} + + impl Hash + for ArchivalSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ArchivalSummary::ArchivalSummary{ArchivalDateTime, ArchivalReason, ArchivalBackupArn, } => { + Hash::hash(ArchivalDateTime, _state); + Hash::hash(ArchivalReason, _state); + Hash::hash(ArchivalBackupArn, _state) + }, + } + } + } - }, - AttributeAction::PUT{} => { + impl Default + for ArchivalSummary { + fn default() -> ArchivalSummary { + ArchivalSummary::ArchivalSummary { + ArchivalDateTime: Default::default(), + ArchivalReason: Default::default(), + ArchivalBackupArn: Default::default() + } + } + } - }, - AttributeAction::DELETE{} => { + impl AsRef + for ArchivalSummary { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(24,3) + #[derive(PartialEq, Clone)] + pub enum AttributeAction { + ADD {}, + PUT {}, + DELETE {} + } - impl Default - for AttributeAction { - fn default() -> AttributeAction { - AttributeAction::ADD {} - } - } + impl AttributeAction {} - impl AsRef - for &AttributeAction { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for AttributeAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum AttributeDefinition { - AttributeDefinition { - AttributeName: Sequence, - AttributeType: Rc - } - } + impl DafnyPrint + for AttributeAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AttributeAction::ADD{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.ADD")?; + Ok(()) + }, + AttributeAction::PUT{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.PUT")?; + Ok(()) + }, + AttributeAction::DELETE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeAction.DELETE")?; + Ok(()) + }, + } + } + } - impl AttributeDefinition { - pub fn AttributeName(&self) -> &Sequence { - match self { - AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => AttributeName, - } - } - pub fn AttributeType(&self) -> &Rc { - match self { - AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => AttributeType, - } - } - } + impl AttributeAction { + /// Enumerates all possible values of AttributeAction + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(AttributeAction::ADD {}), Arc::new(AttributeAction::PUT {}), Arc::new(AttributeAction::DELETE {})].iter() + } + } - impl Debug - for AttributeDefinition { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for AttributeAction {} - impl DafnyPrint - for AttributeDefinition { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeDefinition.AttributeDefinition(")?; - DafnyPrint::fmt_print(AttributeName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributeType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for AttributeAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AttributeAction::ADD{} => { - impl Eq - for AttributeDefinition {} + }, + AttributeAction::PUT{} => { - impl Hash - for AttributeDefinition { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => { - Hash::hash(AttributeName, _state); - Hash::hash(AttributeType, _state) - }, - } - } - } + }, + AttributeAction::DELETE{} => { - impl Default - for AttributeDefinition { - fn default() -> AttributeDefinition { - AttributeDefinition::AttributeDefinition { - AttributeName: Default::default(), - AttributeType: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &AttributeDefinition { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for AttributeAction { + fn default() -> AttributeAction { + AttributeAction::ADD {} + } + } - pub type AttributeName = Sequence; + impl AsRef + for AttributeAction { + fn as_ref(&self) -> &Self { + self + } + } - pub type AttributeNameList = Sequence>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(28,3) + #[derive(PartialEq, Clone)] + pub enum AttributeDefinition { + AttributeDefinition { + AttributeName: Sequence, + AttributeType: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum AttributeValue { - S { - S: Sequence - }, - N { - N: Sequence - }, - B { - B: Sequence - }, - SS { - SS: Sequence> - }, - NS { - NS: Sequence> - }, - BS { - BS: Sequence> - }, - M { - M: Map, Rc> - }, - L { - L: Sequence> - }, - NULL { - NULL: bool - }, - BOOL { - BOOL: bool - } - } - - impl AttributeValue { - pub fn S(&self) -> &Sequence { - match self { - AttributeValue::S{S, } => S, - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn N(&self) -> &Sequence { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => N, - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn B(&self) -> &Sequence { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => B, - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn SS(&self) -> &Sequence> { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => SS, - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn NS(&self) -> &Sequence> { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => NS, - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn BS(&self) -> &Sequence> { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => BS, - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn M(&self) -> &Map, Rc> { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => M, - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn L(&self) -> &Sequence> { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => L, - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn NULL(&self) -> &bool { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => NULL, - AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), - } - } - pub fn BOOL(&self) -> &bool { - match self { - AttributeValue::S{S, } => panic!("field does not exist on this variant"), - AttributeValue::N{N, } => panic!("field does not exist on this variant"), - AttributeValue::B{B, } => panic!("field does not exist on this variant"), - AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), - AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), - AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), - AttributeValue::M{M, } => panic!("field does not exist on this variant"), - AttributeValue::L{L, } => panic!("field does not exist on this variant"), - AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), - AttributeValue::BOOL{BOOL, } => BOOL, - } - } - } - - impl Debug - for AttributeValue { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AttributeDefinition { + /// Returns a borrow of the field AttributeName + pub fn AttributeName(&self) -> &Sequence { + match self { + AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => AttributeName, + } + } + /// Returns a borrow of the field AttributeType + pub fn AttributeType(&self) -> &Arc { + match self { + AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => AttributeType, + } + } + } - impl DafnyPrint - for AttributeValue { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AttributeValue::S{S, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.S(")?; - DafnyPrint::fmt_print(S, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::N{N, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.N(")?; - DafnyPrint::fmt_print(N, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::B{B, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.B(")?; - DafnyPrint::fmt_print(B, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::SS{SS, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.SS(")?; - DafnyPrint::fmt_print(SS, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::NS{NS, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.NS(")?; - DafnyPrint::fmt_print(NS, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::BS{BS, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.BS(")?; - DafnyPrint::fmt_print(BS, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::M{M, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.M(")?; - DafnyPrint::fmt_print(M, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::L{L, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.L(")?; - DafnyPrint::fmt_print(L, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::NULL{NULL, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.NULL(")?; - DafnyPrint::fmt_print(NULL, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AttributeValue::BOOL{BOOL, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.BOOL(")?; - DafnyPrint::fmt_print(BOOL, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for AttributeDefinition { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AttributeValue {} + impl DafnyPrint + for AttributeDefinition { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeDefinition.AttributeDefinition(")?; + DafnyPrint::fmt_print(AttributeName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AttributeValue { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AttributeValue::S{S, } => { - Hash::hash(S, _state) - }, - AttributeValue::N{N, } => { - Hash::hash(N, _state) - }, - AttributeValue::B{B, } => { - Hash::hash(B, _state) - }, - AttributeValue::SS{SS, } => { - Hash::hash(SS, _state) - }, - AttributeValue::NS{NS, } => { - Hash::hash(NS, _state) - }, - AttributeValue::BS{BS, } => { - Hash::hash(BS, _state) - }, - AttributeValue::M{M, } => { - Hash::hash(M, _state) - }, - AttributeValue::L{L, } => { - Hash::hash(L, _state) - }, - AttributeValue::NULL{NULL, } => { - Hash::hash(NULL, _state) - }, - AttributeValue::BOOL{BOOL, } => { - Hash::hash(BOOL, _state) - }, - } - } - } + impl Eq + for AttributeDefinition {} + + impl Hash + for AttributeDefinition { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AttributeDefinition::AttributeDefinition{AttributeName, AttributeType, } => { + Hash::hash(AttributeName, _state); + Hash::hash(AttributeType, _state) + }, + } + } + } - impl Default - for AttributeValue { - fn default() -> AttributeValue { - AttributeValue::S { - S: Default::default() - } - } - } + impl Default + for AttributeDefinition { + fn default() -> AttributeDefinition { + AttributeDefinition::AttributeDefinition { + AttributeName: Default::default(), + AttributeType: Default::default() + } + } + } - impl AsRef - for &AttributeValue { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for AttributeDefinition { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum AttributeValueUpdate { - AttributeValueUpdate { - Value: Rc>>, - Action: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(34,3) + pub type AttributeName = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(38,3) + pub type AttributeNameList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(43,3) + #[derive(PartialEq, Clone)] + pub enum AttributeValue { + S { + S: Sequence + }, + N { + N: Sequence + }, + B { + B: Sequence + }, + SS { + SS: Sequence> + }, + NS { + NS: Sequence> + }, + BS { + BS: Sequence> + }, + M { + M: Map, Arc> + }, + L { + L: Sequence> + }, + NULL { + NULL: bool + }, + BOOL { + BOOL: bool + } + } - impl AttributeValueUpdate { - pub fn Value(&self) -> &Rc>> { - match self { - AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => Value, - } - } - pub fn Action(&self) -> &Rc>> { - match self { - AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => Action, - } - } - } + impl AttributeValue { + /// Gets the field S for all enum members which have it + pub fn S(&self) -> &Sequence { + match self { + AttributeValue::S{S, } => S, + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field N for all enum members which have it + pub fn N(&self) -> &Sequence { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => N, + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field B for all enum members which have it + pub fn B(&self) -> &Sequence { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => B, + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field SS for all enum members which have it + pub fn SS(&self) -> &Sequence> { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => SS, + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field NS for all enum members which have it + pub fn NS(&self) -> &Sequence> { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => NS, + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field BS for all enum members which have it + pub fn BS(&self) -> &Sequence> { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => BS, + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field M for all enum members which have it + pub fn M(&self) -> &Map, Arc> { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => M, + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field L for all enum members which have it + pub fn L(&self) -> &Sequence> { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => L, + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field NULL for all enum members which have it + pub fn NULL(&self) -> &bool { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => NULL, + AttributeValue::BOOL{BOOL, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field BOOL for all enum members which have it + pub fn BOOL(&self) -> &bool { + match self { + AttributeValue::S{S, } => panic!("field does not exist on this variant"), + AttributeValue::N{N, } => panic!("field does not exist on this variant"), + AttributeValue::B{B, } => panic!("field does not exist on this variant"), + AttributeValue::SS{SS, } => panic!("field does not exist on this variant"), + AttributeValue::NS{NS, } => panic!("field does not exist on this variant"), + AttributeValue::BS{BS, } => panic!("field does not exist on this variant"), + AttributeValue::M{M, } => panic!("field does not exist on this variant"), + AttributeValue::L{L, } => panic!("field does not exist on this variant"), + AttributeValue::NULL{NULL, } => panic!("field does not exist on this variant"), + AttributeValue::BOOL{BOOL, } => BOOL, + } + } + } - impl Debug - for AttributeValueUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for AttributeValue { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for AttributeValueUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValueUpdate.AttributeValueUpdate(")?; - DafnyPrint::fmt_print(Value, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Action, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for AttributeValue { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AttributeValue::S{S, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.S(")?; + DafnyPrint::fmt_print(S, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::N{N, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.N(")?; + DafnyPrint::fmt_print(N, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::B{B, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.B(")?; + DafnyPrint::fmt_print(B, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::SS{SS, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.SS(")?; + DafnyPrint::fmt_print(SS, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::NS{NS, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.NS(")?; + DafnyPrint::fmt_print(NS, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::BS{BS, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.BS(")?; + DafnyPrint::fmt_print(BS, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::M{M, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.M(")?; + DafnyPrint::fmt_print(M, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::L{L, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.L(")?; + DafnyPrint::fmt_print(L, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::NULL{NULL, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.NULL(")?; + DafnyPrint::fmt_print(NULL, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + AttributeValue::BOOL{BOOL, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValue.BOOL(")?; + DafnyPrint::fmt_print(BOOL, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for AttributeValueUpdate {} + impl Eq + for AttributeValue {} + + impl Hash + for AttributeValue { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AttributeValue::S{S, } => { + Hash::hash(S, _state) + }, + AttributeValue::N{N, } => { + Hash::hash(N, _state) + }, + AttributeValue::B{B, } => { + Hash::hash(B, _state) + }, + AttributeValue::SS{SS, } => { + Hash::hash(SS, _state) + }, + AttributeValue::NS{NS, } => { + Hash::hash(NS, _state) + }, + AttributeValue::BS{BS, } => { + Hash::hash(BS, _state) + }, + AttributeValue::M{M, } => { + Hash::hash(M, _state) + }, + AttributeValue::L{L, } => { + Hash::hash(L, _state) + }, + AttributeValue::NULL{NULL, } => { + Hash::hash(NULL, _state) + }, + AttributeValue::BOOL{BOOL, } => { + Hash::hash(BOOL, _state) + }, + } + } + } - impl Hash - for AttributeValueUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => { - Hash::hash(Value, _state); - Hash::hash(Action, _state) - }, - } - } - } + impl Default + for AttributeValue { + fn default() -> AttributeValue { + AttributeValue::S { + S: Default::default() + } + } + } - impl Default - for AttributeValueUpdate { - fn default() -> AttributeValueUpdate { - AttributeValueUpdate::AttributeValueUpdate { - Value: Default::default(), - Action: Default::default() - } - } - } + impl AsRef + for AttributeValue { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &AttributeValueUpdate { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(55,3) + #[derive(PartialEq, Clone)] + pub enum AttributeValueUpdate { + AttributeValueUpdate { + Value: Arc>>, + Action: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum AutoScalingPolicyDescription { - AutoScalingPolicyDescription { - PolicyName: Rc>>, - TargetTrackingScalingPolicyConfiguration: Rc>> - } - } + impl AttributeValueUpdate { + /// Returns a borrow of the field Value + pub fn Value(&self) -> &Arc>> { + match self { + AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => Value, + } + } + /// Returns a borrow of the field Action + pub fn Action(&self) -> &Arc>> { + match self { + AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => Action, + } + } + } - impl AutoScalingPolicyDescription { - pub fn PolicyName(&self) -> &Rc>> { - match self { - AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => PolicyName, - } - } - pub fn TargetTrackingScalingPolicyConfiguration(&self) -> &Rc>> { - match self { - AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => TargetTrackingScalingPolicyConfiguration, - } - } - } + impl Debug + for AttributeValueUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for AutoScalingPolicyDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for AttributeValueUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AttributeValueUpdate.AttributeValueUpdate(")?; + DafnyPrint::fmt_print(Value, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Action, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for AutoScalingPolicyDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingPolicyDescription.AutoScalingPolicyDescription(")?; - DafnyPrint::fmt_print(PolicyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetTrackingScalingPolicyConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for AttributeValueUpdate {} + + impl Hash + for AttributeValueUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AttributeValueUpdate::AttributeValueUpdate{Value, Action, } => { + Hash::hash(Value, _state); + Hash::hash(Action, _state) + }, + } + } + } - impl Eq - for AutoScalingPolicyDescription {} + impl Default + for AttributeValueUpdate { + fn default() -> AttributeValueUpdate { + AttributeValueUpdate::AttributeValueUpdate { + Value: Default::default(), + Action: Default::default() + } + } + } - impl Hash - for AutoScalingPolicyDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { - Hash::hash(PolicyName, _state); - Hash::hash(TargetTrackingScalingPolicyConfiguration, _state) - }, - } - } - } + impl AsRef + for AttributeValueUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for AutoScalingPolicyDescription { - fn default() -> AutoScalingPolicyDescription { - AutoScalingPolicyDescription::AutoScalingPolicyDescription { - PolicyName: Default::default(), - TargetTrackingScalingPolicyConfiguration: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(59,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingPolicyDescription { + AutoScalingPolicyDescription { + PolicyName: Arc>>, + TargetTrackingScalingPolicyConfiguration: Arc>> + } + } - impl AsRef - for &AutoScalingPolicyDescription { - fn as_ref(&self) -> Self { - self - } - } + impl AutoScalingPolicyDescription { + /// Returns a borrow of the field PolicyName + pub fn PolicyName(&self) -> &Arc>> { + match self { + AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => PolicyName, + } + } + /// Returns a borrow of the field TargetTrackingScalingPolicyConfiguration + pub fn TargetTrackingScalingPolicyConfiguration(&self) -> &Arc>> { + match self { + AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => TargetTrackingScalingPolicyConfiguration, + } + } + } - pub type AutoScalingPolicyName = Sequence; + impl Debug + for AutoScalingPolicyDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum AutoScalingPolicyUpdate { - AutoScalingPolicyUpdate { - PolicyName: Rc>>, - TargetTrackingScalingPolicyConfiguration: Rc - } - } + impl DafnyPrint + for AutoScalingPolicyDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingPolicyDescription.AutoScalingPolicyDescription(")?; + DafnyPrint::fmt_print(PolicyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetTrackingScalingPolicyConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AutoScalingPolicyUpdate { - pub fn PolicyName(&self) -> &Rc>> { - match self { - AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => PolicyName, - } - } - pub fn TargetTrackingScalingPolicyConfiguration(&self) -> &Rc { - match self { - AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => TargetTrackingScalingPolicyConfiguration, - } - } - } + impl Eq + for AutoScalingPolicyDescription {} + + impl Hash + for AutoScalingPolicyDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingPolicyDescription::AutoScalingPolicyDescription{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { + Hash::hash(PolicyName, _state); + Hash::hash(TargetTrackingScalingPolicyConfiguration, _state) + }, + } + } + } - impl Debug - for AutoScalingPolicyUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for AutoScalingPolicyDescription { + fn default() -> AutoScalingPolicyDescription { + AutoScalingPolicyDescription::AutoScalingPolicyDescription { + PolicyName: Default::default(), + TargetTrackingScalingPolicyConfiguration: Default::default() + } + } + } - impl DafnyPrint - for AutoScalingPolicyUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingPolicyUpdate.AutoScalingPolicyUpdate(")?; - DafnyPrint::fmt_print(PolicyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetTrackingScalingPolicyConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for AutoScalingPolicyDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for AutoScalingPolicyUpdate {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(64,3) + pub type AutoScalingPolicyName = Sequence; - impl Hash - for AutoScalingPolicyUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { - Hash::hash(PolicyName, _state); - Hash::hash(TargetTrackingScalingPolicyConfiguration, _state) - }, - } - } - } - - impl Default - for AutoScalingPolicyUpdate { - fn default() -> AutoScalingPolicyUpdate { - AutoScalingPolicyUpdate::AutoScalingPolicyUpdate { - PolicyName: Default::default(), - TargetTrackingScalingPolicyConfiguration: Default::default() - } - } - } - - impl AsRef - for &AutoScalingPolicyUpdate { - fn as_ref(&self) -> Self { - self - } - } - - pub type AutoScalingRoleArn = Sequence; - - #[derive(PartialEq, Clone)] - pub enum AutoScalingSettingsDescription { - AutoScalingSettingsDescription { - MinimumUnits: Rc>, - MaximumUnits: Rc>, - AutoScalingDisabled: Rc>, - AutoScalingRoleArn: Rc>>, - ScalingPolicies: Rc>>> - } - } - - impl AutoScalingSettingsDescription { - pub fn MinimumUnits(&self) -> &Rc> { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => MinimumUnits, - } - } - pub fn MaximumUnits(&self) -> &Rc> { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => MaximumUnits, - } - } - pub fn AutoScalingDisabled(&self) -> &Rc> { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => AutoScalingDisabled, - } - } - pub fn AutoScalingRoleArn(&self) -> &Rc>> { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => AutoScalingRoleArn, - } - } - pub fn ScalingPolicies(&self) -> &Rc>>> { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => ScalingPolicies, - } - } - } - - impl Debug - for AutoScalingSettingsDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(68,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingPolicyUpdate { + AutoScalingPolicyUpdate { + PolicyName: Arc>>, + TargetTrackingScalingPolicyConfiguration: Arc + } + } - impl DafnyPrint - for AutoScalingSettingsDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingSettingsDescription.AutoScalingSettingsDescription(")?; - DafnyPrint::fmt_print(MinimumUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MaximumUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AutoScalingDisabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AutoScalingRoleArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScalingPolicies, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AutoScalingPolicyUpdate { + /// Returns a borrow of the field PolicyName + pub fn PolicyName(&self) -> &Arc>> { + match self { + AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => PolicyName, + } + } + /// Returns a borrow of the field TargetTrackingScalingPolicyConfiguration + pub fn TargetTrackingScalingPolicyConfiguration(&self) -> &Arc { + match self { + AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => TargetTrackingScalingPolicyConfiguration, + } + } + } - impl Eq - for AutoScalingSettingsDescription {} + impl Debug + for AutoScalingPolicyUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for AutoScalingSettingsDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => { - Hash::hash(MinimumUnits, _state); - Hash::hash(MaximumUnits, _state); - Hash::hash(AutoScalingDisabled, _state); - Hash::hash(AutoScalingRoleArn, _state); - Hash::hash(ScalingPolicies, _state) - }, - } - } - } - - impl Default - for AutoScalingSettingsDescription { - fn default() -> AutoScalingSettingsDescription { - AutoScalingSettingsDescription::AutoScalingSettingsDescription { - MinimumUnits: Default::default(), - MaximumUnits: Default::default(), - AutoScalingDisabled: Default::default(), - AutoScalingRoleArn: Default::default(), - ScalingPolicies: Default::default() - } - } - } - - impl AsRef - for &AutoScalingSettingsDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum AutoScalingSettingsUpdate { - AutoScalingSettingsUpdate { - MinimumUnits: Rc>, - MaximumUnits: Rc>, - AutoScalingDisabled: Rc>, - AutoScalingRoleArn: Rc>>, - ScalingPolicyUpdate: Rc>> - } - } - - impl AutoScalingSettingsUpdate { - pub fn MinimumUnits(&self) -> &Rc> { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => MinimumUnits, - } - } - pub fn MaximumUnits(&self) -> &Rc> { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => MaximumUnits, - } - } - pub fn AutoScalingDisabled(&self) -> &Rc> { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => AutoScalingDisabled, - } - } - pub fn AutoScalingRoleArn(&self) -> &Rc>> { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => AutoScalingRoleArn, - } - } - pub fn ScalingPolicyUpdate(&self) -> &Rc>> { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => ScalingPolicyUpdate, - } - } - } - - impl Debug - for AutoScalingSettingsUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for AutoScalingPolicyUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingPolicyUpdate.AutoScalingPolicyUpdate(")?; + DafnyPrint::fmt_print(PolicyName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetTrackingScalingPolicyConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for AutoScalingSettingsUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingSettingsUpdate.AutoScalingSettingsUpdate(")?; - DafnyPrint::fmt_print(MinimumUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MaximumUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AutoScalingDisabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AutoScalingRoleArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScalingPolicyUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for AutoScalingPolicyUpdate {} + + impl Hash + for AutoScalingPolicyUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingPolicyUpdate::AutoScalingPolicyUpdate{PolicyName, TargetTrackingScalingPolicyConfiguration, } => { + Hash::hash(PolicyName, _state); + Hash::hash(TargetTrackingScalingPolicyConfiguration, _state) + }, + } + } + } - impl Eq - for AutoScalingSettingsUpdate {} + impl Default + for AutoScalingPolicyUpdate { + fn default() -> AutoScalingPolicyUpdate { + AutoScalingPolicyUpdate::AutoScalingPolicyUpdate { + PolicyName: Default::default(), + TargetTrackingScalingPolicyConfiguration: Default::default() + } + } + } - impl Hash - for AutoScalingSettingsUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => { - Hash::hash(MinimumUnits, _state); - Hash::hash(MaximumUnits, _state); - Hash::hash(AutoScalingDisabled, _state); - Hash::hash(AutoScalingRoleArn, _state); - Hash::hash(ScalingPolicyUpdate, _state) - }, - } - } - } - - impl Default - for AutoScalingSettingsUpdate { - fn default() -> AutoScalingSettingsUpdate { - AutoScalingSettingsUpdate::AutoScalingSettingsUpdate { - MinimumUnits: Default::default(), - MaximumUnits: Default::default(), - AutoScalingDisabled: Default::default(), - AutoScalingRoleArn: Default::default(), - ScalingPolicyUpdate: Default::default() - } - } - } - - impl AsRef - for &AutoScalingSettingsUpdate { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - DisableScaleIn: Rc>, - ScaleInCooldown: Rc>, - ScaleOutCooldown: Rc>, - TargetValue: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject - } - } - - impl AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - pub fn DisableScaleIn(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => DisableScaleIn, - } - } - pub fn ScaleInCooldown(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleInCooldown, - } - } - pub fn ScaleOutCooldown(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleOutCooldown, - } - } - pub fn TargetValue(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => TargetValue, - } - } - } - - impl Debug - for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for AutoScalingPolicyUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingTargetTrackingScalingPolicyConfigurationDescription.AutoScalingTargetTrackingScalingPolicyConfigurationDescription(")?; - DafnyPrint::fmt_print(DisableScaleIn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScaleInCooldown, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScaleOutCooldown, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetValue, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(72,3) + pub type AutoScalingRoleArn = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(76,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingSettingsDescription { + AutoScalingSettingsDescription { + MinimumUnits: Arc>, + MaximumUnits: Arc>, + AutoScalingDisabled: Arc>, + AutoScalingRoleArn: Arc>>, + ScalingPolicies: Arc>>> + } + } - impl Eq - for AutoScalingTargetTrackingScalingPolicyConfigurationDescription {} + impl AutoScalingSettingsDescription { + /// Returns a borrow of the field MinimumUnits + pub fn MinimumUnits(&self) -> &Arc> { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => MinimumUnits, + } + } + /// Returns a borrow of the field MaximumUnits + pub fn MaximumUnits(&self) -> &Arc> { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => MaximumUnits, + } + } + /// Returns a borrow of the field AutoScalingDisabled + pub fn AutoScalingDisabled(&self) -> &Arc> { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => AutoScalingDisabled, + } + } + /// Returns a borrow of the field AutoScalingRoleArn + pub fn AutoScalingRoleArn(&self) -> &Arc>> { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => AutoScalingRoleArn, + } + } + /// Returns a borrow of the field ScalingPolicies + pub fn ScalingPolicies(&self) -> &Arc>>> { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => ScalingPolicies, + } + } + } - impl Hash - for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { - Hash::hash(DisableScaleIn, _state); - Hash::hash(ScaleInCooldown, _state); - Hash::hash(ScaleOutCooldown, _state); - Hash::hash(TargetValue, _state) - }, - } - } - } - - impl Default - for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - fn default() -> AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - DisableScaleIn: Default::default(), - ScaleInCooldown: Default::default(), - ScaleOutCooldown: Default::default(), - TargetValue: Default::default() - } - } - } - - impl AsRef - for &AutoScalingTargetTrackingScalingPolicyConfigurationDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - DisableScaleIn: Rc>, - ScaleInCooldown: Rc>, - ScaleOutCooldown: Rc>, - TargetValue: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject - } - } - - impl AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - pub fn DisableScaleIn(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => DisableScaleIn, - } - } - pub fn ScaleInCooldown(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleInCooldown, - } - } - pub fn ScaleOutCooldown(&self) -> &Rc> { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleOutCooldown, - } - } - pub fn TargetValue(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => TargetValue, - } - } - } - - impl Debug - for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for AutoScalingSettingsDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingTargetTrackingScalingPolicyConfigurationUpdate.AutoScalingTargetTrackingScalingPolicyConfigurationUpdate(")?; - DafnyPrint::fmt_print(DisableScaleIn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScaleInCooldown, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScaleOutCooldown, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetValue, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for AutoScalingSettingsDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingSettingsDescription.AutoScalingSettingsDescription(")?; + DafnyPrint::fmt_print(MinimumUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MaximumUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AutoScalingDisabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AutoScalingRoleArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScalingPolicies, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate {} + impl Eq + for AutoScalingSettingsDescription {} + + impl Hash + for AutoScalingSettingsDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingSettingsDescription::AutoScalingSettingsDescription{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicies, } => { + Hash::hash(MinimumUnits, _state); + Hash::hash(MaximumUnits, _state); + Hash::hash(AutoScalingDisabled, _state); + Hash::hash(AutoScalingRoleArn, _state); + Hash::hash(ScalingPolicies, _state) + }, + } + } + } - impl Hash - for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { - Hash::hash(DisableScaleIn, _state); - Hash::hash(ScaleInCooldown, _state); - Hash::hash(ScaleOutCooldown, _state); - Hash::hash(TargetValue, _state) - }, - } - } - } + impl Default + for AutoScalingSettingsDescription { + fn default() -> AutoScalingSettingsDescription { + AutoScalingSettingsDescription::AutoScalingSettingsDescription { + MinimumUnits: Default::default(), + MaximumUnits: Default::default(), + AutoScalingDisabled: Default::default(), + AutoScalingRoleArn: Default::default(), + ScalingPolicies: Default::default() + } + } + } - impl Default - for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - fn default() -> AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - DisableScaleIn: Default::default(), - ScaleInCooldown: Default::default(), - ScaleOutCooldown: Default::default(), - TargetValue: Default::default() - } - } - } + impl AsRef + for AutoScalingSettingsDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(83,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingSettingsUpdate { + AutoScalingSettingsUpdate { + MinimumUnits: Arc>, + MaximumUnits: Arc>, + AutoScalingDisabled: Arc>, + AutoScalingRoleArn: Arc>>, + ScalingPolicyUpdate: Arc>> + } + } - pub type BackupArn = Sequence; + impl AutoScalingSettingsUpdate { + /// Returns a borrow of the field MinimumUnits + pub fn MinimumUnits(&self) -> &Arc> { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => MinimumUnits, + } + } + /// Returns a borrow of the field MaximumUnits + pub fn MaximumUnits(&self) -> &Arc> { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => MaximumUnits, + } + } + /// Returns a borrow of the field AutoScalingDisabled + pub fn AutoScalingDisabled(&self) -> &Arc> { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => AutoScalingDisabled, + } + } + /// Returns a borrow of the field AutoScalingRoleArn + pub fn AutoScalingRoleArn(&self) -> &Arc>> { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => AutoScalingRoleArn, + } + } + /// Returns a borrow of the field ScalingPolicyUpdate + pub fn ScalingPolicyUpdate(&self) -> &Arc>> { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => ScalingPolicyUpdate, + } + } + } - #[derive(PartialEq, Clone)] - pub enum BackupDescription { - BackupDescription { - BackupDetails: Rc>>, - SourceTableDetails: Rc>>, - SourceTableFeatureDetails: Rc>> - } - } + impl Debug + for AutoScalingSettingsUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl BackupDescription { - pub fn BackupDetails(&self) -> &Rc>> { - match self { - BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => BackupDetails, - } - } - pub fn SourceTableDetails(&self) -> &Rc>> { - match self { - BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => SourceTableDetails, - } - } - pub fn SourceTableFeatureDetails(&self) -> &Rc>> { - match self { - BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => SourceTableFeatureDetails, - } - } - } + impl DafnyPrint + for AutoScalingSettingsUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingSettingsUpdate.AutoScalingSettingsUpdate(")?; + DafnyPrint::fmt_print(MinimumUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MaximumUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AutoScalingDisabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AutoScalingRoleArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScalingPolicyUpdate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for BackupDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for AutoScalingSettingsUpdate {} + + impl Hash + for AutoScalingSettingsUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate{MinimumUnits, MaximumUnits, AutoScalingDisabled, AutoScalingRoleArn, ScalingPolicyUpdate, } => { + Hash::hash(MinimumUnits, _state); + Hash::hash(MaximumUnits, _state); + Hash::hash(AutoScalingDisabled, _state); + Hash::hash(AutoScalingRoleArn, _state); + Hash::hash(ScalingPolicyUpdate, _state) + }, + } + } + } - impl DafnyPrint - for BackupDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupDescription.BackupDescription(")?; - DafnyPrint::fmt_print(BackupDetails, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceTableDetails, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceTableFeatureDetails, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for AutoScalingSettingsUpdate { + fn default() -> AutoScalingSettingsUpdate { + AutoScalingSettingsUpdate::AutoScalingSettingsUpdate { + MinimumUnits: Default::default(), + MaximumUnits: Default::default(), + AutoScalingDisabled: Default::default(), + AutoScalingRoleArn: Default::default(), + ScalingPolicyUpdate: Default::default() + } + } + } - impl Eq - for BackupDescription {} + impl AsRef + for AutoScalingSettingsUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for BackupDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => { - Hash::hash(BackupDetails, _state); - Hash::hash(SourceTableDetails, _state); - Hash::hash(SourceTableFeatureDetails, _state) - }, - } - } - } - - impl Default - for BackupDescription { - fn default() -> BackupDescription { - BackupDescription::BackupDescription { - BackupDetails: Default::default(), - SourceTableDetails: Default::default(), - SourceTableFeatureDetails: Default::default() - } - } - } - - impl AsRef - for &BackupDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum BackupDetails { - BackupDetails { - BackupArn: Sequence, - BackupName: Sequence, - BackupSizeBytes: Rc>, - BackupStatus: Rc, - BackupType: Rc, - BackupCreationDateTime: Sequence, - BackupExpiryDateTime: Rc>> - } - } - - impl BackupDetails { - pub fn BackupArn(&self) -> &Sequence { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupArn, - } - } - pub fn BackupName(&self) -> &Sequence { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupName, - } - } - pub fn BackupSizeBytes(&self) -> &Rc> { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupSizeBytes, - } - } - pub fn BackupStatus(&self) -> &Rc { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupStatus, - } - } - pub fn BackupType(&self) -> &Rc { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupType, - } - } - pub fn BackupCreationDateTime(&self) -> &Sequence { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupCreationDateTime, - } - } - pub fn BackupExpiryDateTime(&self) -> &Rc>> { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupExpiryDateTime, - } - } - } - - impl Debug - for BackupDetails { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(90,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + DisableScaleIn: Arc>, + ScaleInCooldown: Arc>, + ScaleOutCooldown: Arc>, + TargetValue: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject + } + } - impl DafnyPrint - for BackupDetails { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupDetails.BackupDetails(")?; - DafnyPrint::fmt_print(BackupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupSizeBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupCreationDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupExpiryDateTime, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + /// Returns a borrow of the field DisableScaleIn + pub fn DisableScaleIn(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => DisableScaleIn, + } + } + /// Returns a borrow of the field ScaleInCooldown + pub fn ScaleInCooldown(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleInCooldown, + } + } + /// Returns a borrow of the field ScaleOutCooldown + pub fn ScaleOutCooldown(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleOutCooldown, + } + } + /// Returns a borrow of the field TargetValue + pub fn TargetValue(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => TargetValue, + } + } + } - impl Eq - for BackupDetails {} + impl Debug + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for BackupDetails { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => { - Hash::hash(BackupArn, _state); - Hash::hash(BackupName, _state); - Hash::hash(BackupSizeBytes, _state); - Hash::hash(BackupStatus, _state); - Hash::hash(BackupType, _state); - Hash::hash(BackupCreationDateTime, _state); - Hash::hash(BackupExpiryDateTime, _state) - }, - } - } - } + impl DafnyPrint + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingTargetTrackingScalingPolicyConfigurationDescription.AutoScalingTargetTrackingScalingPolicyConfigurationDescription(")?; + DafnyPrint::fmt_print(DisableScaleIn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScaleInCooldown, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScaleOutCooldown, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetValue, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for BackupDetails { - fn default() -> BackupDetails { - BackupDetails::BackupDetails { - BackupArn: Default::default(), - BackupName: Default::default(), - BackupSizeBytes: Default::default(), - BackupStatus: Default::default(), - BackupType: Default::default(), - BackupCreationDateTime: Default::default(), - BackupExpiryDateTime: Default::default() - } - } - } + impl Eq + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription {} + + impl Hash + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { + Hash::hash(DisableScaleIn, _state); + Hash::hash(ScaleInCooldown, _state); + Hash::hash(ScaleOutCooldown, _state); + Hash::hash(TargetValue, _state) + }, + } + } + } - impl AsRef - for &BackupDetails { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + fn default() -> AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + AutoScalingTargetTrackingScalingPolicyConfigurationDescription::AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + DisableScaleIn: Default::default(), + ScaleInCooldown: Default::default(), + ScaleOutCooldown: Default::default(), + TargetValue: Default::default() + } + } + } - pub type BackupName = Sequence; + impl AsRef + for AutoScalingTargetTrackingScalingPolicyConfigurationDescription { + fn as_ref(&self) -> &Self { + self + } + } - pub type BackupsInputLimit = i32; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(96,3) + #[derive(PartialEq, Clone)] + pub enum AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + DisableScaleIn: Arc>, + ScaleInCooldown: Arc>, + ScaleOutCooldown: Arc>, + TargetValue: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject + } + } - pub type BackupSizeBytes = i64; + impl AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + /// Returns a borrow of the field DisableScaleIn + pub fn DisableScaleIn(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => DisableScaleIn, + } + } + /// Returns a borrow of the field ScaleInCooldown + pub fn ScaleInCooldown(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleInCooldown, + } + } + /// Returns a borrow of the field ScaleOutCooldown + pub fn ScaleOutCooldown(&self) -> &Arc> { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => ScaleOutCooldown, + } + } + /// Returns a borrow of the field TargetValue + pub fn TargetValue(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::DoubleObject { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => TargetValue, + } + } + } - #[derive(PartialEq, Clone)] - pub enum BackupStatus { - CREATING {}, - DELETED {}, - AVAILABLE {} - } + impl Debug + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl BackupStatus {} + impl DafnyPrint + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.AutoScalingTargetTrackingScalingPolicyConfigurationUpdate.AutoScalingTargetTrackingScalingPolicyConfigurationUpdate(")?; + DafnyPrint::fmt_print(DisableScaleIn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScaleInCooldown, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScaleOutCooldown, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetValue, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for BackupStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate {} + + impl Hash + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate{DisableScaleIn, ScaleInCooldown, ScaleOutCooldown, TargetValue, } => { + Hash::hash(DisableScaleIn, _state); + Hash::hash(ScaleInCooldown, _state); + Hash::hash(ScaleOutCooldown, _state); + Hash::hash(TargetValue, _state) + }, + } + } + } - impl DafnyPrint - for BackupStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupStatus::CREATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.CREATING")?; - Ok(()) - }, - BackupStatus::DELETED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.DELETED")?; - Ok(()) - }, - BackupStatus::AVAILABLE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.AVAILABLE")?; - Ok(()) - }, - } - } - } + impl Default + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + fn default() -> AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + AutoScalingTargetTrackingScalingPolicyConfigurationUpdate::AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + DisableScaleIn: Default::default(), + ScaleInCooldown: Default::default(), + ScaleOutCooldown: Default::default(), + TargetValue: Default::default() + } + } + } - impl BackupStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(BackupStatus::CREATING {}), Rc::new(BackupStatus::DELETED {}), Rc::new(BackupStatus::AVAILABLE {})].iter() - } - } + impl AsRef + for AutoScalingTargetTrackingScalingPolicyConfigurationUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for BackupStatus {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(103,3) + pub type BackupArn = Sequence; - impl Hash - for BackupStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupStatus::CREATING{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(107,3) + #[derive(PartialEq, Clone)] + pub enum BackupDescription { + BackupDescription { + BackupDetails: Arc>>, + SourceTableDetails: Arc>>, + SourceTableFeatureDetails: Arc>> + } + } - }, - BackupStatus::DELETED{} => { + impl BackupDescription { + /// Returns a borrow of the field BackupDetails + pub fn BackupDetails(&self) -> &Arc>> { + match self { + BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => BackupDetails, + } + } + /// Returns a borrow of the field SourceTableDetails + pub fn SourceTableDetails(&self) -> &Arc>> { + match self { + BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => SourceTableDetails, + } + } + /// Returns a borrow of the field SourceTableFeatureDetails + pub fn SourceTableFeatureDetails(&self) -> &Arc>> { + match self { + BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => SourceTableFeatureDetails, + } + } + } - }, - BackupStatus::AVAILABLE{} => { + impl Debug + for BackupDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } - - impl Default - for BackupStatus { - fn default() -> BackupStatus { - BackupStatus::CREATING {} - } - } - - impl AsRef - for &BackupStatus { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum BackupSummary { - BackupSummary { - TableName: Rc>>, - TableId: Rc>>, - TableArn: Rc>>, - BackupArn: Rc>>, - BackupName: Rc>>, - BackupCreationDateTime: Rc>>, - BackupExpiryDateTime: Rc>>, - BackupStatus: Rc>>, - BackupType: Rc>>, - BackupSizeBytes: Rc> - } - } - - impl BackupSummary { - pub fn TableName(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableName, - } - } - pub fn TableId(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableId, - } - } - pub fn TableArn(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableArn, - } - } - pub fn BackupArn(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupArn, - } - } - pub fn BackupName(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupName, - } - } - pub fn BackupCreationDateTime(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupCreationDateTime, - } - } - pub fn BackupExpiryDateTime(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupExpiryDateTime, - } - } - pub fn BackupStatus(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupStatus, - } - } - pub fn BackupType(&self) -> &Rc>> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupType, - } - } - pub fn BackupSizeBytes(&self) -> &Rc> { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupSizeBytes, - } - } - } - - impl Debug - for BackupSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BackupDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupDescription.BackupDescription(")?; + DafnyPrint::fmt_print(BackupDetails, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SourceTableDetails, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SourceTableFeatureDetails, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BackupSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupSummary.BackupSummary(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupCreationDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupExpiryDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupSizeBytes, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BackupDescription {} + + impl Hash + for BackupDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupDescription::BackupDescription{BackupDetails, SourceTableDetails, SourceTableFeatureDetails, } => { + Hash::hash(BackupDetails, _state); + Hash::hash(SourceTableDetails, _state); + Hash::hash(SourceTableFeatureDetails, _state) + }, + } + } + } - impl Eq - for BackupSummary {} + impl Default + for BackupDescription { + fn default() -> BackupDescription { + BackupDescription::BackupDescription { + BackupDetails: Default::default(), + SourceTableDetails: Default::default(), + SourceTableFeatureDetails: Default::default() + } + } + } - impl Hash - for BackupSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => { - Hash::hash(TableName, _state); - Hash::hash(TableId, _state); - Hash::hash(TableArn, _state); - Hash::hash(BackupArn, _state); - Hash::hash(BackupName, _state); - Hash::hash(BackupCreationDateTime, _state); - Hash::hash(BackupExpiryDateTime, _state); - Hash::hash(BackupStatus, _state); - Hash::hash(BackupType, _state); - Hash::hash(BackupSizeBytes, _state) - }, - } - } - } - - impl Default - for BackupSummary { - fn default() -> BackupSummary { - BackupSummary::BackupSummary { - TableName: Default::default(), - TableId: Default::default(), - TableArn: Default::default(), - BackupArn: Default::default(), - BackupName: Default::default(), - BackupCreationDateTime: Default::default(), - BackupExpiryDateTime: Default::default(), - BackupStatus: Default::default(), - BackupType: Default::default(), - BackupSizeBytes: Default::default() - } - } - } - - impl AsRef - for &BackupSummary { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum BackupType { - USER {}, - SYSTEM {}, - AWS_BACKUP {} - } - - impl BackupType {} - - impl Debug - for BackupType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for BackupDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for BackupType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupType::USER{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.USER")?; - Ok(()) - }, - BackupType::SYSTEM{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.SYSTEM")?; - Ok(()) - }, - BackupType::AWS_BACKUP{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.AWS__BACKUP")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(112,3) + #[derive(PartialEq, Clone)] + pub enum BackupDetails { + BackupDetails { + BackupArn: Sequence, + BackupName: Sequence, + BackupSizeBytes: Arc>, + BackupStatus: Arc, + BackupType: Arc, + BackupCreationDateTime: Sequence, + BackupExpiryDateTime: Arc>> + } + } - impl BackupType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(BackupType::USER {}), Rc::new(BackupType::SYSTEM {}), Rc::new(BackupType::AWS_BACKUP {})].iter() - } - } + impl BackupDetails { + /// Returns a borrow of the field BackupArn + pub fn BackupArn(&self) -> &Sequence { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupArn, + } + } + /// Returns a borrow of the field BackupName + pub fn BackupName(&self) -> &Sequence { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupName, + } + } + /// Returns a borrow of the field BackupSizeBytes + pub fn BackupSizeBytes(&self) -> &Arc> { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupSizeBytes, + } + } + /// Returns a borrow of the field BackupStatus + pub fn BackupStatus(&self) -> &Arc { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupStatus, + } + } + /// Returns a borrow of the field BackupType + pub fn BackupType(&self) -> &Arc { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupType, + } + } + /// Returns a borrow of the field BackupCreationDateTime + pub fn BackupCreationDateTime(&self) -> &Sequence { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupCreationDateTime, + } + } + /// Returns a borrow of the field BackupExpiryDateTime + pub fn BackupExpiryDateTime(&self) -> &Arc>> { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => BackupExpiryDateTime, + } + } + } - impl Eq - for BackupType {} + impl Debug + for BackupDetails { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for BackupType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupType::USER{} => { + impl DafnyPrint + for BackupDetails { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupDetails.BackupDetails(")?; + DafnyPrint::fmt_print(BackupArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupCreationDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupExpiryDateTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - BackupType::SYSTEM{} => { + impl Eq + for BackupDetails {} + + impl Hash + for BackupDetails { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupDetails::BackupDetails{BackupArn, BackupName, BackupSizeBytes, BackupStatus, BackupType, BackupCreationDateTime, BackupExpiryDateTime, } => { + Hash::hash(BackupArn, _state); + Hash::hash(BackupName, _state); + Hash::hash(BackupSizeBytes, _state); + Hash::hash(BackupStatus, _state); + Hash::hash(BackupType, _state); + Hash::hash(BackupCreationDateTime, _state); + Hash::hash(BackupExpiryDateTime, _state) + }, + } + } + } - }, - BackupType::AWS_BACKUP{} => { + impl Default + for BackupDetails { + fn default() -> BackupDetails { + BackupDetails::BackupDetails { + BackupArn: Default::default(), + BackupName: Default::default(), + BackupSizeBytes: Default::default(), + BackupStatus: Default::default(), + BackupType: Default::default(), + BackupCreationDateTime: Default::default(), + BackupExpiryDateTime: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for BackupDetails { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for BackupType { - fn default() -> BackupType { - BackupType::USER {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(121,3) + pub type BackupName = Sequence; - impl AsRef - for &BackupType { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(125,3) + pub type BackupsInputLimit = i32; - #[derive(PartialEq, Clone)] - pub enum BackupTypeFilter { - USER {}, - SYSTEM {}, - AWS_BACKUP {}, - ALL {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(129,3) + pub type BackupSizeBytes = i64; - impl BackupTypeFilter {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(133,3) + #[derive(PartialEq, Clone)] + pub enum BackupStatus { + CREATING {}, + DELETED {}, + AVAILABLE {} + } - impl Debug - for BackupTypeFilter { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl BackupStatus {} - impl DafnyPrint - for BackupTypeFilter { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BackupTypeFilter::USER{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.USER")?; - Ok(()) - }, - BackupTypeFilter::SYSTEM{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.SYSTEM")?; - Ok(()) - }, - BackupTypeFilter::AWS_BACKUP{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.AWS__BACKUP")?; - Ok(()) - }, - BackupTypeFilter::ALL{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.ALL")?; - Ok(()) - }, - } - } - } + impl Debug + for BackupStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl BackupTypeFilter { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(BackupTypeFilter::USER {}), Rc::new(BackupTypeFilter::SYSTEM {}), Rc::new(BackupTypeFilter::AWS_BACKUP {}), Rc::new(BackupTypeFilter::ALL {})].iter() - } - } + impl DafnyPrint + for BackupStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupStatus::CREATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.CREATING")?; + Ok(()) + }, + BackupStatus::DELETED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.DELETED")?; + Ok(()) + }, + BackupStatus::AVAILABLE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupStatus.AVAILABLE")?; + Ok(()) + }, + } + } + } - impl Eq - for BackupTypeFilter {} + impl BackupStatus { + /// Enumerates all possible values of BackupStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(BackupStatus::CREATING {}), Arc::new(BackupStatus::DELETED {}), Arc::new(BackupStatus::AVAILABLE {})].iter() + } + } - impl Hash - for BackupTypeFilter { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BackupTypeFilter::USER{} => { + impl Eq + for BackupStatus {} - }, - BackupTypeFilter::SYSTEM{} => { + impl Hash + for BackupStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupStatus::CREATING{} => { - }, - BackupTypeFilter::AWS_BACKUP{} => { + }, + BackupStatus::DELETED{} => { - }, - BackupTypeFilter::ALL{} => { + }, + BackupStatus::AVAILABLE{} => { - }, - } - } - } + }, + } + } + } - impl Default - for BackupTypeFilter { - fn default() -> BackupTypeFilter { - BackupTypeFilter::USER {} - } - } + impl Default + for BackupStatus { + fn default() -> BackupStatus { + BackupStatus::CREATING {} + } + } - impl AsRef - for &BackupTypeFilter { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BackupStatus { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementInput { - BatchExecuteStatementInput { - Statements: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PartiQLBatchRequest, - ReturnConsumedCapacity: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(138,3) + #[derive(PartialEq, Clone)] + pub enum BackupSummary { + BackupSummary { + TableName: Arc>>, + TableId: Arc>>, + TableArn: Arc>>, + BackupArn: Arc>>, + BackupName: Arc>>, + BackupCreationDateTime: Arc>>, + BackupExpiryDateTime: Arc>>, + BackupStatus: Arc>>, + BackupType: Arc>>, + BackupSizeBytes: Arc> + } + } - impl BatchExecuteStatementInput { - pub fn Statements(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PartiQLBatchRequest { - match self { - BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => Statements, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => ReturnConsumedCapacity, - } - } - } + impl BackupSummary { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableName, + } + } + /// Returns a borrow of the field TableId + pub fn TableId(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableId, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => TableArn, + } + } + /// Returns a borrow of the field BackupArn + pub fn BackupArn(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupArn, + } + } + /// Returns a borrow of the field BackupName + pub fn BackupName(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupName, + } + } + /// Returns a borrow of the field BackupCreationDateTime + pub fn BackupCreationDateTime(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupCreationDateTime, + } + } + /// Returns a borrow of the field BackupExpiryDateTime + pub fn BackupExpiryDateTime(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupExpiryDateTime, + } + } + /// Returns a borrow of the field BackupStatus + pub fn BackupStatus(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupStatus, + } + } + /// Returns a borrow of the field BackupType + pub fn BackupType(&self) -> &Arc>> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupType, + } + } + /// Returns a borrow of the field BackupSizeBytes + pub fn BackupSizeBytes(&self) -> &Arc> { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => BackupSizeBytes, + } + } + } - impl Debug - for BatchExecuteStatementInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BackupSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for BatchExecuteStatementInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchExecuteStatementInput.BatchExecuteStatementInput(")?; - DafnyPrint::fmt_print(Statements, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BackupSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupSummary.BackupSummary(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupCreationDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupExpiryDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupSizeBytes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for BatchExecuteStatementInput {} + impl Eq + for BackupSummary {} + + impl Hash + for BackupSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupSummary::BackupSummary{TableName, TableId, TableArn, BackupArn, BackupName, BackupCreationDateTime, BackupExpiryDateTime, BackupStatus, BackupType, BackupSizeBytes, } => { + Hash::hash(TableName, _state); + Hash::hash(TableId, _state); + Hash::hash(TableArn, _state); + Hash::hash(BackupArn, _state); + Hash::hash(BackupName, _state); + Hash::hash(BackupCreationDateTime, _state); + Hash::hash(BackupExpiryDateTime, _state); + Hash::hash(BackupStatus, _state); + Hash::hash(BackupType, _state); + Hash::hash(BackupSizeBytes, _state) + }, + } + } + } - impl Hash - for BatchExecuteStatementInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => { - Hash::hash(Statements, _state); - Hash::hash(ReturnConsumedCapacity, _state) - }, - } - } - } + impl Default + for BackupSummary { + fn default() -> BackupSummary { + BackupSummary::BackupSummary { + TableName: Default::default(), + TableId: Default::default(), + TableArn: Default::default(), + BackupArn: Default::default(), + BackupName: Default::default(), + BackupCreationDateTime: Default::default(), + BackupExpiryDateTime: Default::default(), + BackupStatus: Default::default(), + BackupType: Default::default(), + BackupSizeBytes: Default::default() + } + } + } - impl Default - for BatchExecuteStatementInput { - fn default() -> BatchExecuteStatementInput { - BatchExecuteStatementInput::BatchExecuteStatementInput { - Statements: Default::default(), - ReturnConsumedCapacity: Default::default() - } - } - } + impl AsRef + for BackupSummary { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &BatchExecuteStatementInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(150,3) + #[derive(PartialEq, Clone)] + pub enum BackupType { + USER {}, + SYSTEM {}, + AWS_BACKUP {} + } - #[derive(PartialEq, Clone)] - pub enum BatchExecuteStatementOutput { - BatchExecuteStatementOutput { - Responses: Rc>>>, - ConsumedCapacity: Rc>>> - } - } + impl BackupType {} - impl BatchExecuteStatementOutput { - pub fn Responses(&self) -> &Rc>>> { - match self { - BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => Responses, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>>> { - match self { - BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => ConsumedCapacity, - } - } - } + impl Debug + for BackupType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchExecuteStatementOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BackupType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupType::USER{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.USER")?; + Ok(()) + }, + BackupType::SYSTEM{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.SYSTEM")?; + Ok(()) + }, + BackupType::AWS_BACKUP{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupType.AWS__BACKUP")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchExecuteStatementOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchExecuteStatementOutput.BatchExecuteStatementOutput(")?; - DafnyPrint::fmt_print(Responses, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl BackupType { + /// Enumerates all possible values of BackupType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(BackupType::USER {}), Arc::new(BackupType::SYSTEM {}), Arc::new(BackupType::AWS_BACKUP {})].iter() + } + } - impl Eq - for BatchExecuteStatementOutput {} + impl Eq + for BackupType {} - impl Hash - for BatchExecuteStatementOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => { - Hash::hash(Responses, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + impl Hash + for BackupType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupType::USER{} => { - impl Default - for BatchExecuteStatementOutput { - fn default() -> BatchExecuteStatementOutput { - BatchExecuteStatementOutput::BatchExecuteStatementOutput { - Responses: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + }, + BackupType::SYSTEM{} => { - impl AsRef - for &BatchExecuteStatementOutput { - fn as_ref(&self) -> Self { - self - } - } + }, + BackupType::AWS_BACKUP{} => { - #[derive(PartialEq, Clone)] - pub enum BatchGetItemInput { - BatchGetItemInput { - RequestItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetRequestMap, - ReturnConsumedCapacity: Rc>> - } - } + }, + } + } + } - impl BatchGetItemInput { - pub fn RequestItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetRequestMap { - match self { - BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => RequestItems, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => ReturnConsumedCapacity, - } - } - } + impl Default + for BackupType { + fn default() -> BackupType { + BackupType::USER {} + } + } - impl Debug - for BatchGetItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for BackupType { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for BatchGetItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchGetItemInput.BatchGetItemInput(")?; - DafnyPrint::fmt_print(RequestItems, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(154,3) + #[derive(PartialEq, Clone)] + pub enum BackupTypeFilter { + USER {}, + SYSTEM {}, + AWS_BACKUP {}, + ALL {} + } - impl Eq - for BatchGetItemInput {} + impl BackupTypeFilter {} - impl Hash - for BatchGetItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => { - Hash::hash(RequestItems, _state); - Hash::hash(ReturnConsumedCapacity, _state) - }, - } - } - } + impl Debug + for BackupTypeFilter { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for BatchGetItemInput { - fn default() -> BatchGetItemInput { - BatchGetItemInput::BatchGetItemInput { - RequestItems: Default::default(), - ReturnConsumedCapacity: Default::default() - } - } - } + impl DafnyPrint + for BackupTypeFilter { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BackupTypeFilter::USER{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.USER")?; + Ok(()) + }, + BackupTypeFilter::SYSTEM{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.SYSTEM")?; + Ok(()) + }, + BackupTypeFilter::AWS_BACKUP{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.AWS__BACKUP")?; + Ok(()) + }, + BackupTypeFilter::ALL{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BackupTypeFilter.ALL")?; + Ok(()) + }, + } + } + } - impl AsRef - for &BatchGetItemInput { - fn as_ref(&self) -> Self { - self - } - } + impl BackupTypeFilter { + /// Enumerates all possible values of BackupTypeFilter + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(BackupTypeFilter::USER {}), Arc::new(BackupTypeFilter::SYSTEM {}), Arc::new(BackupTypeFilter::AWS_BACKUP {}), Arc::new(BackupTypeFilter::ALL {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum BatchGetItemOutput { - BatchGetItemOutput { - Responses: Rc, Sequence, Rc>>>>>, - UnprocessedKeys: Rc>, - ConsumedCapacity: Rc>>> - } - } + impl Eq + for BackupTypeFilter {} - impl BatchGetItemOutput { - pub fn Responses(&self) -> &Rc, Sequence, Rc>>>>> { - match self { - BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => Responses, - } - } - pub fn UnprocessedKeys(&self) -> &Rc> { - match self { - BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => UnprocessedKeys, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>>> { - match self { - BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => ConsumedCapacity, - } - } - } + impl Hash + for BackupTypeFilter { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BackupTypeFilter::USER{} => { - impl Debug - for BatchGetItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + BackupTypeFilter::SYSTEM{} => { - impl DafnyPrint - for BatchGetItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchGetItemOutput.BatchGetItemOutput(")?; - DafnyPrint::fmt_print(Responses, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UnprocessedKeys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + BackupTypeFilter::AWS_BACKUP{} => { - impl Eq - for BatchGetItemOutput {} + }, + BackupTypeFilter::ALL{} => { - impl Hash - for BatchGetItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => { - Hash::hash(Responses, _state); - Hash::hash(UnprocessedKeys, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + }, + } + } + } - impl Default - for BatchGetItemOutput { - fn default() -> BatchGetItemOutput { - BatchGetItemOutput::BatchGetItemOutput { - Responses: Default::default(), - UnprocessedKeys: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + impl Default + for BackupTypeFilter { + fn default() -> BackupTypeFilter { + BackupTypeFilter::USER {} + } + } - impl AsRef - for &BatchGetItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BackupTypeFilter { + fn as_ref(&self) -> &Self { + self + } + } - pub type BatchGetRequestMap = Map, Rc>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(159,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementInput { + BatchExecuteStatementInput { + Statements: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PartiQLBatchRequest, + ReturnConsumedCapacity: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum BatchStatementError { - BatchStatementError { - Code: Rc>>, - Message: Rc>> - } - } + impl BatchExecuteStatementInput { + /// Returns a borrow of the field Statements + pub fn Statements(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PartiQLBatchRequest { + match self { + BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => Statements, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => ReturnConsumedCapacity, + } + } + } - impl BatchStatementError { - pub fn Code(&self) -> &Rc>> { - match self { - BatchStatementError::BatchStatementError{Code, Message, } => Code, - } - } - pub fn Message(&self) -> &Rc>> { - match self { - BatchStatementError::BatchStatementError{Code, Message, } => Message, - } - } - } + impl Debug + for BatchExecuteStatementInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for BatchStatementError { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for BatchExecuteStatementInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchExecuteStatementInput.BatchExecuteStatementInput(")?; + DafnyPrint::fmt_print(Statements, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for BatchStatementError { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchStatementError::BatchStatementError{Code, Message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementError.BatchStatementError(")?; - DafnyPrint::fmt_print(Code, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for BatchExecuteStatementInput {} + + impl Hash + for BatchExecuteStatementInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementInput::BatchExecuteStatementInput{Statements, ReturnConsumedCapacity, } => { + Hash::hash(Statements, _state); + Hash::hash(ReturnConsumedCapacity, _state) + }, + } + } + } - impl Eq - for BatchStatementError {} + impl Default + for BatchExecuteStatementInput { + fn default() -> BatchExecuteStatementInput { + BatchExecuteStatementInput::BatchExecuteStatementInput { + Statements: Default::default(), + ReturnConsumedCapacity: Default::default() + } + } + } - impl Hash - for BatchStatementError { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchStatementError::BatchStatementError{Code, Message, } => { - Hash::hash(Code, _state); - Hash::hash(Message, _state) - }, - } - } - } - - impl Default - for BatchStatementError { - fn default() -> BatchStatementError { - BatchStatementError::BatchStatementError { - Code: Default::default(), - Message: Default::default() - } - } - } - - impl AsRef - for &BatchStatementError { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum BatchStatementErrorCodeEnum { - ConditionalCheckFailed {}, - ItemCollectionSizeLimitExceeded {}, - RequestLimitExceeded {}, - ValidationError {}, - ProvisionedThroughputExceeded {}, - TransactionConflict {}, - ThrottlingError {}, - InternalServerError {}, - ResourceNotFound {}, - AccessDenied {}, - DuplicateItem {} - } - - impl BatchStatementErrorCodeEnum {} - - impl Debug - for BatchStatementErrorCodeEnum { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for BatchExecuteStatementInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for BatchStatementErrorCodeEnum { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchStatementErrorCodeEnum::ConditionalCheckFailed{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ConditionalCheckFailed")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ItemCollectionSizeLimitExceeded")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::RequestLimitExceeded{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.RequestLimitExceeded")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::ValidationError{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ValidationError")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ProvisionedThroughputExceeded")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::TransactionConflict{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.TransactionConflict")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::ThrottlingError{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ThrottlingError")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::InternalServerError{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.InternalServerError")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::ResourceNotFound{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ResourceNotFound")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::AccessDenied{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.AccessDenied")?; - Ok(()) - }, - BatchStatementErrorCodeEnum::DuplicateItem{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.DuplicateItem")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(163,3) + #[derive(PartialEq, Clone)] + pub enum BatchExecuteStatementOutput { + BatchExecuteStatementOutput { + Responses: Arc>>>, + ConsumedCapacity: Arc>>> + } + } - impl BatchStatementErrorCodeEnum { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(BatchStatementErrorCodeEnum::ConditionalCheckFailed {}), Rc::new(BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded {}), Rc::new(BatchStatementErrorCodeEnum::RequestLimitExceeded {}), Rc::new(BatchStatementErrorCodeEnum::ValidationError {}), Rc::new(BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded {}), Rc::new(BatchStatementErrorCodeEnum::TransactionConflict {}), Rc::new(BatchStatementErrorCodeEnum::ThrottlingError {}), Rc::new(BatchStatementErrorCodeEnum::InternalServerError {}), Rc::new(BatchStatementErrorCodeEnum::ResourceNotFound {}), Rc::new(BatchStatementErrorCodeEnum::AccessDenied {}), Rc::new(BatchStatementErrorCodeEnum::DuplicateItem {})].iter() - } - } + impl BatchExecuteStatementOutput { + /// Returns a borrow of the field Responses + pub fn Responses(&self) -> &Arc>>> { + match self { + BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => Responses, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl Eq - for BatchStatementErrorCodeEnum {} + impl Debug + for BatchExecuteStatementOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for BatchStatementErrorCodeEnum { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchStatementErrorCodeEnum::ConditionalCheckFailed{} => { + impl DafnyPrint + for BatchExecuteStatementOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchExecuteStatementOutput.BatchExecuteStatementOutput(")?; + DafnyPrint::fmt_print(Responses, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded{} => { + impl Eq + for BatchExecuteStatementOutput {} + + impl Hash + for BatchExecuteStatementOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchExecuteStatementOutput::BatchExecuteStatementOutput{Responses, ConsumedCapacity, } => { + Hash::hash(Responses, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - }, - BatchStatementErrorCodeEnum::RequestLimitExceeded{} => { + impl Default + for BatchExecuteStatementOutput { + fn default() -> BatchExecuteStatementOutput { + BatchExecuteStatementOutput::BatchExecuteStatementOutput { + Responses: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - }, - BatchStatementErrorCodeEnum::ValidationError{} => { + impl AsRef + for BatchExecuteStatementOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(167,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemInput { + BatchGetItemInput { + RequestItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetRequestMap, + ReturnConsumedCapacity: Arc>> + } + } - }, - BatchStatementErrorCodeEnum::TransactionConflict{} => { + impl BatchGetItemInput { + /// Returns a borrow of the field RequestItems + pub fn RequestItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchGetRequestMap { + match self { + BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => RequestItems, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => ReturnConsumedCapacity, + } + } + } - }, - BatchStatementErrorCodeEnum::ThrottlingError{} => { + impl Debug + for BatchGetItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - BatchStatementErrorCodeEnum::InternalServerError{} => { + impl DafnyPrint + for BatchGetItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchGetItemInput.BatchGetItemInput(")?; + DafnyPrint::fmt_print(RequestItems, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - BatchStatementErrorCodeEnum::ResourceNotFound{} => { + impl Eq + for BatchGetItemInput {} + + impl Hash + for BatchGetItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemInput::BatchGetItemInput{RequestItems, ReturnConsumedCapacity, } => { + Hash::hash(RequestItems, _state); + Hash::hash(ReturnConsumedCapacity, _state) + }, + } + } + } - }, - BatchStatementErrorCodeEnum::AccessDenied{} => { + impl Default + for BatchGetItemInput { + fn default() -> BatchGetItemInput { + BatchGetItemInput::BatchGetItemInput { + RequestItems: Default::default(), + ReturnConsumedCapacity: Default::default() + } + } + } - }, - BatchStatementErrorCodeEnum::DuplicateItem{} => { + impl AsRef + for BatchGetItemInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(171,3) + #[derive(PartialEq, Clone)] + pub enum BatchGetItemOutput { + BatchGetItemOutput { + Responses: Arc, Sequence, Arc>>>>>, + UnprocessedKeys: Arc>, + ConsumedCapacity: Arc>>> + } + } - impl Default - for BatchStatementErrorCodeEnum { - fn default() -> BatchStatementErrorCodeEnum { - BatchStatementErrorCodeEnum::ConditionalCheckFailed {} - } - } + impl BatchGetItemOutput { + /// Returns a borrow of the field Responses + pub fn Responses(&self) -> &Arc, Sequence, Arc>>>>> { + match self { + BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => Responses, + } + } + /// Returns a borrow of the field UnprocessedKeys + pub fn UnprocessedKeys(&self) -> &Arc> { + match self { + BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => UnprocessedKeys, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl AsRef - for &BatchStatementErrorCodeEnum { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for BatchGetItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum BatchStatementRequest { - BatchStatementRequest { - Statement: Sequence, - Parameters: Rc>, - ConsistentRead: Rc> - } - } + impl DafnyPrint + for BatchGetItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchGetItemOutput.BatchGetItemOutput(")?; + DafnyPrint::fmt_print(Responses, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(UnprocessedKeys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl BatchStatementRequest { - pub fn Statement(&self) -> &Sequence { - match self { - BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => Statement, - } - } - pub fn Parameters(&self) -> &Rc> { - match self { - BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => Parameters, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => ConsistentRead, - } - } - } + impl Eq + for BatchGetItemOutput {} + + impl Hash + for BatchGetItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchGetItemOutput::BatchGetItemOutput{Responses, UnprocessedKeys, ConsumedCapacity, } => { + Hash::hash(Responses, _state); + Hash::hash(UnprocessedKeys, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - impl Debug - for BatchStatementRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for BatchGetItemOutput { + fn default() -> BatchGetItemOutput { + BatchGetItemOutput::BatchGetItemOutput { + Responses: Default::default(), + UnprocessedKeys: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - impl DafnyPrint - for BatchStatementRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementRequest.BatchStatementRequest(")?; - DafnyPrint::fmt_print(Statement, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Parameters, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for BatchGetItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for BatchStatementRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(176,3) + pub type BatchGetRequestMap = Map, Arc>; - impl Hash - for BatchStatementRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => { - Hash::hash(Statement, _state); - Hash::hash(Parameters, _state); - Hash::hash(ConsistentRead, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(181,3) + #[derive(PartialEq, Clone)] + pub enum BatchStatementError { + BatchStatementError { + Code: Arc>>, + Message: Arc>> + } + } - impl Default - for BatchStatementRequest { - fn default() -> BatchStatementRequest { - BatchStatementRequest::BatchStatementRequest { - Statement: Default::default(), - Parameters: Default::default(), - ConsistentRead: Default::default() - } - } - } + impl BatchStatementError { + /// Returns a borrow of the field Code + pub fn Code(&self) -> &Arc>> { + match self { + BatchStatementError::BatchStatementError{Code, Message, } => Code, + } + } + /// Returns a borrow of the field Message + pub fn Message(&self) -> &Arc>> { + match self { + BatchStatementError::BatchStatementError{Code, Message, } => Message, + } + } + } - impl AsRef - for &BatchStatementRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for BatchStatementError { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum BatchStatementResponse { - BatchStatementResponse { - Error: Rc>>, - TableName: Rc>>, - Item: Rc, Rc>>> - } - } + impl DafnyPrint + for BatchStatementError { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchStatementError::BatchStatementError{Code, Message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementError.BatchStatementError(")?; + DafnyPrint::fmt_print(Code, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl BatchStatementResponse { - pub fn Error(&self) -> &Rc>> { - match self { - BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => Error, - } - } - pub fn TableName(&self) -> &Rc>> { - match self { - BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => TableName, - } - } - pub fn Item(&self) -> &Rc, Rc>>> { - match self { - BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => Item, - } - } - } + impl Eq + for BatchStatementError {} + + impl Hash + for BatchStatementError { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchStatementError::BatchStatementError{Code, Message, } => { + Hash::hash(Code, _state); + Hash::hash(Message, _state) + }, + } + } + } - impl Debug - for BatchStatementResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for BatchStatementError { + fn default() -> BatchStatementError { + BatchStatementError::BatchStatementError { + Code: Default::default(), + Message: Default::default() + } + } + } - impl DafnyPrint - for BatchStatementResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementResponse.BatchStatementResponse(")?; - DafnyPrint::fmt_print(Error, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for BatchStatementError { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for BatchStatementResponse {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(185,3) + #[derive(PartialEq, Clone)] + pub enum BatchStatementErrorCodeEnum { + ConditionalCheckFailed {}, + ItemCollectionSizeLimitExceeded {}, + RequestLimitExceeded {}, + ValidationError {}, + ProvisionedThroughputExceeded {}, + TransactionConflict {}, + ThrottlingError {}, + InternalServerError {}, + ResourceNotFound {}, + AccessDenied {}, + DuplicateItem {} + } - impl Hash - for BatchStatementResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => { - Hash::hash(Error, _state); - Hash::hash(TableName, _state); - Hash::hash(Item, _state) - }, - } - } - } + impl BatchStatementErrorCodeEnum {} - impl Default - for BatchStatementResponse { - fn default() -> BatchStatementResponse { - BatchStatementResponse::BatchStatementResponse { - Error: Default::default(), - TableName: Default::default(), - Item: Default::default() - } - } - } + impl Debug + for BatchStatementErrorCodeEnum { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &BatchStatementResponse { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for BatchStatementErrorCodeEnum { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchStatementErrorCodeEnum::ConditionalCheckFailed{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ConditionalCheckFailed")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ItemCollectionSizeLimitExceeded")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::RequestLimitExceeded{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.RequestLimitExceeded")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::ValidationError{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ValidationError")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ProvisionedThroughputExceeded")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::TransactionConflict{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.TransactionConflict")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::ThrottlingError{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ThrottlingError")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::InternalServerError{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.InternalServerError")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::ResourceNotFound{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.ResourceNotFound")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::AccessDenied{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.AccessDenied")?; + Ok(()) + }, + BatchStatementErrorCodeEnum::DuplicateItem{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementErrorCodeEnum.DuplicateItem")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemInput { - BatchWriteItemInput { - RequestItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemRequestMap, - ReturnConsumedCapacity: Rc>>, - ReturnItemCollectionMetrics: Rc>> - } - } + impl BatchStatementErrorCodeEnum { + /// Enumerates all possible values of BatchStatementErrorCodeEnum + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(BatchStatementErrorCodeEnum::ConditionalCheckFailed {}), Arc::new(BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded {}), Arc::new(BatchStatementErrorCodeEnum::RequestLimitExceeded {}), Arc::new(BatchStatementErrorCodeEnum::ValidationError {}), Arc::new(BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded {}), Arc::new(BatchStatementErrorCodeEnum::TransactionConflict {}), Arc::new(BatchStatementErrorCodeEnum::ThrottlingError {}), Arc::new(BatchStatementErrorCodeEnum::InternalServerError {}), Arc::new(BatchStatementErrorCodeEnum::ResourceNotFound {}), Arc::new(BatchStatementErrorCodeEnum::AccessDenied {}), Arc::new(BatchStatementErrorCodeEnum::DuplicateItem {})].iter() + } + } - impl BatchWriteItemInput { - pub fn RequestItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemRequestMap { - match self { - BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => RequestItems, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => ReturnConsumedCapacity, - } - } - pub fn ReturnItemCollectionMetrics(&self) -> &Rc>> { - match self { - BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => ReturnItemCollectionMetrics, - } - } - } + impl Eq + for BatchStatementErrorCodeEnum {} - impl Debug - for BatchWriteItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for BatchStatementErrorCodeEnum { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchStatementErrorCodeEnum::ConditionalCheckFailed{} => { - impl DafnyPrint - for BatchWriteItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchWriteItemInput.BatchWriteItemInput(")?; - DafnyPrint::fmt_print(RequestItems, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + BatchStatementErrorCodeEnum::ItemCollectionSizeLimitExceeded{} => { - impl Eq - for BatchWriteItemInput {} + }, + BatchStatementErrorCodeEnum::RequestLimitExceeded{} => { - impl Hash - for BatchWriteItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => { - Hash::hash(RequestItems, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ReturnItemCollectionMetrics, _state) - }, - } - } - } + }, + BatchStatementErrorCodeEnum::ValidationError{} => { - impl Default - for BatchWriteItemInput { - fn default() -> BatchWriteItemInput { - BatchWriteItemInput::BatchWriteItemInput { - RequestItems: Default::default(), - ReturnConsumedCapacity: Default::default(), - ReturnItemCollectionMetrics: Default::default() - } - } - } + }, + BatchStatementErrorCodeEnum::ProvisionedThroughputExceeded{} => { - impl AsRef - for &BatchWriteItemInput { - fn as_ref(&self) -> Self { - self - } - } + }, + BatchStatementErrorCodeEnum::TransactionConflict{} => { - #[derive(PartialEq, Clone)] - pub enum BatchWriteItemOutput { - BatchWriteItemOutput { - UnprocessedItems: Rc>, - ItemCollectionMetrics: Rc, Sequence>>>>, - ConsumedCapacity: Rc>>> - } - } + }, + BatchStatementErrorCodeEnum::ThrottlingError{} => { - impl BatchWriteItemOutput { - pub fn UnprocessedItems(&self) -> &Rc> { - match self { - BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => UnprocessedItems, - } - } - pub fn ItemCollectionMetrics(&self) -> &Rc, Sequence>>>> { - match self { - BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => ItemCollectionMetrics, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>>> { - match self { - BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => ConsumedCapacity, - } - } - } + }, + BatchStatementErrorCodeEnum::InternalServerError{} => { - impl Debug - for BatchWriteItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + BatchStatementErrorCodeEnum::ResourceNotFound{} => { - impl DafnyPrint - for BatchWriteItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchWriteItemOutput.BatchWriteItemOutput(")?; - DafnyPrint::fmt_print(UnprocessedItems, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + BatchStatementErrorCodeEnum::AccessDenied{} => { - impl Eq - for BatchWriteItemOutput {} + }, + BatchStatementErrorCodeEnum::DuplicateItem{} => { - impl Hash - for BatchWriteItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => { - Hash::hash(UnprocessedItems, _state); - Hash::hash(ItemCollectionMetrics, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + }, + } + } + } - impl Default - for BatchWriteItemOutput { - fn default() -> BatchWriteItemOutput { - BatchWriteItemOutput::BatchWriteItemOutput { - UnprocessedItems: Default::default(), - ItemCollectionMetrics: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + impl Default + for BatchStatementErrorCodeEnum { + fn default() -> BatchStatementErrorCodeEnum { + BatchStatementErrorCodeEnum::ConditionalCheckFailed {} + } + } - impl AsRef - for &BatchWriteItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchStatementErrorCodeEnum { + fn as_ref(&self) -> &Self { + self + } + } - pub type BatchWriteItemRequestMap = Map, crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequests>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(197,3) + #[derive(PartialEq, Clone)] + pub enum BatchStatementRequest { + BatchStatementRequest { + Statement: Sequence, + Parameters: Arc>, + ConsistentRead: Arc> + } + } - pub type BilledSizeBytes = i64; + impl BatchStatementRequest { + /// Returns a borrow of the field Statement + pub fn Statement(&self) -> &Sequence { + match self { + BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => Statement, + } + } + /// Returns a borrow of the field Parameters + pub fn Parameters(&self) -> &Arc> { + match self { + BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => Parameters, + } + } + /// Returns a borrow of the field ConsistentRead + pub fn ConsistentRead(&self) -> &Arc> { + match self { + BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => ConsistentRead, + } + } + } - #[derive(PartialEq, Clone)] - pub enum BillingMode { - PROVISIONED {}, - PAY_PER_REQUEST {} - } + impl Debug + for BatchStatementRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl BillingMode {} + impl DafnyPrint + for BatchStatementRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementRequest.BatchStatementRequest(")?; + DafnyPrint::fmt_print(Statement, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Parameters, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for BillingMode { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for BatchStatementRequest {} + + impl Hash + for BatchStatementRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchStatementRequest::BatchStatementRequest{Statement, Parameters, ConsistentRead, } => { + Hash::hash(Statement, _state); + Hash::hash(Parameters, _state); + Hash::hash(ConsistentRead, _state) + }, + } + } + } - impl DafnyPrint - for BillingMode { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BillingMode::PROVISIONED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingMode.PROVISIONED")?; - Ok(()) - }, - BillingMode::PAY_PER_REQUEST{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingMode.PAY__PER__REQUEST")?; - Ok(()) - }, - } - } - } + impl Default + for BatchStatementRequest { + fn default() -> BatchStatementRequest { + BatchStatementRequest::BatchStatementRequest { + Statement: Default::default(), + Parameters: Default::default(), + ConsistentRead: Default::default() + } + } + } - impl BillingMode { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(BillingMode::PROVISIONED {}), Rc::new(BillingMode::PAY_PER_REQUEST {})].iter() - } - } + impl AsRef + for BatchStatementRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for BillingMode {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(202,3) + #[derive(PartialEq, Clone)] + pub enum BatchStatementResponse { + BatchStatementResponse { + Error: Arc>>, + TableName: Arc>>, + Item: Arc, Arc>>> + } + } - impl Hash - for BillingMode { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BillingMode::PROVISIONED{} => { + impl BatchStatementResponse { + /// Returns a borrow of the field Error + pub fn Error(&self) -> &Arc>> { + match self { + BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => Error, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => TableName, + } + } + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Arc, Arc>>> { + match self { + BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => Item, + } + } + } - }, - BillingMode::PAY_PER_REQUEST{} => { + impl Debug + for BatchStatementResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for BatchStatementResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchStatementResponse.BatchStatementResponse(")?; + DafnyPrint::fmt_print(Error, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for BillingMode { - fn default() -> BillingMode { - BillingMode::PROVISIONED {} - } - } + impl Eq + for BatchStatementResponse {} + + impl Hash + for BatchStatementResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchStatementResponse::BatchStatementResponse{Error, TableName, Item, } => { + Hash::hash(Error, _state); + Hash::hash(TableName, _state); + Hash::hash(Item, _state) + }, + } + } + } - impl AsRef - for &BillingMode { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for BatchStatementResponse { + fn default() -> BatchStatementResponse { + BatchStatementResponse::BatchStatementResponse { + Error: Default::default(), + TableName: Default::default(), + Item: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum BillingModeSummary { - BillingModeSummary { - BillingMode: Rc>>, - LastUpdateToPayPerRequestDateTime: Rc>> - } - } + impl AsRef + for BatchStatementResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl BillingModeSummary { - pub fn BillingMode(&self) -> &Rc>> { - match self { - BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => BillingMode, - } - } - pub fn LastUpdateToPayPerRequestDateTime(&self) -> &Rc>> { - match self { - BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => LastUpdateToPayPerRequestDateTime, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(207,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemInput { + BatchWriteItemInput { + RequestItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemRequestMap, + ReturnConsumedCapacity: Arc>>, + ReturnItemCollectionMetrics: Arc>> + } + } - impl Debug - for BillingModeSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl BatchWriteItemInput { + /// Returns a borrow of the field RequestItems + pub fn RequestItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::BatchWriteItemRequestMap { + match self { + BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => RequestItems, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ReturnItemCollectionMetrics + pub fn ReturnItemCollectionMetrics(&self) -> &Arc>> { + match self { + BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => ReturnItemCollectionMetrics, + } + } + } - impl DafnyPrint - for BillingModeSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingModeSummary.BillingModeSummary(")?; - DafnyPrint::fmt_print(BillingMode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastUpdateToPayPerRequestDateTime, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for BatchWriteItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for BillingModeSummary {} + impl DafnyPrint + for BatchWriteItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchWriteItemInput.BatchWriteItemInput(")?; + DafnyPrint::fmt_print(RequestItems, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for BillingModeSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => { - Hash::hash(BillingMode, _state); - Hash::hash(LastUpdateToPayPerRequestDateTime, _state) - }, - } - } - } + impl Eq + for BatchWriteItemInput {} + + impl Hash + for BatchWriteItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemInput::BatchWriteItemInput{RequestItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, } => { + Hash::hash(RequestItems, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ReturnItemCollectionMetrics, _state) + }, + } + } + } - impl Default - for BillingModeSummary { - fn default() -> BillingModeSummary { - BillingModeSummary::BillingModeSummary { - BillingMode: Default::default(), - LastUpdateToPayPerRequestDateTime: Default::default() - } - } - } + impl Default + for BatchWriteItemInput { + fn default() -> BatchWriteItemInput { + BatchWriteItemInput::BatchWriteItemInput { + RequestItems: Default::default(), + ReturnConsumedCapacity: Default::default(), + ReturnItemCollectionMetrics: Default::default() + } + } + } - impl AsRef - for &BillingModeSummary { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for BatchWriteItemInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CancellationReason { - CancellationReason { - Item: Rc, Rc>>>, - Code: Rc>>, - Message: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(212,3) + #[derive(PartialEq, Clone)] + pub enum BatchWriteItemOutput { + BatchWriteItemOutput { + UnprocessedItems: Arc>, + ItemCollectionMetrics: Arc, Sequence>>>>, + ConsumedCapacity: Arc>>> + } + } - impl CancellationReason { - pub fn Item(&self) -> &Rc, Rc>>> { - match self { - CancellationReason::CancellationReason{Item, Code, Message, } => Item, - } - } - pub fn Code(&self) -> &Rc>> { - match self { - CancellationReason::CancellationReason{Item, Code, Message, } => Code, - } - } - pub fn Message(&self) -> &Rc>> { - match self { - CancellationReason::CancellationReason{Item, Code, Message, } => Message, - } - } - } + impl BatchWriteItemOutput { + /// Returns a borrow of the field UnprocessedItems + pub fn UnprocessedItems(&self) -> &Arc> { + match self { + BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => UnprocessedItems, + } + } + /// Returns a borrow of the field ItemCollectionMetrics + pub fn ItemCollectionMetrics(&self) -> &Arc, Sequence>>>> { + match self { + BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => ItemCollectionMetrics, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl Debug - for CancellationReason { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BatchWriteItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CancellationReason { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CancellationReason::CancellationReason{Item, Code, Message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CancellationReason.CancellationReason(")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Code, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BatchWriteItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BatchWriteItemOutput.BatchWriteItemOutput(")?; + DafnyPrint::fmt_print(UnprocessedItems, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CancellationReason {} + impl Eq + for BatchWriteItemOutput {} + + impl Hash + for BatchWriteItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BatchWriteItemOutput::BatchWriteItemOutput{UnprocessedItems, ItemCollectionMetrics, ConsumedCapacity, } => { + Hash::hash(UnprocessedItems, _state); + Hash::hash(ItemCollectionMetrics, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - impl Hash - for CancellationReason { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CancellationReason::CancellationReason{Item, Code, Message, } => { - Hash::hash(Item, _state); - Hash::hash(Code, _state); - Hash::hash(Message, _state) - }, - } - } - } + impl Default + for BatchWriteItemOutput { + fn default() -> BatchWriteItemOutput { + BatchWriteItemOutput::BatchWriteItemOutput { + UnprocessedItems: Default::default(), + ItemCollectionMetrics: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - impl Default - for CancellationReason { - fn default() -> CancellationReason { - CancellationReason::CancellationReason { - Item: Default::default(), - Code: Default::default(), - Message: Default::default() - } - } - } + impl AsRef + for BatchWriteItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CancellationReason { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(217,3) + pub type BatchWriteItemRequestMap = Map, crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::WriteRequests>; - pub type CancellationReasonList = Sequence>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(221,3) + pub type BilledSizeBytes = i64; - #[derive(PartialEq, Clone)] - pub enum Capacity { - Capacity { - ReadCapacityUnits: Rc>, - WriteCapacityUnits: Rc>, - CapacityUnits: Rc> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(225,3) + #[derive(PartialEq, Clone)] + pub enum BillingMode { + PROVISIONED {}, + PAY_PER_REQUEST {} + } - impl Capacity { - pub fn ReadCapacityUnits(&self) -> &Rc> { - match self { - Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => ReadCapacityUnits, - } - } - pub fn WriteCapacityUnits(&self) -> &Rc> { - match self { - Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => WriteCapacityUnits, - } - } - pub fn CapacityUnits(&self) -> &Rc> { - match self { - Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => CapacityUnits, - } - } - } + impl BillingMode {} - impl Debug - for Capacity { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for BillingMode { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for Capacity { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Capacity.Capacity(")?; - DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CapacityUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for BillingMode { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BillingMode::PROVISIONED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingMode.PROVISIONED")?; + Ok(()) + }, + BillingMode::PAY_PER_REQUEST{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingMode.PAY__PER__REQUEST")?; + Ok(()) + }, + } + } + } - impl Eq - for Capacity {} + impl BillingMode { + /// Enumerates all possible values of BillingMode + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(BillingMode::PROVISIONED {}), Arc::new(BillingMode::PAY_PER_REQUEST {})].iter() + } + } - impl Hash - for Capacity { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => { - Hash::hash(ReadCapacityUnits, _state); - Hash::hash(WriteCapacityUnits, _state); - Hash::hash(CapacityUnits, _state) - }, - } - } - } - - impl Default - for Capacity { - fn default() -> Capacity { - Capacity::Capacity { - ReadCapacityUnits: Default::default(), - WriteCapacityUnits: Default::default(), - CapacityUnits: Default::default() - } - } - } - - impl AsRef - for &Capacity { - fn as_ref(&self) -> Self { - self - } - } - - pub type ClientRequestToken = Sequence; - - pub type CloudWatchLogGroupArn = Sequence; - - #[derive(PartialEq, Clone)] - pub enum ComparisonOperator { - EQ {}, - NE {}, - IN {}, - LE {}, - LT {}, - GE {}, - GT {}, - BETWEEN {}, - NOT_NULL {}, - NULL {}, - CONTAINS {}, - NOT_CONTAINS {}, - BEGINS_WITH {} - } - - impl ComparisonOperator {} - - impl Debug - for ComparisonOperator { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for BillingMode {} - impl DafnyPrint - for ComparisonOperator { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ComparisonOperator::EQ{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.EQ")?; - Ok(()) - }, - ComparisonOperator::NE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NE")?; - Ok(()) - }, - ComparisonOperator::IN{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.IN")?; - Ok(()) - }, - ComparisonOperator::LE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.LE")?; - Ok(()) - }, - ComparisonOperator::LT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.LT")?; - Ok(()) - }, - ComparisonOperator::GE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.GE")?; - Ok(()) - }, - ComparisonOperator::GT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.GT")?; - Ok(()) - }, - ComparisonOperator::BETWEEN{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.BETWEEN")?; - Ok(()) - }, - ComparisonOperator::NOT_NULL{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NOT__NULL")?; - Ok(()) - }, - ComparisonOperator::NULL{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NULL")?; - Ok(()) - }, - ComparisonOperator::CONTAINS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.CONTAINS")?; - Ok(()) - }, - ComparisonOperator::NOT_CONTAINS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NOT__CONTAINS")?; - Ok(()) - }, - ComparisonOperator::BEGINS_WITH{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.BEGINS__WITH")?; - Ok(()) - }, - } - } - } + impl Hash + for BillingMode { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BillingMode::PROVISIONED{} => { - impl ComparisonOperator { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ComparisonOperator::EQ {}), Rc::new(ComparisonOperator::NE {}), Rc::new(ComparisonOperator::IN {}), Rc::new(ComparisonOperator::LE {}), Rc::new(ComparisonOperator::LT {}), Rc::new(ComparisonOperator::GE {}), Rc::new(ComparisonOperator::GT {}), Rc::new(ComparisonOperator::BETWEEN {}), Rc::new(ComparisonOperator::NOT_NULL {}), Rc::new(ComparisonOperator::NULL {}), Rc::new(ComparisonOperator::CONTAINS {}), Rc::new(ComparisonOperator::NOT_CONTAINS {}), Rc::new(ComparisonOperator::BEGINS_WITH {})].iter() - } - } + }, + BillingMode::PAY_PER_REQUEST{} => { - impl Eq - for ComparisonOperator {} + }, + } + } + } - impl Hash - for ComparisonOperator { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ComparisonOperator::EQ{} => { + impl Default + for BillingMode { + fn default() -> BillingMode { + BillingMode::PROVISIONED {} + } + } - }, - ComparisonOperator::NE{} => { + impl AsRef + for BillingMode { + fn as_ref(&self) -> &Self { + self + } + } - }, - ComparisonOperator::IN{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(228,3) + #[derive(PartialEq, Clone)] + pub enum BillingModeSummary { + BillingModeSummary { + BillingMode: Arc>>, + LastUpdateToPayPerRequestDateTime: Arc>> + } + } - }, - ComparisonOperator::LE{} => { + impl BillingModeSummary { + /// Returns a borrow of the field BillingMode + pub fn BillingMode(&self) -> &Arc>> { + match self { + BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => BillingMode, + } + } + /// Returns a borrow of the field LastUpdateToPayPerRequestDateTime + pub fn LastUpdateToPayPerRequestDateTime(&self) -> &Arc>> { + match self { + BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => LastUpdateToPayPerRequestDateTime, + } + } + } - }, - ComparisonOperator::LT{} => { + impl Debug + for BillingModeSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ComparisonOperator::GE{} => { + impl DafnyPrint + for BillingModeSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.BillingModeSummary.BillingModeSummary(")?; + DafnyPrint::fmt_print(BillingMode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastUpdateToPayPerRequestDateTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ComparisonOperator::GT{} => { + impl Eq + for BillingModeSummary {} + + impl Hash + for BillingModeSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + BillingModeSummary::BillingModeSummary{BillingMode, LastUpdateToPayPerRequestDateTime, } => { + Hash::hash(BillingMode, _state); + Hash::hash(LastUpdateToPayPerRequestDateTime, _state) + }, + } + } + } - }, - ComparisonOperator::BETWEEN{} => { + impl Default + for BillingModeSummary { + fn default() -> BillingModeSummary { + BillingModeSummary::BillingModeSummary { + BillingMode: Default::default(), + LastUpdateToPayPerRequestDateTime: Default::default() + } + } + } - }, - ComparisonOperator::NOT_NULL{} => { + impl AsRef + for BillingModeSummary { + fn as_ref(&self) -> &Self { + self + } + } - }, - ComparisonOperator::NULL{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(236,3) + #[derive(PartialEq, Clone)] + pub enum CancellationReason { + CancellationReason { + Item: Arc, Arc>>>, + Code: Arc>>, + Message: Arc>> + } + } - }, - ComparisonOperator::CONTAINS{} => { + impl CancellationReason { + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Arc, Arc>>> { + match self { + CancellationReason::CancellationReason{Item, Code, Message, } => Item, + } + } + /// Returns a borrow of the field Code + pub fn Code(&self) -> &Arc>> { + match self { + CancellationReason::CancellationReason{Item, Code, Message, } => Code, + } + } + /// Returns a borrow of the field Message + pub fn Message(&self) -> &Arc>> { + match self { + CancellationReason::CancellationReason{Item, Code, Message, } => Message, + } + } + } - }, - ComparisonOperator::NOT_CONTAINS{} => { + impl Debug + for CancellationReason { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ComparisonOperator::BEGINS_WITH{} => { + impl DafnyPrint + for CancellationReason { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CancellationReason::CancellationReason{Item, Code, Message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CancellationReason.CancellationReason(")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Code, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for CancellationReason {} + + impl Hash + for CancellationReason { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CancellationReason::CancellationReason{Item, Code, Message, } => { + Hash::hash(Item, _state); + Hash::hash(Code, _state); + Hash::hash(Message, _state) + }, + } + } + } - impl Default - for ComparisonOperator { - fn default() -> ComparisonOperator { - ComparisonOperator::EQ {} - } - } + impl Default + for CancellationReason { + fn default() -> CancellationReason { + CancellationReason::CancellationReason { + Item: Default::default(), + Code: Default::default(), + Message: Default::default() + } + } + } - impl AsRef - for &ComparisonOperator { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CancellationReason { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum Condition { - Condition { - AttributeValueList: Rc>>>, - ComparisonOperator: Rc - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(241,3) + pub type CancellationReasonList = Sequence>; - impl Condition { - pub fn AttributeValueList(&self) -> &Rc>>> { - match self { - Condition::Condition{AttributeValueList, ComparisonOperator, } => AttributeValueList, - } - } - pub fn ComparisonOperator(&self) -> &Rc { - match self { - Condition::Condition{AttributeValueList, ComparisonOperator, } => ComparisonOperator, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(245,3) + #[derive(PartialEq, Clone)] + pub enum Capacity { + Capacity { + ReadCapacityUnits: Arc>, + WriteCapacityUnits: Arc>, + CapacityUnits: Arc> + } + } - impl Debug - for Condition { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Capacity { + /// Returns a borrow of the field ReadCapacityUnits + pub fn ReadCapacityUnits(&self) -> &Arc> { + match self { + Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => ReadCapacityUnits, + } + } + /// Returns a borrow of the field WriteCapacityUnits + pub fn WriteCapacityUnits(&self) -> &Arc> { + match self { + Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => WriteCapacityUnits, + } + } + /// Returns a borrow of the field CapacityUnits + pub fn CapacityUnits(&self) -> &Arc> { + match self { + Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => CapacityUnits, + } + } + } - impl DafnyPrint - for Condition { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Condition::Condition{AttributeValueList, ComparisonOperator, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Condition.Condition(")?; - DafnyPrint::fmt_print(AttributeValueList, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ComparisonOperator, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for Capacity { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for Condition {} + impl DafnyPrint + for Capacity { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Capacity.Capacity(")?; + DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CapacityUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for Condition { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Condition::Condition{AttributeValueList, ComparisonOperator, } => { - Hash::hash(AttributeValueList, _state); - Hash::hash(ComparisonOperator, _state) - }, - } - } - } + impl Eq + for Capacity {} + + impl Hash + for Capacity { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Capacity::Capacity{ReadCapacityUnits, WriteCapacityUnits, CapacityUnits, } => { + Hash::hash(ReadCapacityUnits, _state); + Hash::hash(WriteCapacityUnits, _state); + Hash::hash(CapacityUnits, _state) + }, + } + } + } - impl Default - for Condition { - fn default() -> Condition { - Condition::Condition { - AttributeValueList: Default::default(), - ComparisonOperator: Default::default() - } - } - } + impl Default + for Capacity { + fn default() -> Capacity { + Capacity::Capacity { + ReadCapacityUnits: Default::default(), + WriteCapacityUnits: Default::default(), + CapacityUnits: Default::default() + } + } + } - impl AsRef - for &Condition { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for Capacity { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ConditionalOperator { - AND {}, - OR {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(250,3) + pub type ClientRequestToken = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(255,3) + pub type CloudWatchLogGroupArn = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(260,3) + #[derive(PartialEq, Clone)] + pub enum ComparisonOperator { + EQ {}, + NE {}, + IN {}, + LE {}, + LT {}, + GE {}, + GT {}, + BETWEEN {}, + NOT_NULL {}, + NULL {}, + CONTAINS {}, + NOT_CONTAINS {}, + BEGINS_WITH {} + } - impl ConditionalOperator {} + impl ComparisonOperator {} - impl Debug - for ConditionalOperator { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ComparisonOperator { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ConditionalOperator { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConditionalOperator::AND{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionalOperator.AND")?; - Ok(()) - }, - ConditionalOperator::OR{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionalOperator.OR")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ComparisonOperator { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ComparisonOperator::EQ{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.EQ")?; + Ok(()) + }, + ComparisonOperator::NE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NE")?; + Ok(()) + }, + ComparisonOperator::IN{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.IN")?; + Ok(()) + }, + ComparisonOperator::LE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.LE")?; + Ok(()) + }, + ComparisonOperator::LT{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.LT")?; + Ok(()) + }, + ComparisonOperator::GE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.GE")?; + Ok(()) + }, + ComparisonOperator::GT{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.GT")?; + Ok(()) + }, + ComparisonOperator::BETWEEN{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.BETWEEN")?; + Ok(()) + }, + ComparisonOperator::NOT_NULL{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NOT__NULL")?; + Ok(()) + }, + ComparisonOperator::NULL{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NULL")?; + Ok(()) + }, + ComparisonOperator::CONTAINS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.CONTAINS")?; + Ok(()) + }, + ComparisonOperator::NOT_CONTAINS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.NOT__CONTAINS")?; + Ok(()) + }, + ComparisonOperator::BEGINS_WITH{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ComparisonOperator.BEGINS__WITH")?; + Ok(()) + }, + } + } + } - impl ConditionalOperator { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ConditionalOperator::AND {}), Rc::new(ConditionalOperator::OR {})].iter() - } - } + impl ComparisonOperator { + /// Enumerates all possible values of ComparisonOperator + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ComparisonOperator::EQ {}), Arc::new(ComparisonOperator::NE {}), Arc::new(ComparisonOperator::IN {}), Arc::new(ComparisonOperator::LE {}), Arc::new(ComparisonOperator::LT {}), Arc::new(ComparisonOperator::GE {}), Arc::new(ComparisonOperator::GT {}), Arc::new(ComparisonOperator::BETWEEN {}), Arc::new(ComparisonOperator::NOT_NULL {}), Arc::new(ComparisonOperator::NULL {}), Arc::new(ComparisonOperator::CONTAINS {}), Arc::new(ComparisonOperator::NOT_CONTAINS {}), Arc::new(ComparisonOperator::BEGINS_WITH {})].iter() + } + } - impl Eq - for ConditionalOperator {} + impl Eq + for ComparisonOperator {} - impl Hash - for ConditionalOperator { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConditionalOperator::AND{} => { + impl Hash + for ComparisonOperator { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ComparisonOperator::EQ{} => { - }, - ConditionalOperator::OR{} => { + }, + ComparisonOperator::NE{} => { - }, - } - } - } - - impl Default - for ConditionalOperator { - fn default() -> ConditionalOperator { - ConditionalOperator::AND {} - } - } - - impl AsRef - for &ConditionalOperator { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ConditionCheck { - ConditionCheck { - Key: Map, Rc>, - TableName: Sequence, - ConditionExpression: Sequence, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>>, - ReturnValuesOnConditionCheckFailure: Rc>> - } - } - - impl ConditionCheck { - pub fn Key(&self) -> &Map, Rc> { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Key, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, - } - } - pub fn ConditionExpression(&self) -> &Sequence { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, - } - } - pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Rc>> { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, - } - } - } - - impl Debug - for ConditionCheck { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ComparisonOperator::IN{} => { - impl DafnyPrint - for ConditionCheck { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionCheck.ConditionCheck(")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ComparisonOperator::LE{} => { - impl Eq - for ConditionCheck {} + }, + ComparisonOperator::LT{} => { - impl Hash - for ConditionCheck { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - Hash::hash(Key, _state); - Hash::hash(TableName, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state); - Hash::hash(ReturnValuesOnConditionCheckFailure, _state) - }, - } - } - } - - impl Default - for ConditionCheck { - fn default() -> ConditionCheck { - ConditionCheck::ConditionCheck { - Key: Default::default(), - TableName: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default(), - ReturnValuesOnConditionCheckFailure: Default::default() - } - } - } - - impl AsRef - for &ConditionCheck { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ConsumedCapacity { - ConsumedCapacity { - TableName: Rc>>, - CapacityUnits: Rc>, - ReadCapacityUnits: Rc>, - WriteCapacityUnits: Rc>, - Table: Rc>>, - LocalSecondaryIndexes: Rc, Rc>>>, - GlobalSecondaryIndexes: Rc, Rc>>> - } - } - - impl ConsumedCapacity { - pub fn TableName(&self) -> &Rc>> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => TableName, - } - } - pub fn CapacityUnits(&self) -> &Rc> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => CapacityUnits, - } - } - pub fn ReadCapacityUnits(&self) -> &Rc> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => ReadCapacityUnits, - } - } - pub fn WriteCapacityUnits(&self) -> &Rc> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => WriteCapacityUnits, - } - } - pub fn Table(&self) -> &Rc>> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => Table, - } - } - pub fn LocalSecondaryIndexes(&self) -> &Rc, Rc>>> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => LocalSecondaryIndexes, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc, Rc>>> { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => GlobalSecondaryIndexes, - } - } - } - - impl Debug - for ConsumedCapacity { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ComparisonOperator::GE{} => { - impl DafnyPrint - for ConsumedCapacity { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConsumedCapacity.ConsumedCapacity(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Table, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ComparisonOperator::GT{} => { - impl Eq - for ConsumedCapacity {} + }, + ComparisonOperator::BETWEEN{} => { - impl Hash - for ConsumedCapacity { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => { - Hash::hash(TableName, _state); - Hash::hash(CapacityUnits, _state); - Hash::hash(ReadCapacityUnits, _state); - Hash::hash(WriteCapacityUnits, _state); - Hash::hash(Table, _state); - Hash::hash(LocalSecondaryIndexes, _state); - Hash::hash(GlobalSecondaryIndexes, _state) - }, - } - } - } + }, + ComparisonOperator::NOT_NULL{} => { - impl Default - for ConsumedCapacity { - fn default() -> ConsumedCapacity { - ConsumedCapacity::ConsumedCapacity { - TableName: Default::default(), - CapacityUnits: Default::default(), - ReadCapacityUnits: Default::default(), - WriteCapacityUnits: Default::default(), - Table: Default::default(), - LocalSecondaryIndexes: Default::default(), - GlobalSecondaryIndexes: Default::default() - } - } - } + }, + ComparisonOperator::NULL{} => { - impl AsRef - for &ConsumedCapacity { - fn as_ref(&self) -> Self { - self - } - } + }, + ComparisonOperator::CONTAINS{} => { - pub type ConsumedCapacityUnits = Sequence; + }, + ComparisonOperator::NOT_CONTAINS{} => { - #[derive(PartialEq, Clone)] - pub enum ContinuousBackupsDescription { - ContinuousBackupsDescription { - ContinuousBackupsStatus: Rc, - PointInTimeRecoveryDescription: Rc>> - } - } + }, + ComparisonOperator::BEGINS_WITH{} => { - impl ContinuousBackupsDescription { - pub fn ContinuousBackupsStatus(&self) -> &Rc { - match self { - ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => ContinuousBackupsStatus, - } - } - pub fn PointInTimeRecoveryDescription(&self) -> &Rc>> { - match self { - ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => PointInTimeRecoveryDescription, - } - } - } + }, + } + } + } - impl Debug - for ContinuousBackupsDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ComparisonOperator { + fn default() -> ComparisonOperator { + ComparisonOperator::EQ {} + } + } - impl DafnyPrint - for ContinuousBackupsDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsDescription.ContinuousBackupsDescription(")?; - DafnyPrint::fmt_print(ContinuousBackupsStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PointInTimeRecoveryDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ComparisonOperator { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ContinuousBackupsDescription {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(274,3) + #[derive(PartialEq, Clone)] + pub enum Condition { + Condition { + AttributeValueList: Arc>>>, + ComparisonOperator: Arc + } + } - impl Hash - for ContinuousBackupsDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => { - Hash::hash(ContinuousBackupsStatus, _state); - Hash::hash(PointInTimeRecoveryDescription, _state) - }, - } - } - } + impl Condition { + /// Returns a borrow of the field AttributeValueList + pub fn AttributeValueList(&self) -> &Arc>>> { + match self { + Condition::Condition{AttributeValueList, ComparisonOperator, } => AttributeValueList, + } + } + /// Returns a borrow of the field ComparisonOperator + pub fn ComparisonOperator(&self) -> &Arc { + match self { + Condition::Condition{AttributeValueList, ComparisonOperator, } => ComparisonOperator, + } + } + } - impl Default - for ContinuousBackupsDescription { - fn default() -> ContinuousBackupsDescription { - ContinuousBackupsDescription::ContinuousBackupsDescription { - ContinuousBackupsStatus: Default::default(), - PointInTimeRecoveryDescription: Default::default() - } - } - } + impl Debug + for Condition { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ContinuousBackupsDescription { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for Condition { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Condition::Condition{AttributeValueList, ComparisonOperator, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Condition.Condition(")?; + DafnyPrint::fmt_print(AttributeValueList, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ComparisonOperator, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ContinuousBackupsStatus { - ENABLED {}, - DISABLED {} - } + impl Eq + for Condition {} + + impl Hash + for Condition { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Condition::Condition{AttributeValueList, ComparisonOperator, } => { + Hash::hash(AttributeValueList, _state); + Hash::hash(ComparisonOperator, _state) + }, + } + } + } - impl ContinuousBackupsStatus {} + impl Default + for Condition { + fn default() -> Condition { + Condition::Condition { + AttributeValueList: Default::default(), + ComparisonOperator: Default::default() + } + } + } - impl Debug - for ContinuousBackupsStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for Condition { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ContinuousBackupsStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ContinuousBackupsStatus::ENABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsStatus.ENABLED")?; - Ok(()) - }, - ContinuousBackupsStatus::DISABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsStatus.DISABLED")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(278,3) + #[derive(PartialEq, Clone)] + pub enum ConditionalOperator { + AND {}, + OR {} + } - impl ContinuousBackupsStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ContinuousBackupsStatus::ENABLED {}), Rc::new(ContinuousBackupsStatus::DISABLED {})].iter() - } - } + impl ConditionalOperator {} - impl Eq - for ContinuousBackupsStatus {} + impl Debug + for ConditionalOperator { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ContinuousBackupsStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ContinuousBackupsStatus::ENABLED{} => { + impl DafnyPrint + for ConditionalOperator { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConditionalOperator::AND{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionalOperator.AND")?; + Ok(()) + }, + ConditionalOperator::OR{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionalOperator.OR")?; + Ok(()) + }, + } + } + } - }, - ContinuousBackupsStatus::DISABLED{} => { + impl ConditionalOperator { + /// Enumerates all possible values of ConditionalOperator + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ConditionalOperator::AND {}), Arc::new(ConditionalOperator::OR {})].iter() + } + } - }, - } - } - } + impl Eq + for ConditionalOperator {} - impl Default - for ContinuousBackupsStatus { - fn default() -> ContinuousBackupsStatus { - ContinuousBackupsStatus::ENABLED {} - } - } + impl Hash + for ConditionalOperator { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConditionalOperator::AND{} => { - impl AsRef - for &ContinuousBackupsStatus { - fn as_ref(&self) -> Self { - self - } - } + }, + ConditionalOperator::OR{} => { - #[derive(PartialEq, Clone)] - pub enum ContributorInsightsAction { - ENABLE {}, - DISABLE {} - } + }, + } + } + } - impl ContributorInsightsAction {} + impl Default + for ConditionalOperator { + fn default() -> ConditionalOperator { + ConditionalOperator::AND {} + } + } - impl Debug - for ContributorInsightsAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ConditionalOperator { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ContributorInsightsAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ContributorInsightsAction::ENABLE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsAction.ENABLE")?; - Ok(()) - }, - ContributorInsightsAction::DISABLE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsAction.DISABLE")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(281,3) + #[derive(PartialEq, Clone)] + pub enum ConditionCheck { + ConditionCheck { + Key: Map, Arc>, + TableName: Sequence, + ConditionExpression: Sequence, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>>, + ReturnValuesOnConditionCheckFailure: Arc>> + } + } - impl ContributorInsightsAction { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ContributorInsightsAction::ENABLE {}), Rc::new(ContributorInsightsAction::DISABLE {})].iter() - } - } + impl ConditionCheck { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Key, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Sequence { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, + } + } + /// Returns a borrow of the field ReturnValuesOnConditionCheckFailure + pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Arc>> { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, + } + } + } - impl Eq - for ContributorInsightsAction {} + impl Debug + for ConditionCheck { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ContributorInsightsAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ContributorInsightsAction::ENABLE{} => { + impl DafnyPrint + for ConditionCheck { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConditionCheck.ConditionCheck(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ContributorInsightsAction::DISABLE{} => { + impl Eq + for ConditionCheck {} + + impl Hash + for ConditionCheck { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConditionCheck::ConditionCheck{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + Hash::hash(Key, _state); + Hash::hash(TableName, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state); + Hash::hash(ReturnValuesOnConditionCheckFailure, _state) + }, + } + } + } - }, - } - } - } + impl Default + for ConditionCheck { + fn default() -> ConditionCheck { + ConditionCheck::ConditionCheck { + Key: Default::default(), + TableName: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default(), + ReturnValuesOnConditionCheckFailure: Default::default() + } + } + } - impl Default - for ContributorInsightsAction { - fn default() -> ContributorInsightsAction { - ContributorInsightsAction::ENABLE {} - } - } + impl AsRef + for ConditionCheck { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ContributorInsightsAction { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(292,3) + #[derive(PartialEq, Clone)] + pub enum ConsumedCapacity { + ConsumedCapacity { + TableName: Arc>>, + CapacityUnits: Arc>, + ReadCapacityUnits: Arc>, + WriteCapacityUnits: Arc>, + Table: Arc>>, + LocalSecondaryIndexes: Arc, Arc>>>, + GlobalSecondaryIndexes: Arc, Arc>>> + } + } - #[derive(PartialEq, Clone)] - pub enum ContributorInsightsStatus { - ENABLING {}, - ENABLED {}, - DISABLING {}, - DISABLED {}, - FAILED {} - } + impl ConsumedCapacity { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => TableName, + } + } + /// Returns a borrow of the field CapacityUnits + pub fn CapacityUnits(&self) -> &Arc> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => CapacityUnits, + } + } + /// Returns a borrow of the field ReadCapacityUnits + pub fn ReadCapacityUnits(&self) -> &Arc> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => ReadCapacityUnits, + } + } + /// Returns a borrow of the field WriteCapacityUnits + pub fn WriteCapacityUnits(&self) -> &Arc> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => WriteCapacityUnits, + } + } + /// Returns a borrow of the field Table + pub fn Table(&self) -> &Arc>> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => Table, + } + } + /// Returns a borrow of the field LocalSecondaryIndexes + pub fn LocalSecondaryIndexes(&self) -> &Arc, Arc>>> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => LocalSecondaryIndexes, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc, Arc>>> { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => GlobalSecondaryIndexes, + } + } + } - impl ContributorInsightsStatus {} + impl Debug + for ConsumedCapacity { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ContributorInsightsStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ConsumedCapacity { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ConsumedCapacity.ConsumedCapacity(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Table, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ContributorInsightsStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ContributorInsightsStatus::ENABLING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.ENABLING")?; - Ok(()) - }, - ContributorInsightsStatus::ENABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.ENABLED")?; - Ok(()) - }, - ContributorInsightsStatus::DISABLING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.DISABLING")?; - Ok(()) - }, - ContributorInsightsStatus::DISABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.DISABLED")?; - Ok(()) - }, - ContributorInsightsStatus::FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.FAILED")?; - Ok(()) - }, - } - } - } + impl Eq + for ConsumedCapacity {} + + impl Hash + for ConsumedCapacity { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConsumedCapacity::ConsumedCapacity{TableName, CapacityUnits, ReadCapacityUnits, WriteCapacityUnits, Table, LocalSecondaryIndexes, GlobalSecondaryIndexes, } => { + Hash::hash(TableName, _state); + Hash::hash(CapacityUnits, _state); + Hash::hash(ReadCapacityUnits, _state); + Hash::hash(WriteCapacityUnits, _state); + Hash::hash(Table, _state); + Hash::hash(LocalSecondaryIndexes, _state); + Hash::hash(GlobalSecondaryIndexes, _state) + }, + } + } + } - impl ContributorInsightsStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ContributorInsightsStatus::ENABLING {}), Rc::new(ContributorInsightsStatus::ENABLED {}), Rc::new(ContributorInsightsStatus::DISABLING {}), Rc::new(ContributorInsightsStatus::DISABLED {}), Rc::new(ContributorInsightsStatus::FAILED {})].iter() - } - } + impl Default + for ConsumedCapacity { + fn default() -> ConsumedCapacity { + ConsumedCapacity::ConsumedCapacity { + TableName: Default::default(), + CapacityUnits: Default::default(), + ReadCapacityUnits: Default::default(), + WriteCapacityUnits: Default::default(), + Table: Default::default(), + LocalSecondaryIndexes: Default::default(), + GlobalSecondaryIndexes: Default::default() + } + } + } - impl Eq - for ContributorInsightsStatus {} + impl AsRef + for ConsumedCapacity { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ContributorInsightsStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ContributorInsightsStatus::ENABLING{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(302,3) + pub type ConsumedCapacityUnits = Sequence; - }, - ContributorInsightsStatus::ENABLED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(306,3) + #[derive(PartialEq, Clone)] + pub enum ContinuousBackupsDescription { + ContinuousBackupsDescription { + ContinuousBackupsStatus: Arc, + PointInTimeRecoveryDescription: Arc>> + } + } - }, - ContributorInsightsStatus::DISABLING{} => { + impl ContinuousBackupsDescription { + /// Returns a borrow of the field ContinuousBackupsStatus + pub fn ContinuousBackupsStatus(&self) -> &Arc { + match self { + ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => ContinuousBackupsStatus, + } + } + /// Returns a borrow of the field PointInTimeRecoveryDescription + pub fn PointInTimeRecoveryDescription(&self) -> &Arc>> { + match self { + ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => PointInTimeRecoveryDescription, + } + } + } - }, - ContributorInsightsStatus::DISABLED{} => { + impl Debug + for ContinuousBackupsDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ContributorInsightsStatus::FAILED{} => { + impl DafnyPrint + for ContinuousBackupsDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsDescription.ContinuousBackupsDescription(")?; + DafnyPrint::fmt_print(ContinuousBackupsStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PointInTimeRecoveryDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for ContinuousBackupsDescription {} + + impl Hash + for ContinuousBackupsDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ContinuousBackupsDescription::ContinuousBackupsDescription{ContinuousBackupsStatus, PointInTimeRecoveryDescription, } => { + Hash::hash(ContinuousBackupsStatus, _state); + Hash::hash(PointInTimeRecoveryDescription, _state) + }, + } + } + } - impl Default - for ContributorInsightsStatus { - fn default() -> ContributorInsightsStatus { - ContributorInsightsStatus::ENABLING {} - } - } + impl Default + for ContinuousBackupsDescription { + fn default() -> ContinuousBackupsDescription { + ContinuousBackupsDescription::ContinuousBackupsDescription { + ContinuousBackupsStatus: Default::default(), + PointInTimeRecoveryDescription: Default::default() + } + } + } - impl AsRef - for &ContributorInsightsStatus { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ContinuousBackupsDescription { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ContributorInsightsSummary { - ContributorInsightsSummary { - TableName: Rc>>, - IndexName: Rc>>, - ContributorInsightsStatus: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(310,3) + #[derive(PartialEq, Clone)] + pub enum ContinuousBackupsStatus { + ENABLED {}, + DISABLED {} + } - impl ContributorInsightsSummary { - pub fn TableName(&self) -> &Rc>> { - match self { - ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => TableName, - } - } - pub fn IndexName(&self) -> &Rc>> { - match self { - ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => IndexName, - } - } - pub fn ContributorInsightsStatus(&self) -> &Rc>> { - match self { - ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => ContributorInsightsStatus, - } - } - } + impl ContinuousBackupsStatus {} - impl Debug - for ContributorInsightsSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ContinuousBackupsStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ContributorInsightsSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsSummary.ContributorInsightsSummary(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ContributorInsightsStatus, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ContinuousBackupsStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ContinuousBackupsStatus::ENABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsStatus.ENABLED")?; + Ok(()) + }, + ContinuousBackupsStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContinuousBackupsStatus.DISABLED")?; + Ok(()) + }, + } + } + } - impl Eq - for ContributorInsightsSummary {} + impl ContinuousBackupsStatus { + /// Enumerates all possible values of ContinuousBackupsStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ContinuousBackupsStatus::ENABLED {}), Arc::new(ContinuousBackupsStatus::DISABLED {})].iter() + } + } - impl Hash - for ContributorInsightsSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => { - Hash::hash(TableName, _state); - Hash::hash(IndexName, _state); - Hash::hash(ContributorInsightsStatus, _state) - }, - } - } - } + impl Eq + for ContinuousBackupsStatus {} - impl Default - for ContributorInsightsSummary { - fn default() -> ContributorInsightsSummary { - ContributorInsightsSummary::ContributorInsightsSummary { - TableName: Default::default(), - IndexName: Default::default(), - ContributorInsightsStatus: Default::default() - } - } - } + impl Hash + for ContinuousBackupsStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ContinuousBackupsStatus::ENABLED{} => { - impl AsRef - for &ContributorInsightsSummary { - fn as_ref(&self) -> Self { - self - } - } + }, + ContinuousBackupsStatus::DISABLED{} => { - #[derive(PartialEq, Clone)] - pub enum CreateBackupInput { - CreateBackupInput { - TableName: Sequence, - BackupName: Sequence - } - } + }, + } + } + } - impl CreateBackupInput { - pub fn TableName(&self) -> &Sequence { - match self { - CreateBackupInput::CreateBackupInput{TableName, BackupName, } => TableName, - } - } - pub fn BackupName(&self) -> &Sequence { - match self { - CreateBackupInput::CreateBackupInput{TableName, BackupName, } => BackupName, - } - } - } + impl Default + for ContinuousBackupsStatus { + fn default() -> ContinuousBackupsStatus { + ContinuousBackupsStatus::ENABLED {} + } + } - impl Debug - for CreateBackupInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ContinuousBackupsStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateBackupInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateBackupInput::CreateBackupInput{TableName, BackupName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateBackupInput.CreateBackupInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(313,3) + #[derive(PartialEq, Clone)] + pub enum ContributorInsightsAction { + ENABLE {}, + DISABLE {} + } - impl Eq - for CreateBackupInput {} + impl ContributorInsightsAction {} - impl Hash - for CreateBackupInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateBackupInput::CreateBackupInput{TableName, BackupName, } => { - Hash::hash(TableName, _state); - Hash::hash(BackupName, _state) - }, - } - } - } + impl Debug + for ContributorInsightsAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for CreateBackupInput { - fn default() -> CreateBackupInput { - CreateBackupInput::CreateBackupInput { - TableName: Default::default(), - BackupName: Default::default() - } - } - } + impl DafnyPrint + for ContributorInsightsAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ContributorInsightsAction::ENABLE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsAction.ENABLE")?; + Ok(()) + }, + ContributorInsightsAction::DISABLE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsAction.DISABLE")?; + Ok(()) + }, + } + } + } - impl AsRef - for &CreateBackupInput { - fn as_ref(&self) -> Self { - self - } - } + impl ContributorInsightsAction { + /// Enumerates all possible values of ContributorInsightsAction + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ContributorInsightsAction::ENABLE {}), Arc::new(ContributorInsightsAction::DISABLE {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum CreateBackupOutput { - CreateBackupOutput { - BackupDetails: Rc>> - } - } + impl Eq + for ContributorInsightsAction {} - impl CreateBackupOutput { - pub fn BackupDetails(&self) -> &Rc>> { - match self { - CreateBackupOutput::CreateBackupOutput{BackupDetails, } => BackupDetails, - } - } - } + impl Hash + for ContributorInsightsAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ContributorInsightsAction::ENABLE{} => { - impl Debug - for CreateBackupOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ContributorInsightsAction::DISABLE{} => { - impl DafnyPrint - for CreateBackupOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateBackupOutput::CreateBackupOutput{BackupDetails, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateBackupOutput.CreateBackupOutput(")?; - DafnyPrint::fmt_print(BackupDetails, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl Eq - for CreateBackupOutput {} + impl Default + for ContributorInsightsAction { + fn default() -> ContributorInsightsAction { + ContributorInsightsAction::ENABLE {} + } + } - impl Hash - for CreateBackupOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateBackupOutput::CreateBackupOutput{BackupDetails, } => { - Hash::hash(BackupDetails, _state) - }, - } - } - } - - impl Default - for CreateBackupOutput { - fn default() -> CreateBackupOutput { - CreateBackupOutput::CreateBackupOutput { - BackupDetails: Default::default() - } - } - } - - impl AsRef - for &CreateBackupOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateGlobalSecondaryIndexAction { - CreateGlobalSecondaryIndexAction { - IndexName: Sequence, - KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, - Projection: Rc, - ProvisionedThroughput: Rc>>, - OnDemandThroughput: Rc>> - } - } - - impl CreateGlobalSecondaryIndexAction { - pub fn IndexName(&self) -> &Sequence { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, - } - } - pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for CreateGlobalSecondaryIndexAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ContributorInsightsAction { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateGlobalSecondaryIndexAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalSecondaryIndexAction.CreateGlobalSecondaryIndexAction(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(318,3) + #[derive(PartialEq, Clone)] + pub enum ContributorInsightsStatus { + ENABLING {}, + ENABLED {}, + DISABLING {}, + DISABLED {}, + FAILED {} + } - impl Eq - for CreateGlobalSecondaryIndexAction {} + impl ContributorInsightsStatus {} - impl Hash - for CreateGlobalSecondaryIndexAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } + impl Debug + for ContributorInsightsStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for CreateGlobalSecondaryIndexAction { - fn default() -> CreateGlobalSecondaryIndexAction { - CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default(), - ProvisionedThroughput: Default::default(), - OnDemandThroughput: Default::default() - } - } - } + impl DafnyPrint + for ContributorInsightsStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ContributorInsightsStatus::ENABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.ENABLING")?; + Ok(()) + }, + ContributorInsightsStatus::ENABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.ENABLED")?; + Ok(()) + }, + ContributorInsightsStatus::DISABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.DISABLING")?; + Ok(()) + }, + ContributorInsightsStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.DISABLED")?; + Ok(()) + }, + ContributorInsightsStatus::FAILED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsStatus.FAILED")?; + Ok(()) + }, + } + } + } - impl AsRef - for &CreateGlobalSecondaryIndexAction { - fn as_ref(&self) -> Self { - self - } - } + impl ContributorInsightsStatus { + /// Enumerates all possible values of ContributorInsightsStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ContributorInsightsStatus::ENABLING {}), Arc::new(ContributorInsightsStatus::ENABLED {}), Arc::new(ContributorInsightsStatus::DISABLING {}), Arc::new(ContributorInsightsStatus::DISABLED {}), Arc::new(ContributorInsightsStatus::FAILED {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum CreateGlobalTableInput { - CreateGlobalTableInput { - GlobalTableName: Sequence, - ReplicationGroup: Sequence> - } - } + impl Eq + for ContributorInsightsStatus {} - impl CreateGlobalTableInput { - pub fn GlobalTableName(&self) -> &Sequence { - match self { - CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => GlobalTableName, - } - } - pub fn ReplicationGroup(&self) -> &Sequence> { - match self { - CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => ReplicationGroup, - } - } - } + impl Hash + for ContributorInsightsStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ContributorInsightsStatus::ENABLING{} => { - impl Debug - for CreateGlobalTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ContributorInsightsStatus::ENABLED{} => { - impl DafnyPrint - for CreateGlobalTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalTableInput.CreateGlobalTableInput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ContributorInsightsStatus::DISABLING{} => { - impl Eq - for CreateGlobalTableInput {} + }, + ContributorInsightsStatus::DISABLED{} => { - impl Hash - for CreateGlobalTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(ReplicationGroup, _state) - }, - } - } - } + }, + ContributorInsightsStatus::FAILED{} => { - impl Default - for CreateGlobalTableInput { - fn default() -> CreateGlobalTableInput { - CreateGlobalTableInput::CreateGlobalTableInput { - GlobalTableName: Default::default(), - ReplicationGroup: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &CreateGlobalTableInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ContributorInsightsStatus { + fn default() -> ContributorInsightsStatus { + ContributorInsightsStatus::ENABLING {} + } + } - #[derive(PartialEq, Clone)] - pub enum CreateGlobalTableOutput { - CreateGlobalTableOutput { - GlobalTableDescription: Rc>> - } - } + impl AsRef + for ContributorInsightsStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl CreateGlobalTableOutput { - pub fn GlobalTableDescription(&self) -> &Rc>> { - match self { - CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(325,3) + #[derive(PartialEq, Clone)] + pub enum ContributorInsightsSummary { + ContributorInsightsSummary { + TableName: Arc>>, + IndexName: Arc>>, + ContributorInsightsStatus: Arc>> + } + } - impl Debug - for CreateGlobalTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ContributorInsightsSummary { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => IndexName, + } + } + /// Returns a borrow of the field ContributorInsightsStatus + pub fn ContributorInsightsStatus(&self) -> &Arc>> { + match self { + ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => ContributorInsightsStatus, + } + } + } - impl DafnyPrint - for CreateGlobalTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalTableOutput.CreateGlobalTableOutput(")?; - DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ContributorInsightsSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateGlobalTableOutput {} + impl DafnyPrint + for ContributorInsightsSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ContributorInsightsSummary.ContributorInsightsSummary(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ContributorInsightsStatus, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateGlobalTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => { - Hash::hash(GlobalTableDescription, _state) - }, - } - } - } + impl Eq + for ContributorInsightsSummary {} + + impl Hash + for ContributorInsightsSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ContributorInsightsSummary::ContributorInsightsSummary{TableName, IndexName, ContributorInsightsStatus, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state); + Hash::hash(ContributorInsightsStatus, _state) + }, + } + } + } - impl Default - for CreateGlobalTableOutput { - fn default() -> CreateGlobalTableOutput { - CreateGlobalTableOutput::CreateGlobalTableOutput { - GlobalTableDescription: Default::default() - } - } - } + impl Default + for ContributorInsightsSummary { + fn default() -> ContributorInsightsSummary { + ContributorInsightsSummary::ContributorInsightsSummary { + TableName: Default::default(), + IndexName: Default::default(), + ContributorInsightsStatus: Default::default() + } + } + } - impl AsRef - for &CreateGlobalTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ContributorInsightsSummary { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum CreateReplicaAction { - CreateReplicaAction { - RegionName: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(330,3) + #[derive(PartialEq, Clone)] + pub enum CreateBackupInput { + CreateBackupInput { + TableName: Sequence, + BackupName: Sequence + } + } - impl CreateReplicaAction { - pub fn RegionName(&self) -> &Sequence { - match self { - CreateReplicaAction::CreateReplicaAction{RegionName, } => RegionName, - } - } - } + impl CreateBackupInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + CreateBackupInput::CreateBackupInput{TableName, BackupName, } => TableName, + } + } + /// Returns a borrow of the field BackupName + pub fn BackupName(&self) -> &Sequence { + match self { + CreateBackupInput::CreateBackupInput{TableName, BackupName, } => BackupName, + } + } + } - impl Debug - for CreateReplicaAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for CreateBackupInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateReplicaAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateReplicaAction::CreateReplicaAction{RegionName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateReplicaAction.CreateReplicaAction(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for CreateBackupInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateBackupInput::CreateBackupInput{TableName, BackupName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateBackupInput.CreateBackupInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateReplicaAction {} + impl Eq + for CreateBackupInput {} + + impl Hash + for CreateBackupInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateBackupInput::CreateBackupInput{TableName, BackupName, } => { + Hash::hash(TableName, _state); + Hash::hash(BackupName, _state) + }, + } + } + } - impl Hash - for CreateReplicaAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateReplicaAction::CreateReplicaAction{RegionName, } => { - Hash::hash(RegionName, _state) - }, - } - } - } - - impl Default - for CreateReplicaAction { - fn default() -> CreateReplicaAction { - CreateReplicaAction::CreateReplicaAction { - RegionName: Default::default() - } - } - } - - impl AsRef - for &CreateReplicaAction { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateReplicationGroupMemberAction { - CreateReplicationGroupMemberAction { - RegionName: Sequence, - KMSMasterKeyId: Rc>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>>, - GlobalSecondaryIndexes: Rc>, - TableClassOverride: Rc>> - } - } - - impl CreateReplicationGroupMemberAction { - pub fn RegionName(&self) -> &Sequence { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => RegionName, - } - } - pub fn KMSMasterKeyId(&self) -> &Rc>> { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => KMSMasterKeyId, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => OnDemandThroughputOverride, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc> { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => GlobalSecondaryIndexes, - } - } - pub fn TableClassOverride(&self) -> &Rc>> { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => TableClassOverride, - } - } - } - - impl Debug - for CreateReplicationGroupMemberAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CreateBackupInput { + fn default() -> CreateBackupInput { + CreateBackupInput::CreateBackupInput { + TableName: Default::default(), + BackupName: Default::default() + } + } + } - impl DafnyPrint - for CreateReplicationGroupMemberAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateReplicationGroupMemberAction.CreateReplicationGroupMemberAction(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableClassOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CreateBackupInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for CreateReplicationGroupMemberAction {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(334,3) + #[derive(PartialEq, Clone)] + pub enum CreateBackupOutput { + CreateBackupOutput { + BackupDetails: Arc>> + } + } - impl Hash - for CreateReplicationGroupMemberAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { - Hash::hash(RegionName, _state); - Hash::hash(KMSMasterKeyId, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state); - Hash::hash(GlobalSecondaryIndexes, _state); - Hash::hash(TableClassOverride, _state) - }, - } - } - } - - impl Default - for CreateReplicationGroupMemberAction { - fn default() -> CreateReplicationGroupMemberAction { - CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction { - RegionName: Default::default(), - KMSMasterKeyId: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default(), - GlobalSecondaryIndexes: Default::default(), - TableClassOverride: Default::default() - } - } - } - - impl AsRef - for &CreateReplicationGroupMemberAction { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateTableInput { - CreateTableInput { - AttributeDefinitions: Sequence>, - TableName: Sequence, - KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, - LocalSecondaryIndexes: Rc>>>, - GlobalSecondaryIndexes: Rc>>>, - BillingMode: Rc>>, - ProvisionedThroughput: Rc>>, - StreamSpecification: Rc>>, - SSESpecification: Rc>>, - Tags: Rc>>>, - TableClass: Rc>>, - DeletionProtectionEnabled: Rc>, - ResourcePolicy: Rc>>, - OnDemandThroughput: Rc>> - } - } - - impl CreateTableInput { - pub fn AttributeDefinitions(&self) -> &Sequence> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => AttributeDefinitions, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => TableName, - } - } - pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => KeySchema, - } - } - pub fn LocalSecondaryIndexes(&self) -> &Rc>>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => LocalSecondaryIndexes, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc>>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => GlobalSecondaryIndexes, - } - } - pub fn BillingMode(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => BillingMode, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn StreamSpecification(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => StreamSpecification, - } - } - pub fn SSESpecification(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => SSESpecification, - } - } - pub fn Tags(&self) -> &Rc>>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => Tags, - } - } - pub fn TableClass(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => TableClass, - } - } - pub fn DeletionProtectionEnabled(&self) -> &Rc> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => DeletionProtectionEnabled, - } - } - pub fn ResourcePolicy(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => ResourcePolicy, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for CreateTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateBackupOutput { + /// Returns a borrow of the field BackupDetails + pub fn BackupDetails(&self) -> &Arc>> { + match self { + CreateBackupOutput::CreateBackupOutput{BackupDetails, } => BackupDetails, + } + } + } - impl DafnyPrint - for CreateTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateTableInput.CreateTableInput(")?; - DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BillingMode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamSpecification, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SSESpecification, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableClass, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DeletionProtectionEnabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ResourcePolicy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateBackupOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateTableInput {} + impl DafnyPrint + for CreateBackupOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateBackupOutput::CreateBackupOutput{BackupDetails, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateBackupOutput.CreateBackupOutput(")?; + DafnyPrint::fmt_print(BackupDetails, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => { - Hash::hash(AttributeDefinitions, _state); - Hash::hash(TableName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(LocalSecondaryIndexes, _state); - Hash::hash(GlobalSecondaryIndexes, _state); - Hash::hash(BillingMode, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(StreamSpecification, _state); - Hash::hash(SSESpecification, _state); - Hash::hash(Tags, _state); - Hash::hash(TableClass, _state); - Hash::hash(DeletionProtectionEnabled, _state); - Hash::hash(ResourcePolicy, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } - - impl Default - for CreateTableInput { - fn default() -> CreateTableInput { - CreateTableInput::CreateTableInput { - AttributeDefinitions: Default::default(), - TableName: Default::default(), - KeySchema: Default::default(), - LocalSecondaryIndexes: Default::default(), - GlobalSecondaryIndexes: Default::default(), - BillingMode: Default::default(), - ProvisionedThroughput: Default::default(), - StreamSpecification: Default::default(), - SSESpecification: Default::default(), - Tags: Default::default(), - TableClass: Default::default(), - DeletionProtectionEnabled: Default::default(), - ResourcePolicy: Default::default(), - OnDemandThroughput: Default::default() - } - } - } - - impl AsRef - for &CreateTableInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateTableOutput { - CreateTableOutput { - TableDescription: Rc>> - } - } - - impl CreateTableOutput { - pub fn TableDescription(&self) -> &Rc>> { - match self { - CreateTableOutput::CreateTableOutput{TableDescription, } => TableDescription, - } - } - } - - impl Debug - for CreateTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateBackupOutput {} - impl DafnyPrint - for CreateTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateTableOutput::CreateTableOutput{TableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateTableOutput.CreateTableOutput(")?; - DafnyPrint::fmt_print(TableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for CreateBackupOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateBackupOutput::CreateBackupOutput{BackupDetails, } => { + Hash::hash(BackupDetails, _state) + }, + } + } + } - impl Eq - for CreateTableOutput {} + impl Default + for CreateBackupOutput { + fn default() -> CreateBackupOutput { + CreateBackupOutput::CreateBackupOutput { + BackupDetails: Default::default() + } + } + } - impl Hash - for CreateTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateTableOutput::CreateTableOutput{TableDescription, } => { - Hash::hash(TableDescription, _state) - }, - } - } - } + impl AsRef + for CreateBackupOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for CreateTableOutput { - fn default() -> CreateTableOutput { - CreateTableOutput::CreateTableOutput { - TableDescription: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(337,3) + #[derive(PartialEq, Clone)] + pub enum CreateGlobalSecondaryIndexAction { + CreateGlobalSecondaryIndexAction { + IndexName: Sequence, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + Projection: Arc, + ProvisionedThroughput: Arc>>, + OnDemandThroughput: Arc>> + } + } - impl AsRef - for &CreateTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl CreateGlobalSecondaryIndexAction { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - pub type CsvDelimiter = Sequence; + impl Debug + for CreateGlobalSecondaryIndexAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type CsvHeader = Sequence; + impl DafnyPrint + for CreateGlobalSecondaryIndexAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalSecondaryIndexAction.CreateGlobalSecondaryIndexAction(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type CsvHeaderList = Sequence>; + impl Eq + for CreateGlobalSecondaryIndexAction {} + + impl Hash + for CreateGlobalSecondaryIndexAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CsvOptions { - CsvOptions { - Delimiter: Rc>>, - HeaderList: Rc> - } - } + impl Default + for CreateGlobalSecondaryIndexAction { + fn default() -> CreateGlobalSecondaryIndexAction { + CreateGlobalSecondaryIndexAction::CreateGlobalSecondaryIndexAction { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl CsvOptions { - pub fn Delimiter(&self) -> &Rc>> { - match self { - CsvOptions::CsvOptions{Delimiter, HeaderList, } => Delimiter, - } - } - pub fn HeaderList(&self) -> &Rc> { - match self { - CsvOptions::CsvOptions{Delimiter, HeaderList, } => HeaderList, - } - } - } + impl AsRef + for CreateGlobalSecondaryIndexAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for CsvOptions { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(344,3) + #[derive(PartialEq, Clone)] + pub enum CreateGlobalTableInput { + CreateGlobalTableInput { + GlobalTableName: Sequence, + ReplicationGroup: Sequence> + } + } - impl DafnyPrint - for CsvOptions { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CsvOptions::CsvOptions{Delimiter, HeaderList, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CsvOptions.CsvOptions(")?; - DafnyPrint::fmt_print(Delimiter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(HeaderList, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CreateGlobalTableInput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Sequence { + match self { + CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => GlobalTableName, + } + } + /// Returns a borrow of the field ReplicationGroup + pub fn ReplicationGroup(&self) -> &Sequence> { + match self { + CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => ReplicationGroup, + } + } + } - impl Eq - for CsvOptions {} + impl Debug + for CreateGlobalTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for CsvOptions { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CsvOptions::CsvOptions{Delimiter, HeaderList, } => { - Hash::hash(Delimiter, _state); - Hash::hash(HeaderList, _state) - }, - } - } - } - - impl Default - for CsvOptions { - fn default() -> CsvOptions { - CsvOptions::CsvOptions { - Delimiter: Default::default(), - HeaderList: Default::default() - } - } - } - - impl AsRef - for &CsvOptions { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum Delete { - Delete { - Key: Map, Rc>, - TableName: Sequence, - ConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>>, - ReturnValuesOnConditionCheckFailure: Rc>> - } - } - - impl Delete { - pub fn Key(&self) -> &Map, Rc> { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Key, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, - } - } - pub fn ConditionExpression(&self) -> &Rc>> { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, - } - } - pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Rc>> { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, - } - } - } - - impl Debug - for Delete { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CreateGlobalTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalTableInput.CreateGlobalTableInput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for Delete { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Delete.Delete(")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for CreateGlobalTableInput {} + + impl Hash + for CreateGlobalTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateGlobalTableInput::CreateGlobalTableInput{GlobalTableName, ReplicationGroup, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(ReplicationGroup, _state) + }, + } + } + } - impl Eq - for Delete {} + impl Default + for CreateGlobalTableInput { + fn default() -> CreateGlobalTableInput { + CreateGlobalTableInput::CreateGlobalTableInput { + GlobalTableName: Default::default(), + ReplicationGroup: Default::default() + } + } + } - impl Hash - for Delete { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - Hash::hash(Key, _state); - Hash::hash(TableName, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state); - Hash::hash(ReturnValuesOnConditionCheckFailure, _state) - }, - } - } - } + impl AsRef + for CreateGlobalTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for Delete { - fn default() -> Delete { - Delete::Delete { - Key: Default::default(), - TableName: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default(), - ReturnValuesOnConditionCheckFailure: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(348,3) + #[derive(PartialEq, Clone)] + pub enum CreateGlobalTableOutput { + CreateGlobalTableOutput { + GlobalTableDescription: Arc>> + } + } - impl AsRef - for &Delete { - fn as_ref(&self) -> Self { - self - } - } + impl CreateGlobalTableOutput { + /// Returns a borrow of the field GlobalTableDescription + pub fn GlobalTableDescription(&self) -> &Arc>> { + match self { + CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteBackupInput { - DeleteBackupInput { - BackupArn: Sequence - } - } + impl Debug + for CreateGlobalTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteBackupInput { - pub fn BackupArn(&self) -> &Sequence { - match self { - DeleteBackupInput::DeleteBackupInput{BackupArn, } => BackupArn, - } - } - } + impl DafnyPrint + for CreateGlobalTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateGlobalTableOutput.CreateGlobalTableOutput(")?; + DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteBackupInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateGlobalTableOutput {} - impl DafnyPrint - for DeleteBackupInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteBackupInput::DeleteBackupInput{BackupArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteBackupInput.DeleteBackupInput(")?; - DafnyPrint::fmt_print(BackupArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for CreateGlobalTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateGlobalTableOutput::CreateGlobalTableOutput{GlobalTableDescription, } => { + Hash::hash(GlobalTableDescription, _state) + }, + } + } + } - impl Eq - for DeleteBackupInput {} + impl Default + for CreateGlobalTableOutput { + fn default() -> CreateGlobalTableOutput { + CreateGlobalTableOutput::CreateGlobalTableOutput { + GlobalTableDescription: Default::default() + } + } + } - impl Hash - for DeleteBackupInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteBackupInput::DeleteBackupInput{BackupArn, } => { - Hash::hash(BackupArn, _state) - }, - } - } - } + impl AsRef + for CreateGlobalTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteBackupInput { - fn default() -> DeleteBackupInput { - DeleteBackupInput::DeleteBackupInput { - BackupArn: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(351,3) + #[derive(PartialEq, Clone)] + pub enum CreateReplicaAction { + CreateReplicaAction { + RegionName: Sequence + } + } - impl AsRef - for &DeleteBackupInput { - fn as_ref(&self) -> Self { - self - } - } + impl CreateReplicaAction { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + CreateReplicaAction::CreateReplicaAction{RegionName, } => RegionName, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteBackupOutput { - DeleteBackupOutput { - BackupDescription: Rc>> - } - } + impl Debug + for CreateReplicaAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteBackupOutput { - pub fn BackupDescription(&self) -> &Rc>> { - match self { - DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => BackupDescription, - } - } - } + impl DafnyPrint + for CreateReplicaAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateReplicaAction::CreateReplicaAction{RegionName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateReplicaAction.CreateReplicaAction(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteBackupOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateReplicaAction {} - impl DafnyPrint - for DeleteBackupOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteBackupOutput.DeleteBackupOutput(")?; - DafnyPrint::fmt_print(BackupDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for CreateReplicaAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateReplicaAction::CreateReplicaAction{RegionName, } => { + Hash::hash(RegionName, _state) + }, + } + } + } - impl Eq - for DeleteBackupOutput {} + impl Default + for CreateReplicaAction { + fn default() -> CreateReplicaAction { + CreateReplicaAction::CreateReplicaAction { + RegionName: Default::default() + } + } + } - impl Hash - for DeleteBackupOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => { - Hash::hash(BackupDescription, _state) - }, - } - } - } + impl AsRef + for CreateReplicaAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteBackupOutput { - fn default() -> DeleteBackupOutput { - DeleteBackupOutput::DeleteBackupOutput { - BackupDescription: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(354,3) + #[derive(PartialEq, Clone)] + pub enum CreateReplicationGroupMemberAction { + CreateReplicationGroupMemberAction { + RegionName: Sequence, + KMSMasterKeyId: Arc>>, + ProvisionedThroughputOverride: Arc>>, + OnDemandThroughputOverride: Arc>>, + GlobalSecondaryIndexes: Arc>, + TableClassOverride: Arc>> + } + } - impl AsRef - for &DeleteBackupOutput { - fn as_ref(&self) -> Self { - self - } - } + impl CreateReplicationGroupMemberAction { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => RegionName, + } + } + /// Returns a borrow of the field KMSMasterKeyId + pub fn KMSMasterKeyId(&self) -> &Arc>> { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => KMSMasterKeyId, + } + } + /// Returns a borrow of the field ProvisionedThroughputOverride + pub fn ProvisionedThroughputOverride(&self) -> &Arc>> { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => ProvisionedThroughputOverride, + } + } + /// Returns a borrow of the field OnDemandThroughputOverride + pub fn OnDemandThroughputOverride(&self) -> &Arc>> { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => OnDemandThroughputOverride, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc> { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field TableClassOverride + pub fn TableClassOverride(&self) -> &Arc>> { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => TableClassOverride, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteGlobalSecondaryIndexAction { - DeleteGlobalSecondaryIndexAction { - IndexName: Sequence - } - } + impl Debug + for CreateReplicationGroupMemberAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteGlobalSecondaryIndexAction { - pub fn IndexName(&self) -> &Sequence { - match self { - DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => IndexName, - } - } - } + impl DafnyPrint + for CreateReplicationGroupMemberAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateReplicationGroupMemberAction.CreateReplicationGroupMemberAction(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableClassOverride, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteGlobalSecondaryIndexAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateReplicationGroupMemberAction {} + + impl Hash + for CreateReplicationGroupMemberAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { + Hash::hash(RegionName, _state); + Hash::hash(KMSMasterKeyId, _state); + Hash::hash(ProvisionedThroughputOverride, _state); + Hash::hash(OnDemandThroughputOverride, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(TableClassOverride, _state) + }, + } + } + } - impl DafnyPrint - for DeleteGlobalSecondaryIndexAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteGlobalSecondaryIndexAction.DeleteGlobalSecondaryIndexAction(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for CreateReplicationGroupMemberAction { + fn default() -> CreateReplicationGroupMemberAction { + CreateReplicationGroupMemberAction::CreateReplicationGroupMemberAction { + RegionName: Default::default(), + KMSMasterKeyId: Default::default(), + ProvisionedThroughputOverride: Default::default(), + OnDemandThroughputOverride: Default::default(), + GlobalSecondaryIndexes: Default::default(), + TableClassOverride: Default::default() + } + } + } - impl Eq - for DeleteGlobalSecondaryIndexAction {} + impl AsRef + for CreateReplicationGroupMemberAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DeleteGlobalSecondaryIndexAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => { - Hash::hash(IndexName, _state) - }, - } - } - } - - impl Default - for DeleteGlobalSecondaryIndexAction { - fn default() -> DeleteGlobalSecondaryIndexAction { - DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction { - IndexName: Default::default() - } - } - } - - impl AsRef - for &DeleteGlobalSecondaryIndexAction { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DeleteItemInput { - DeleteItemInput { - TableName: Sequence, - Key: Map, Rc>, - Expected: Rc, Rc>>>, - ConditionalOperator: Rc>>, - ReturnValues: Rc>>, - ReturnConsumedCapacity: Rc>>, - ReturnItemCollectionMetrics: Rc>>, - ConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>> - } - } - - impl DeleteItemInput { - pub fn TableName(&self) -> &Sequence { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, - } - } - pub fn Key(&self) -> &Map, Rc> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Key, - } - } - pub fn Expected(&self) -> &Rc, Rc>>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, - } - } - pub fn ConditionalOperator(&self) -> &Rc>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, - } - } - pub fn ReturnValues(&self) -> &Rc>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, - } - } - pub fn ReturnItemCollectionMetrics(&self) -> &Rc>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, - } - } - pub fn ConditionExpression(&self) -> &Rc>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, - } - } - } - - impl Debug - for DeleteItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(362,3) + #[derive(PartialEq, Clone)] + pub enum CreateTableInput { + CreateTableInput { + AttributeDefinitions: Sequence>, + TableName: Sequence, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + LocalSecondaryIndexes: Arc>>>, + GlobalSecondaryIndexes: Arc>>>, + BillingMode: Arc>>, + ProvisionedThroughput: Arc>>, + StreamSpecification: Arc>>, + SSESpecification: Arc>>, + Tags: Arc>>>, + TableClass: Arc>>, + DeletionProtectionEnabled: Arc>, + ResourcePolicy: Arc>>, + OnDemandThroughput: Arc>> + } + } - impl DafnyPrint - for DeleteItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteItemInput.DeleteItemInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Expected, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CreateTableInput { + /// Returns a borrow of the field AttributeDefinitions + pub fn AttributeDefinitions(&self) -> &Sequence> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => AttributeDefinitions, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => TableName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field LocalSecondaryIndexes + pub fn LocalSecondaryIndexes(&self) -> &Arc>>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => LocalSecondaryIndexes, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field BillingMode + pub fn BillingMode(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => BillingMode, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field StreamSpecification + pub fn StreamSpecification(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => StreamSpecification, + } + } + /// Returns a borrow of the field SSESpecification + pub fn SSESpecification(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => SSESpecification, + } + } + /// Returns a borrow of the field Tags + pub fn Tags(&self) -> &Arc>>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => Tags, + } + } + /// Returns a borrow of the field TableClass + pub fn TableClass(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => TableClass, + } + } + /// Returns a borrow of the field DeletionProtectionEnabled + pub fn DeletionProtectionEnabled(&self) -> &Arc> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => DeletionProtectionEnabled, + } + } + /// Returns a borrow of the field ResourcePolicy + pub fn ResourcePolicy(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => ResourcePolicy, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - impl Eq - for DeleteItemInput {} + impl Debug + for CreateTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for DeleteItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - Hash::hash(TableName, _state); - Hash::hash(Key, _state); - Hash::hash(Expected, _state); - Hash::hash(ConditionalOperator, _state); - Hash::hash(ReturnValues, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ReturnItemCollectionMetrics, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state) - }, - } - } - } - - impl Default - for DeleteItemInput { - fn default() -> DeleteItemInput { - DeleteItemInput::DeleteItemInput { - TableName: Default::default(), - Key: Default::default(), - Expected: Default::default(), - ConditionalOperator: Default::default(), - ReturnValues: Default::default(), - ReturnConsumedCapacity: Default::default(), - ReturnItemCollectionMetrics: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default() - } - } - } - - impl AsRef - for &DeleteItemInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DeleteItemOutput { - DeleteItemOutput { - Attributes: Rc, Rc>>>, - ConsumedCapacity: Rc>>, - ItemCollectionMetrics: Rc>> - } - } - - impl DeleteItemOutput { - pub fn Attributes(&self) -> &Rc, Rc>>> { - match self { - DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, - } - } - pub fn ItemCollectionMetrics(&self) -> &Rc>> { - match self { - DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, - } - } - } - - impl Debug - for DeleteItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CreateTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateTableInput.CreateTableInput(")?; + DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BillingMode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamSpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSESpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Tags, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableClass, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DeletionProtectionEnabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ResourcePolicy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteItemOutput.DeleteItemOutput(")?; - DafnyPrint::fmt_print(Attributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for CreateTableInput {} + + impl Hash + for CreateTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateTableInput::CreateTableInput{AttributeDefinitions, TableName, KeySchema, LocalSecondaryIndexes, GlobalSecondaryIndexes, BillingMode, ProvisionedThroughput, StreamSpecification, SSESpecification, Tags, TableClass, DeletionProtectionEnabled, ResourcePolicy, OnDemandThroughput, } => { + Hash::hash(AttributeDefinitions, _state); + Hash::hash(TableName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(LocalSecondaryIndexes, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(BillingMode, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(StreamSpecification, _state); + Hash::hash(SSESpecification, _state); + Hash::hash(Tags, _state); + Hash::hash(TableClass, _state); + Hash::hash(DeletionProtectionEnabled, _state); + Hash::hash(ResourcePolicy, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - impl Eq - for DeleteItemOutput {} + impl Default + for CreateTableInput { + fn default() -> CreateTableInput { + CreateTableInput::CreateTableInput { + AttributeDefinitions: Default::default(), + TableName: Default::default(), + KeySchema: Default::default(), + LocalSecondaryIndexes: Default::default(), + GlobalSecondaryIndexes: Default::default(), + BillingMode: Default::default(), + ProvisionedThroughput: Default::default(), + StreamSpecification: Default::default(), + SSESpecification: Default::default(), + Tags: Default::default(), + TableClass: Default::default(), + DeletionProtectionEnabled: Default::default(), + ResourcePolicy: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl Hash - for DeleteItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - Hash::hash(Attributes, _state); - Hash::hash(ConsumedCapacity, _state); - Hash::hash(ItemCollectionMetrics, _state) - }, - } - } - } + impl AsRef + for CreateTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteItemOutput { - fn default() -> DeleteItemOutput { - DeleteItemOutput::DeleteItemOutput { - Attributes: Default::default(), - ConsumedCapacity: Default::default(), - ItemCollectionMetrics: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(378,3) + #[derive(PartialEq, Clone)] + pub enum CreateTableOutput { + CreateTableOutput { + TableDescription: Arc>> + } + } - impl AsRef - for &DeleteItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl CreateTableOutput { + /// Returns a borrow of the field TableDescription + pub fn TableDescription(&self) -> &Arc>> { + match self { + CreateTableOutput::CreateTableOutput{TableDescription, } => TableDescription, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteReplicaAction { - DeleteReplicaAction { - RegionName: Sequence - } - } + impl Debug + for CreateTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DeleteReplicaAction { - pub fn RegionName(&self) -> &Sequence { - match self { - DeleteReplicaAction::DeleteReplicaAction{RegionName, } => RegionName, - } - } - } + impl DafnyPrint + for CreateTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateTableOutput::CreateTableOutput{TableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CreateTableOutput.CreateTableOutput(")?; + DafnyPrint::fmt_print(TableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DeleteReplicaAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateTableOutput {} - impl DafnyPrint - for DeleteReplicaAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteReplicaAction::DeleteReplicaAction{RegionName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteReplicaAction.DeleteReplicaAction(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for CreateTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateTableOutput::CreateTableOutput{TableDescription, } => { + Hash::hash(TableDescription, _state) + }, + } + } + } - impl Eq - for DeleteReplicaAction {} + impl Default + for CreateTableOutput { + fn default() -> CreateTableOutput { + CreateTableOutput::CreateTableOutput { + TableDescription: Default::default() + } + } + } - impl Hash - for DeleteReplicaAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteReplicaAction::DeleteReplicaAction{RegionName, } => { - Hash::hash(RegionName, _state) - }, - } - } - } + impl AsRef + for CreateTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteReplicaAction { - fn default() -> DeleteReplicaAction { - DeleteReplicaAction::DeleteReplicaAction { - RegionName: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(381,3) + pub type CsvDelimiter = Sequence; - impl AsRef - for &DeleteReplicaAction { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(385,3) + pub type CsvHeader = Sequence; - #[derive(PartialEq, Clone)] - pub enum DeleteReplicationGroupMemberAction { - DeleteReplicationGroupMemberAction { - RegionName: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(389,3) + pub type CsvHeaderList = Sequence>; - impl DeleteReplicationGroupMemberAction { - pub fn RegionName(&self) -> &Sequence { - match self { - DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => RegionName, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(393,3) + #[derive(PartialEq, Clone)] + pub enum CsvOptions { + CsvOptions { + Delimiter: Arc>>, + HeaderList: Arc> + } + } - impl Debug - for DeleteReplicationGroupMemberAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CsvOptions { + /// Returns a borrow of the field Delimiter + pub fn Delimiter(&self) -> &Arc>> { + match self { + CsvOptions::CsvOptions{Delimiter, HeaderList, } => Delimiter, + } + } + /// Returns a borrow of the field HeaderList + pub fn HeaderList(&self) -> &Arc> { + match self { + CsvOptions::CsvOptions{Delimiter, HeaderList, } => HeaderList, + } + } + } - impl DafnyPrint - for DeleteReplicationGroupMemberAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteReplicationGroupMemberAction.DeleteReplicationGroupMemberAction(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CsvOptions { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DeleteReplicationGroupMemberAction {} + impl DafnyPrint + for CsvOptions { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CsvOptions::CsvOptions{Delimiter, HeaderList, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.CsvOptions.CsvOptions(")?; + DafnyPrint::fmt_print(Delimiter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(HeaderList, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DeleteReplicationGroupMemberAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => { - Hash::hash(RegionName, _state) - }, - } - } - } + impl Eq + for CsvOptions {} + + impl Hash + for CsvOptions { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CsvOptions::CsvOptions{Delimiter, HeaderList, } => { + Hash::hash(Delimiter, _state); + Hash::hash(HeaderList, _state) + }, + } + } + } - impl Default - for DeleteReplicationGroupMemberAction { - fn default() -> DeleteReplicationGroupMemberAction { - DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction { - RegionName: Default::default() - } - } - } + impl Default + for CsvOptions { + fn default() -> CsvOptions { + CsvOptions::CsvOptions { + Delimiter: Default::default(), + HeaderList: Default::default() + } + } + } - impl AsRef - for &DeleteReplicationGroupMemberAction { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for CsvOptions { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteRequest { - DeleteRequest { - Key: Map, Rc> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(397,3) + #[derive(PartialEq, Clone)] + pub enum Delete { + Delete { + Key: Map, Arc>, + TableName: Sequence, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>>, + ReturnValuesOnConditionCheckFailure: Arc>> + } + } - impl DeleteRequest { - pub fn Key(&self) -> &Map, Rc> { - match self { - DeleteRequest::DeleteRequest{Key, } => Key, - } - } - } + impl Delete { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Key, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, + } + } + /// Returns a borrow of the field ReturnValuesOnConditionCheckFailure + pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Arc>> { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, + } + } + } - impl Debug - for DeleteRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for Delete { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DeleteRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteRequest::DeleteRequest{Key, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteRequest.DeleteRequest(")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for Delete { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Delete.Delete(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DeleteRequest {} + impl Eq + for Delete {} + + impl Hash + for Delete { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Delete::Delete{Key, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + Hash::hash(Key, _state); + Hash::hash(TableName, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state); + Hash::hash(ReturnValuesOnConditionCheckFailure, _state) + }, + } + } + } - impl Hash - for DeleteRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteRequest::DeleteRequest{Key, } => { - Hash::hash(Key, _state) - }, - } - } - } + impl Default + for Delete { + fn default() -> Delete { + Delete::Delete { + Key: Default::default(), + TableName: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default(), + ReturnValuesOnConditionCheckFailure: Default::default() + } + } + } - impl Default - for DeleteRequest { - fn default() -> DeleteRequest { - DeleteRequest::DeleteRequest { - Key: Default::default() - } - } - } + impl AsRef + for Delete { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DeleteRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(405,3) + #[derive(PartialEq, Clone)] + pub enum DeleteBackupInput { + DeleteBackupInput { + BackupArn: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteResourcePolicyInput { - DeleteResourcePolicyInput { - ResourceArn: Sequence, - ExpectedRevisionId: Rc>> - } - } + impl DeleteBackupInput { + /// Returns a borrow of the field BackupArn + pub fn BackupArn(&self) -> &Sequence { + match self { + DeleteBackupInput::DeleteBackupInput{BackupArn, } => BackupArn, + } + } + } - impl DeleteResourcePolicyInput { - pub fn ResourceArn(&self) -> &Sequence { - match self { - DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => ResourceArn, - } - } - pub fn ExpectedRevisionId(&self) -> &Rc>> { - match self { - DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => ExpectedRevisionId, - } - } - } + impl Debug + for DeleteBackupInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteResourcePolicyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteBackupInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteBackupInput::DeleteBackupInput{BackupArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteBackupInput.DeleteBackupInput(")?; + DafnyPrint::fmt_print(BackupArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteResourcePolicyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteResourcePolicyInput.DeleteResourcePolicyInput(")?; - DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpectedRevisionId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeleteBackupInput {} - impl Eq - for DeleteResourcePolicyInput {} + impl Hash + for DeleteBackupInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteBackupInput::DeleteBackupInput{BackupArn, } => { + Hash::hash(BackupArn, _state) + }, + } + } + } - impl Hash - for DeleteResourcePolicyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => { - Hash::hash(ResourceArn, _state); - Hash::hash(ExpectedRevisionId, _state) - }, - } - } - } + impl Default + for DeleteBackupInput { + fn default() -> DeleteBackupInput { + DeleteBackupInput::DeleteBackupInput { + BackupArn: Default::default() + } + } + } - impl Default - for DeleteResourcePolicyInput { - fn default() -> DeleteResourcePolicyInput { - DeleteResourcePolicyInput::DeleteResourcePolicyInput { - ResourceArn: Default::default(), - ExpectedRevisionId: Default::default() - } - } - } + impl AsRef + for DeleteBackupInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DeleteResourcePolicyInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(408,3) + #[derive(PartialEq, Clone)] + pub enum DeleteBackupOutput { + DeleteBackupOutput { + BackupDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteResourcePolicyOutput { - DeleteResourcePolicyOutput { - RevisionId: Rc>> - } - } + impl DeleteBackupOutput { + /// Returns a borrow of the field BackupDescription + pub fn BackupDescription(&self) -> &Arc>> { + match self { + DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => BackupDescription, + } + } + } - impl DeleteResourcePolicyOutput { - pub fn RevisionId(&self) -> &Rc>> { - match self { - DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => RevisionId, - } - } - } + impl Debug + for DeleteBackupOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteResourcePolicyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteBackupOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteBackupOutput.DeleteBackupOutput(")?; + DafnyPrint::fmt_print(BackupDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteResourcePolicyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteResourcePolicyOutput.DeleteResourcePolicyOutput(")?; - DafnyPrint::fmt_print(RevisionId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeleteBackupOutput {} - impl Eq - for DeleteResourcePolicyOutput {} + impl Hash + for DeleteBackupOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteBackupOutput::DeleteBackupOutput{BackupDescription, } => { + Hash::hash(BackupDescription, _state) + }, + } + } + } - impl Hash - for DeleteResourcePolicyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => { - Hash::hash(RevisionId, _state) - }, - } - } - } + impl Default + for DeleteBackupOutput { + fn default() -> DeleteBackupOutput { + DeleteBackupOutput::DeleteBackupOutput { + BackupDescription: Default::default() + } + } + } - impl Default - for DeleteResourcePolicyOutput { - fn default() -> DeleteResourcePolicyOutput { - DeleteResourcePolicyOutput::DeleteResourcePolicyOutput { - RevisionId: Default::default() - } - } - } + impl AsRef + for DeleteBackupOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DeleteResourcePolicyOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(411,3) + #[derive(PartialEq, Clone)] + pub enum DeleteGlobalSecondaryIndexAction { + DeleteGlobalSecondaryIndexAction { + IndexName: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteTableInput { - DeleteTableInput { - TableName: Sequence - } - } + impl DeleteGlobalSecondaryIndexAction { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => IndexName, + } + } + } - impl DeleteTableInput { - pub fn TableName(&self) -> &Sequence { - match self { - DeleteTableInput::DeleteTableInput{TableName, } => TableName, - } - } - } + impl Debug + for DeleteGlobalSecondaryIndexAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteGlobalSecondaryIndexAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteGlobalSecondaryIndexAction.DeleteGlobalSecondaryIndexAction(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteTableInput::DeleteTableInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteTableInput.DeleteTableInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeleteGlobalSecondaryIndexAction {} - impl Eq - for DeleteTableInput {} + impl Hash + for DeleteGlobalSecondaryIndexAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction{IndexName, } => { + Hash::hash(IndexName, _state) + }, + } + } + } - impl Hash - for DeleteTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteTableInput::DeleteTableInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + impl Default + for DeleteGlobalSecondaryIndexAction { + fn default() -> DeleteGlobalSecondaryIndexAction { + DeleteGlobalSecondaryIndexAction::DeleteGlobalSecondaryIndexAction { + IndexName: Default::default() + } + } + } - impl Default - for DeleteTableInput { - fn default() -> DeleteTableInput { - DeleteTableInput::DeleteTableInput { - TableName: Default::default() - } - } - } + impl AsRef + for DeleteGlobalSecondaryIndexAction { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DeleteTableInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(414,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemInput { + DeleteItemInput { + TableName: Sequence, + Key: Map, Arc>, + Expected: Arc, Arc>>>, + ConditionalOperator: Arc>>, + ReturnValues: Arc>>, + ReturnConsumedCapacity: Arc>>, + ReturnItemCollectionMetrics: Arc>>, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>> + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteTableOutput { - DeleteTableOutput { - TableDescription: Rc>> - } - } + impl DeleteItemInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, + } + } + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Key, + } + } + /// Returns a borrow of the field Expected + pub fn Expected(&self) -> &Arc, Arc>>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, + } + } + /// Returns a borrow of the field ConditionalOperator + pub fn ConditionalOperator(&self) -> &Arc>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, + } + } + /// Returns a borrow of the field ReturnValues + pub fn ReturnValues(&self) -> &Arc>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ReturnItemCollectionMetrics + pub fn ReturnItemCollectionMetrics(&self) -> &Arc>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, + } + } + } - impl DeleteTableOutput { - pub fn TableDescription(&self) -> &Rc>> { - match self { - DeleteTableOutput::DeleteTableOutput{TableDescription, } => TableDescription, - } - } - } + impl Debug + for DeleteItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteItemInput.DeleteItemInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Expected, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteTableOutput::DeleteTableOutput{TableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteTableOutput.DeleteTableOutput(")?; - DafnyPrint::fmt_print(TableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeleteItemInput {} + + impl Hash + for DeleteItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemInput::DeleteItemInput{TableName, Key, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + Hash::hash(TableName, _state); + Hash::hash(Key, _state); + Hash::hash(Expected, _state); + Hash::hash(ConditionalOperator, _state); + Hash::hash(ReturnValues, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ReturnItemCollectionMetrics, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state) + }, + } + } + } - impl Eq - for DeleteTableOutput {} + impl Default + for DeleteItemInput { + fn default() -> DeleteItemInput { + DeleteItemInput::DeleteItemInput { + TableName: Default::default(), + Key: Default::default(), + Expected: Default::default(), + ConditionalOperator: Default::default(), + ReturnValues: Default::default(), + ReturnConsumedCapacity: Default::default(), + ReturnItemCollectionMetrics: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default() + } + } + } - impl Hash - for DeleteTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteTableOutput::DeleteTableOutput{TableDescription, } => { - Hash::hash(TableDescription, _state) - }, - } - } - } + impl AsRef + for DeleteItemInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DeleteTableOutput { - fn default() -> DeleteTableOutput { - DeleteTableOutput::DeleteTableOutput { - TableDescription: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(426,3) + #[derive(PartialEq, Clone)] + pub enum DeleteItemOutput { + DeleteItemOutput { + Attributes: Arc, Arc>>>, + ConsumedCapacity: Arc>>, + ItemCollectionMetrics: Arc>> + } + } - impl AsRef - for &DeleteTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DeleteItemOutput { + /// Returns a borrow of the field Attributes + pub fn Attributes(&self) -> &Arc, Arc>>> { + match self { + DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field ItemCollectionMetrics + pub fn ItemCollectionMetrics(&self) -> &Arc>> { + match self { + DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeBackupInput { - DescribeBackupInput { - BackupArn: Sequence - } - } + impl Debug + for DeleteItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DescribeBackupInput { - pub fn BackupArn(&self) -> &Sequence { - match self { - DescribeBackupInput::DescribeBackupInput{BackupArn, } => BackupArn, - } - } - } + impl DafnyPrint + for DeleteItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteItemOutput.DeleteItemOutput(")?; + DafnyPrint::fmt_print(Attributes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DescribeBackupInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DeleteItemOutput {} + + impl Hash + for DeleteItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteItemOutput::DeleteItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + Hash::hash(Attributes, _state); + Hash::hash(ConsumedCapacity, _state); + Hash::hash(ItemCollectionMetrics, _state) + }, + } + } + } - impl DafnyPrint - for DescribeBackupInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeBackupInput::DescribeBackupInput{BackupArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeBackupInput.DescribeBackupInput(")?; - DafnyPrint::fmt_print(BackupArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DeleteItemOutput { + fn default() -> DeleteItemOutput { + DeleteItemOutput::DeleteItemOutput { + Attributes: Default::default(), + ConsumedCapacity: Default::default(), + ItemCollectionMetrics: Default::default() + } + } + } - impl Eq - for DescribeBackupInput {} + impl AsRef + for DeleteItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeBackupInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeBackupInput::DescribeBackupInput{BackupArn, } => { - Hash::hash(BackupArn, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(431,3) + #[derive(PartialEq, Clone)] + pub enum DeleteReplicaAction { + DeleteReplicaAction { + RegionName: Sequence + } + } - impl Default - for DescribeBackupInput { - fn default() -> DescribeBackupInput { - DescribeBackupInput::DescribeBackupInput { - BackupArn: Default::default() - } - } - } + impl DeleteReplicaAction { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + DeleteReplicaAction::DeleteReplicaAction{RegionName, } => RegionName, + } + } + } - impl AsRef - for &DescribeBackupInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DeleteReplicaAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeBackupOutput { - DescribeBackupOutput { - BackupDescription: Rc>> - } - } + impl DafnyPrint + for DeleteReplicaAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteReplicaAction::DeleteReplicaAction{RegionName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteReplicaAction.DeleteReplicaAction(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeBackupOutput { - pub fn BackupDescription(&self) -> &Rc>> { - match self { - DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => BackupDescription, - } - } - } + impl Eq + for DeleteReplicaAction {} - impl Debug - for DescribeBackupOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DeleteReplicaAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteReplicaAction::DeleteReplicaAction{RegionName, } => { + Hash::hash(RegionName, _state) + }, + } + } + } - impl DafnyPrint - for DescribeBackupOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeBackupOutput.DescribeBackupOutput(")?; - DafnyPrint::fmt_print(BackupDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DeleteReplicaAction { + fn default() -> DeleteReplicaAction { + DeleteReplicaAction::DeleteReplicaAction { + RegionName: Default::default() + } + } + } - impl Eq - for DescribeBackupOutput {} + impl AsRef + for DeleteReplicaAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeBackupOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => { - Hash::hash(BackupDescription, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(434,3) + #[derive(PartialEq, Clone)] + pub enum DeleteReplicationGroupMemberAction { + DeleteReplicationGroupMemberAction { + RegionName: Sequence + } + } - impl Default - for DescribeBackupOutput { - fn default() -> DescribeBackupOutput { - DescribeBackupOutput::DescribeBackupOutput { - BackupDescription: Default::default() - } - } - } + impl DeleteReplicationGroupMemberAction { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => RegionName, + } + } + } - impl AsRef - for &DescribeBackupOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DeleteReplicationGroupMemberAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeContinuousBackupsInput { - DescribeContinuousBackupsInput { - TableName: Sequence - } - } + impl DafnyPrint + for DeleteReplicationGroupMemberAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteReplicationGroupMemberAction.DeleteReplicationGroupMemberAction(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeContinuousBackupsInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => TableName, - } - } - } + impl Eq + for DeleteReplicationGroupMemberAction {} - impl Debug - for DescribeContinuousBackupsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DeleteReplicationGroupMemberAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction{RegionName, } => { + Hash::hash(RegionName, _state) + }, + } + } + } - impl DafnyPrint - for DescribeContinuousBackupsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContinuousBackupsInput.DescribeContinuousBackupsInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DeleteReplicationGroupMemberAction { + fn default() -> DeleteReplicationGroupMemberAction { + DeleteReplicationGroupMemberAction::DeleteReplicationGroupMemberAction { + RegionName: Default::default() + } + } + } - impl Eq - for DescribeContinuousBackupsInput {} + impl AsRef + for DeleteReplicationGroupMemberAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeContinuousBackupsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(437,3) + #[derive(PartialEq, Clone)] + pub enum DeleteRequest { + DeleteRequest { + Key: Map, Arc> + } + } - impl Default - for DescribeContinuousBackupsInput { - fn default() -> DescribeContinuousBackupsInput { - DescribeContinuousBackupsInput::DescribeContinuousBackupsInput { - TableName: Default::default() - } - } - } + impl DeleteRequest { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + DeleteRequest::DeleteRequest{Key, } => Key, + } + } + } - impl AsRef - for &DescribeContinuousBackupsInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DeleteRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeContinuousBackupsOutput { - DescribeContinuousBackupsOutput { - ContinuousBackupsDescription: Rc>> - } - } + impl DafnyPrint + for DeleteRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteRequest::DeleteRequest{Key, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteRequest.DeleteRequest(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeContinuousBackupsOutput { - pub fn ContinuousBackupsDescription(&self) -> &Rc>> { - match self { - DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => ContinuousBackupsDescription, - } - } - } + impl Eq + for DeleteRequest {} - impl Debug - for DescribeContinuousBackupsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DeleteRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteRequest::DeleteRequest{Key, } => { + Hash::hash(Key, _state) + }, + } + } + } - impl DafnyPrint - for DescribeContinuousBackupsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContinuousBackupsOutput.DescribeContinuousBackupsOutput(")?; - DafnyPrint::fmt_print(ContinuousBackupsDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DeleteRequest { + fn default() -> DeleteRequest { + DeleteRequest::DeleteRequest { + Key: Default::default() + } + } + } - impl Eq - for DescribeContinuousBackupsOutput {} + impl AsRef + for DeleteRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeContinuousBackupsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => { - Hash::hash(ContinuousBackupsDescription, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(440,3) + #[derive(PartialEq, Clone)] + pub enum DeleteResourcePolicyInput { + DeleteResourcePolicyInput { + ResourceArn: Sequence, + ExpectedRevisionId: Arc>> + } + } - impl Default - for DescribeContinuousBackupsOutput { - fn default() -> DescribeContinuousBackupsOutput { - DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput { - ContinuousBackupsDescription: Default::default() - } - } - } + impl DeleteResourcePolicyInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => ResourceArn, + } + } + /// Returns a borrow of the field ExpectedRevisionId + pub fn ExpectedRevisionId(&self) -> &Arc>> { + match self { + DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => ExpectedRevisionId, + } + } + } - impl AsRef - for &DescribeContinuousBackupsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DeleteResourcePolicyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeContributorInsightsInput { - DescribeContributorInsightsInput { - TableName: Sequence, - IndexName: Rc>> - } - } + impl DafnyPrint + for DeleteResourcePolicyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteResourcePolicyInput.DeleteResourcePolicyInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpectedRevisionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeContributorInsightsInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => TableName, - } - } - pub fn IndexName(&self) -> &Rc>> { - match self { - DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => IndexName, - } - } - } + impl Eq + for DeleteResourcePolicyInput {} + + impl Hash + for DeleteResourcePolicyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteResourcePolicyInput::DeleteResourcePolicyInput{ResourceArn, ExpectedRevisionId, } => { + Hash::hash(ResourceArn, _state); + Hash::hash(ExpectedRevisionId, _state) + }, + } + } + } - impl Debug - for DescribeContributorInsightsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DeleteResourcePolicyInput { + fn default() -> DeleteResourcePolicyInput { + DeleteResourcePolicyInput::DeleteResourcePolicyInput { + ResourceArn: Default::default(), + ExpectedRevisionId: Default::default() + } + } + } - impl DafnyPrint - for DescribeContributorInsightsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContributorInsightsInput.DescribeContributorInsightsInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DeleteResourcePolicyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DescribeContributorInsightsInput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(444,3) + #[derive(PartialEq, Clone)] + pub enum DeleteResourcePolicyOutput { + DeleteResourcePolicyOutput { + RevisionId: Arc>> + } + } - impl Hash - for DescribeContributorInsightsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => { - Hash::hash(TableName, _state); - Hash::hash(IndexName, _state) - }, - } - } - } - - impl Default - for DescribeContributorInsightsInput { - fn default() -> DescribeContributorInsightsInput { - DescribeContributorInsightsInput::DescribeContributorInsightsInput { - TableName: Default::default(), - IndexName: Default::default() - } - } - } - - impl AsRef - for &DescribeContributorInsightsInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DescribeContributorInsightsOutput { - DescribeContributorInsightsOutput { - TableName: Rc>>, - IndexName: Rc>>, - ContributorInsightsRuleList: Rc>>>, - ContributorInsightsStatus: Rc>>, - LastUpdateDateTime: Rc>>, - FailureException: Rc>> - } - } - - impl DescribeContributorInsightsOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => TableName, - } - } - pub fn IndexName(&self) -> &Rc>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => IndexName, - } - } - pub fn ContributorInsightsRuleList(&self) -> &Rc>>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => ContributorInsightsRuleList, - } - } - pub fn ContributorInsightsStatus(&self) -> &Rc>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => ContributorInsightsStatus, - } - } - pub fn LastUpdateDateTime(&self) -> &Rc>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => LastUpdateDateTime, - } - } - pub fn FailureException(&self) -> &Rc>> { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => FailureException, - } - } - } - - impl Debug - for DescribeContributorInsightsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DeleteResourcePolicyOutput { + /// Returns a borrow of the field RevisionId + pub fn RevisionId(&self) -> &Arc>> { + match self { + DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => RevisionId, + } + } + } - impl DafnyPrint - for DescribeContributorInsightsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContributorInsightsOutput.DescribeContributorInsightsOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ContributorInsightsRuleList, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ContributorInsightsStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastUpdateDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FailureException, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DeleteResourcePolicyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DescribeContributorInsightsOutput {} + impl DafnyPrint + for DeleteResourcePolicyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteResourcePolicyOutput.DeleteResourcePolicyOutput(")?; + DafnyPrint::fmt_print(RevisionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DescribeContributorInsightsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => { - Hash::hash(TableName, _state); - Hash::hash(IndexName, _state); - Hash::hash(ContributorInsightsRuleList, _state); - Hash::hash(ContributorInsightsStatus, _state); - Hash::hash(LastUpdateDateTime, _state); - Hash::hash(FailureException, _state) - }, - } - } - } + impl Eq + for DeleteResourcePolicyOutput {} - impl Default - for DescribeContributorInsightsOutput { - fn default() -> DescribeContributorInsightsOutput { - DescribeContributorInsightsOutput::DescribeContributorInsightsOutput { - TableName: Default::default(), - IndexName: Default::default(), - ContributorInsightsRuleList: Default::default(), - ContributorInsightsStatus: Default::default(), - LastUpdateDateTime: Default::default(), - FailureException: Default::default() - } - } - } + impl Hash + for DeleteResourcePolicyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteResourcePolicyOutput::DeleteResourcePolicyOutput{RevisionId, } => { + Hash::hash(RevisionId, _state) + }, + } + } + } - impl AsRef - for &DescribeContributorInsightsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DeleteResourcePolicyOutput { + fn default() -> DeleteResourcePolicyOutput { + DeleteResourcePolicyOutput::DeleteResourcePolicyOutput { + RevisionId: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeEndpointsRequest { - DescribeEndpointsRequest {} - } + impl AsRef + for DeleteResourcePolicyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DescribeEndpointsRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(447,3) + #[derive(PartialEq, Clone)] + pub enum DeleteTableInput { + DeleteTableInput { + TableName: Sequence + } + } - impl Debug - for DescribeEndpointsRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DeleteTableInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DeleteTableInput::DeleteTableInput{TableName, } => TableName, + } + } + } - impl DafnyPrint - for DescribeEndpointsRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeEndpointsRequest::DescribeEndpointsRequest{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeEndpointsRequest.DescribeEndpointsRequest")?; - Ok(()) - }, - } - } - } + impl Debug + for DeleteTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DescribeEndpointsRequest { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DescribeEndpointsRequest::DescribeEndpointsRequest {})].iter() - } - } + impl DafnyPrint + for DeleteTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteTableInput::DeleteTableInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteTableInput.DeleteTableInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DescribeEndpointsRequest {} + impl Eq + for DeleteTableInput {} - impl Hash - for DescribeEndpointsRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeEndpointsRequest::DescribeEndpointsRequest{} => { + impl Hash + for DeleteTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteTableInput::DeleteTableInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - }, - } - } - } + impl Default + for DeleteTableInput { + fn default() -> DeleteTableInput { + DeleteTableInput::DeleteTableInput { + TableName: Default::default() + } + } + } - impl Default - for DescribeEndpointsRequest { - fn default() -> DescribeEndpointsRequest { - DescribeEndpointsRequest::DescribeEndpointsRequest {} - } - } + impl AsRef + for DeleteTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeEndpointsRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(450,3) + #[derive(PartialEq, Clone)] + pub enum DeleteTableOutput { + DeleteTableOutput { + TableDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeEndpointsResponse { - DescribeEndpointsResponse { - Endpoints: Sequence> - } - } + impl DeleteTableOutput { + /// Returns a borrow of the field TableDescription + pub fn TableDescription(&self) -> &Arc>> { + match self { + DeleteTableOutput::DeleteTableOutput{TableDescription, } => TableDescription, + } + } + } - impl DescribeEndpointsResponse { - pub fn Endpoints(&self) -> &Sequence> { - match self { - DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => Endpoints, - } - } - } + impl Debug + for DeleteTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeEndpointsResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteTableOutput::DeleteTableOutput{TableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DeleteTableOutput.DeleteTableOutput(")?; + DafnyPrint::fmt_print(TableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeEndpointsResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeEndpointsResponse.DescribeEndpointsResponse(")?; - DafnyPrint::fmt_print(Endpoints, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeleteTableOutput {} - impl Eq - for DescribeEndpointsResponse {} + impl Hash + for DeleteTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteTableOutput::DeleteTableOutput{TableDescription, } => { + Hash::hash(TableDescription, _state) + }, + } + } + } - impl Hash - for DescribeEndpointsResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => { - Hash::hash(Endpoints, _state) - }, - } - } - } + impl Default + for DeleteTableOutput { + fn default() -> DeleteTableOutput { + DeleteTableOutput::DeleteTableOutput { + TableDescription: Default::default() + } + } + } - impl Default - for DescribeEndpointsResponse { - fn default() -> DescribeEndpointsResponse { - DescribeEndpointsResponse::DescribeEndpointsResponse { - Endpoints: Default::default() - } - } - } + impl AsRef + for DeleteTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeEndpointsResponse { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(454,3) + #[derive(PartialEq, Clone)] + pub enum DescribeBackupInput { + DescribeBackupInput { + BackupArn: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeExportInput { - DescribeExportInput { - ExportArn: Sequence - } - } + impl DescribeBackupInput { + /// Returns a borrow of the field BackupArn + pub fn BackupArn(&self) -> &Sequence { + match self { + DescribeBackupInput::DescribeBackupInput{BackupArn, } => BackupArn, + } + } + } - impl DescribeExportInput { - pub fn ExportArn(&self) -> &Sequence { - match self { - DescribeExportInput::DescribeExportInput{ExportArn, } => ExportArn, - } - } - } + impl Debug + for DescribeBackupInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeExportInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeBackupInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeBackupInput::DescribeBackupInput{BackupArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeBackupInput.DescribeBackupInput(")?; + DafnyPrint::fmt_print(BackupArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeExportInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeExportInput::DescribeExportInput{ExportArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeExportInput.DescribeExportInput(")?; - DafnyPrint::fmt_print(ExportArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeBackupInput {} - impl Eq - for DescribeExportInput {} + impl Hash + for DescribeBackupInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeBackupInput::DescribeBackupInput{BackupArn, } => { + Hash::hash(BackupArn, _state) + }, + } + } + } - impl Hash - for DescribeExportInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeExportInput::DescribeExportInput{ExportArn, } => { - Hash::hash(ExportArn, _state) - }, - } - } - } + impl Default + for DescribeBackupInput { + fn default() -> DescribeBackupInput { + DescribeBackupInput::DescribeBackupInput { + BackupArn: Default::default() + } + } + } - impl Default - for DescribeExportInput { - fn default() -> DescribeExportInput { - DescribeExportInput::DescribeExportInput { - ExportArn: Default::default() - } - } - } + impl AsRef + for DescribeBackupInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeExportInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(457,3) + #[derive(PartialEq, Clone)] + pub enum DescribeBackupOutput { + DescribeBackupOutput { + BackupDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeExportOutput { - DescribeExportOutput { - ExportDescription: Rc>> - } - } + impl DescribeBackupOutput { + /// Returns a borrow of the field BackupDescription + pub fn BackupDescription(&self) -> &Arc>> { + match self { + DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => BackupDescription, + } + } + } - impl DescribeExportOutput { - pub fn ExportDescription(&self) -> &Rc>> { - match self { - DescribeExportOutput::DescribeExportOutput{ExportDescription, } => ExportDescription, - } - } - } + impl Debug + for DescribeBackupOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeExportOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeBackupOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeBackupOutput.DescribeBackupOutput(")?; + DafnyPrint::fmt_print(BackupDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeExportOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeExportOutput::DescribeExportOutput{ExportDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeExportOutput.DescribeExportOutput(")?; - DafnyPrint::fmt_print(ExportDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeBackupOutput {} - impl Eq - for DescribeExportOutput {} + impl Hash + for DescribeBackupOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeBackupOutput::DescribeBackupOutput{BackupDescription, } => { + Hash::hash(BackupDescription, _state) + }, + } + } + } - impl Hash - for DescribeExportOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeExportOutput::DescribeExportOutput{ExportDescription, } => { - Hash::hash(ExportDescription, _state) - }, - } - } - } + impl Default + for DescribeBackupOutput { + fn default() -> DescribeBackupOutput { + DescribeBackupOutput::DescribeBackupOutput { + BackupDescription: Default::default() + } + } + } - impl Default - for DescribeExportOutput { - fn default() -> DescribeExportOutput { - DescribeExportOutput::DescribeExportOutput { - ExportDescription: Default::default() - } - } - } + impl AsRef + for DescribeBackupOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeExportOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(460,3) + #[derive(PartialEq, Clone)] + pub enum DescribeContinuousBackupsInput { + DescribeContinuousBackupsInput { + TableName: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeGlobalTableInput { - DescribeGlobalTableInput { - GlobalTableName: Sequence - } - } + impl DescribeContinuousBackupsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => TableName, + } + } + } - impl DescribeGlobalTableInput { - pub fn GlobalTableName(&self) -> &Sequence { - match self { - DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => GlobalTableName, - } - } - } + impl Debug + for DescribeContinuousBackupsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeGlobalTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeContinuousBackupsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContinuousBackupsInput.DescribeContinuousBackupsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeGlobalTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableInput.DescribeGlobalTableInput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeContinuousBackupsInput {} - impl Eq - for DescribeGlobalTableInput {} + impl Hash + for DescribeContinuousBackupsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeContinuousBackupsInput::DescribeContinuousBackupsInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - impl Hash - for DescribeGlobalTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => { - Hash::hash(GlobalTableName, _state) - }, - } - } - } + impl Default + for DescribeContinuousBackupsInput { + fn default() -> DescribeContinuousBackupsInput { + DescribeContinuousBackupsInput::DescribeContinuousBackupsInput { + TableName: Default::default() + } + } + } - impl Default - for DescribeGlobalTableInput { - fn default() -> DescribeGlobalTableInput { - DescribeGlobalTableInput::DescribeGlobalTableInput { - GlobalTableName: Default::default() - } - } - } + impl AsRef + for DescribeContinuousBackupsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeGlobalTableInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(463,3) + #[derive(PartialEq, Clone)] + pub enum DescribeContinuousBackupsOutput { + DescribeContinuousBackupsOutput { + ContinuousBackupsDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeGlobalTableOutput { - DescribeGlobalTableOutput { - GlobalTableDescription: Rc>> - } - } + impl DescribeContinuousBackupsOutput { + /// Returns a borrow of the field ContinuousBackupsDescription + pub fn ContinuousBackupsDescription(&self) -> &Arc>> { + match self { + DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => ContinuousBackupsDescription, + } + } + } - impl DescribeGlobalTableOutput { - pub fn GlobalTableDescription(&self) -> &Rc>> { - match self { - DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, - } - } - } + impl Debug + for DescribeContinuousBackupsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeGlobalTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeContinuousBackupsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContinuousBackupsOutput.DescribeContinuousBackupsOutput(")?; + DafnyPrint::fmt_print(ContinuousBackupsDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeGlobalTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableOutput.DescribeGlobalTableOutput(")?; - DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeContinuousBackupsOutput {} - impl Eq - for DescribeGlobalTableOutput {} + impl Hash + for DescribeContinuousBackupsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput{ContinuousBackupsDescription, } => { + Hash::hash(ContinuousBackupsDescription, _state) + }, + } + } + } - impl Hash - for DescribeGlobalTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => { - Hash::hash(GlobalTableDescription, _state) - }, - } - } - } + impl Default + for DescribeContinuousBackupsOutput { + fn default() -> DescribeContinuousBackupsOutput { + DescribeContinuousBackupsOutput::DescribeContinuousBackupsOutput { + ContinuousBackupsDescription: Default::default() + } + } + } - impl Default - for DescribeGlobalTableOutput { - fn default() -> DescribeGlobalTableOutput { - DescribeGlobalTableOutput::DescribeGlobalTableOutput { - GlobalTableDescription: Default::default() - } - } - } + impl AsRef + for DescribeContinuousBackupsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeGlobalTableOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(466,3) + #[derive(PartialEq, Clone)] + pub enum DescribeContributorInsightsInput { + DescribeContributorInsightsInput { + TableName: Sequence, + IndexName: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeGlobalTableSettingsInput { - DescribeGlobalTableSettingsInput { - GlobalTableName: Sequence - } - } + impl DescribeContributorInsightsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => IndexName, + } + } + } - impl DescribeGlobalTableSettingsInput { - pub fn GlobalTableName(&self) -> &Sequence { - match self { - DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => GlobalTableName, - } - } - } + impl Debug + for DescribeContributorInsightsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeGlobalTableSettingsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeContributorInsightsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContributorInsightsInput.DescribeContributorInsightsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeGlobalTableSettingsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableSettingsInput.DescribeGlobalTableSettingsInput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeContributorInsightsInput {} + + impl Hash + for DescribeContributorInsightsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeContributorInsightsInput::DescribeContributorInsightsInput{TableName, IndexName, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state) + }, + } + } + } - impl Eq - for DescribeGlobalTableSettingsInput {} + impl Default + for DescribeContributorInsightsInput { + fn default() -> DescribeContributorInsightsInput { + DescribeContributorInsightsInput::DescribeContributorInsightsInput { + TableName: Default::default(), + IndexName: Default::default() + } + } + } - impl Hash - for DescribeGlobalTableSettingsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => { - Hash::hash(GlobalTableName, _state) - }, - } - } - } + impl AsRef + for DescribeContributorInsightsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DescribeGlobalTableSettingsInput { - fn default() -> DescribeGlobalTableSettingsInput { - DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput { - GlobalTableName: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(470,3) + #[derive(PartialEq, Clone)] + pub enum DescribeContributorInsightsOutput { + DescribeContributorInsightsOutput { + TableName: Arc>>, + IndexName: Arc>>, + ContributorInsightsRuleList: Arc>>>, + ContributorInsightsStatus: Arc>>, + LastUpdateDateTime: Arc>>, + FailureException: Arc>> + } + } - impl AsRef - for &DescribeGlobalTableSettingsInput { - fn as_ref(&self) -> Self { - self - } - } + impl DescribeContributorInsightsOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => IndexName, + } + } + /// Returns a borrow of the field ContributorInsightsRuleList + pub fn ContributorInsightsRuleList(&self) -> &Arc>>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => ContributorInsightsRuleList, + } + } + /// Returns a borrow of the field ContributorInsightsStatus + pub fn ContributorInsightsStatus(&self) -> &Arc>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => ContributorInsightsStatus, + } + } + /// Returns a borrow of the field LastUpdateDateTime + pub fn LastUpdateDateTime(&self) -> &Arc>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => LastUpdateDateTime, + } + } + /// Returns a borrow of the field FailureException + pub fn FailureException(&self) -> &Arc>> { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => FailureException, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeGlobalTableSettingsOutput { - DescribeGlobalTableSettingsOutput { - GlobalTableName: Rc>>, - ReplicaSettings: Rc>>> - } - } + impl Debug + for DescribeContributorInsightsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DescribeGlobalTableSettingsOutput { - pub fn GlobalTableName(&self) -> &Rc>> { - match self { - DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => GlobalTableName, - } - } - pub fn ReplicaSettings(&self) -> &Rc>>> { - match self { - DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => ReplicaSettings, - } - } - } + impl DafnyPrint + for DescribeContributorInsightsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeContributorInsightsOutput.DescribeContributorInsightsOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ContributorInsightsRuleList, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ContributorInsightsStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastUpdateDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FailureException, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for DescribeGlobalTableSettingsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DescribeContributorInsightsOutput {} + + impl Hash + for DescribeContributorInsightsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput{TableName, IndexName, ContributorInsightsRuleList, ContributorInsightsStatus, LastUpdateDateTime, FailureException, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state); + Hash::hash(ContributorInsightsRuleList, _state); + Hash::hash(ContributorInsightsStatus, _state); + Hash::hash(LastUpdateDateTime, _state); + Hash::hash(FailureException, _state) + }, + } + } + } - impl DafnyPrint - for DescribeGlobalTableSettingsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableSettingsOutput.DescribeGlobalTableSettingsOutput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaSettings, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DescribeContributorInsightsOutput { + fn default() -> DescribeContributorInsightsOutput { + DescribeContributorInsightsOutput::DescribeContributorInsightsOutput { + TableName: Default::default(), + IndexName: Default::default(), + ContributorInsightsRuleList: Default::default(), + ContributorInsightsStatus: Default::default(), + LastUpdateDateTime: Default::default(), + FailureException: Default::default() + } + } + } - impl Eq - for DescribeGlobalTableSettingsOutput {} + impl AsRef + for DescribeContributorInsightsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeGlobalTableSettingsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(ReplicaSettings, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(478,3) + #[derive(PartialEq, Clone)] + pub enum DescribeEndpointsRequest { + DescribeEndpointsRequest {} + } - impl Default - for DescribeGlobalTableSettingsOutput { - fn default() -> DescribeGlobalTableSettingsOutput { - DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput { - GlobalTableName: Default::default(), - ReplicaSettings: Default::default() - } - } - } + impl DescribeEndpointsRequest {} - impl AsRef - for &DescribeGlobalTableSettingsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DescribeEndpointsRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeImportInput { - DescribeImportInput { - ImportArn: Sequence - } - } + impl DafnyPrint + for DescribeEndpointsRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeEndpointsRequest::DescribeEndpointsRequest{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeEndpointsRequest.DescribeEndpointsRequest")?; + Ok(()) + }, + } + } + } - impl DescribeImportInput { - pub fn ImportArn(&self) -> &Sequence { - match self { - DescribeImportInput::DescribeImportInput{ImportArn, } => ImportArn, - } - } - } + impl DescribeEndpointsRequest { + /// Enumerates all possible values of DescribeEndpointsRequest + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DescribeEndpointsRequest::DescribeEndpointsRequest {})].iter() + } + } - impl Debug - for DescribeImportInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DescribeEndpointsRequest {} - impl DafnyPrint - for DescribeImportInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeImportInput::DescribeImportInput{ImportArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeImportInput.DescribeImportInput(")?; - DafnyPrint::fmt_print(ImportArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DescribeEndpointsRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeEndpointsRequest::DescribeEndpointsRequest{} => { - impl Eq - for DescribeImportInput {} + }, + } + } + } - impl Hash - for DescribeImportInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeImportInput::DescribeImportInput{ImportArn, } => { - Hash::hash(ImportArn, _state) - }, - } - } - } + impl Default + for DescribeEndpointsRequest { + fn default() -> DescribeEndpointsRequest { + DescribeEndpointsRequest::DescribeEndpointsRequest {} + } + } - impl Default - for DescribeImportInput { - fn default() -> DescribeImportInput { - DescribeImportInput::DescribeImportInput { - ImportArn: Default::default() - } - } - } + impl AsRef + for DescribeEndpointsRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeImportInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(481,3) + #[derive(PartialEq, Clone)] + pub enum DescribeEndpointsResponse { + DescribeEndpointsResponse { + Endpoints: Sequence> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeImportOutput { - DescribeImportOutput { - ImportTableDescription: Rc - } - } + impl DescribeEndpointsResponse { + /// Returns a borrow of the field Endpoints + pub fn Endpoints(&self) -> &Sequence> { + match self { + DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => Endpoints, + } + } + } - impl DescribeImportOutput { - pub fn ImportTableDescription(&self) -> &Rc { - match self { - DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => ImportTableDescription, - } - } - } + impl Debug + for DescribeEndpointsResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeImportOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeEndpointsResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeEndpointsResponse.DescribeEndpointsResponse(")?; + DafnyPrint::fmt_print(Endpoints, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeImportOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeImportOutput.DescribeImportOutput(")?; - DafnyPrint::fmt_print(ImportTableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeEndpointsResponse {} - impl Eq - for DescribeImportOutput {} + impl Hash + for DescribeEndpointsResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeEndpointsResponse::DescribeEndpointsResponse{Endpoints, } => { + Hash::hash(Endpoints, _state) + }, + } + } + } - impl Hash - for DescribeImportOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => { - Hash::hash(ImportTableDescription, _state) - }, - } - } - } + impl Default + for DescribeEndpointsResponse { + fn default() -> DescribeEndpointsResponse { + DescribeEndpointsResponse::DescribeEndpointsResponse { + Endpoints: Default::default() + } + } + } - impl Default - for DescribeImportOutput { - fn default() -> DescribeImportOutput { - DescribeImportOutput::DescribeImportOutput { - ImportTableDescription: Default::default() - } - } - } + impl AsRef + for DescribeEndpointsResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeImportOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(484,3) + #[derive(PartialEq, Clone)] + pub enum DescribeExportInput { + DescribeExportInput { + ExportArn: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeKinesisStreamingDestinationInput { - DescribeKinesisStreamingDestinationInput { - TableName: Sequence - } - } + impl DescribeExportInput { + /// Returns a borrow of the field ExportArn + pub fn ExportArn(&self) -> &Sequence { + match self { + DescribeExportInput::DescribeExportInput{ExportArn, } => ExportArn, + } + } + } - impl DescribeKinesisStreamingDestinationInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => TableName, - } - } - } + impl Debug + for DescribeExportInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeKinesisStreamingDestinationInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeExportInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeExportInput::DescribeExportInput{ExportArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeExportInput.DescribeExportInput(")?; + DafnyPrint::fmt_print(ExportArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeKinesisStreamingDestinationInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeKinesisStreamingDestinationInput.DescribeKinesisStreamingDestinationInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeExportInput {} - impl Eq - for DescribeKinesisStreamingDestinationInput {} + impl Hash + for DescribeExportInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeExportInput::DescribeExportInput{ExportArn, } => { + Hash::hash(ExportArn, _state) + }, + } + } + } - impl Hash - for DescribeKinesisStreamingDestinationInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + impl Default + for DescribeExportInput { + fn default() -> DescribeExportInput { + DescribeExportInput::DescribeExportInput { + ExportArn: Default::default() + } + } + } - impl Default - for DescribeKinesisStreamingDestinationInput { - fn default() -> DescribeKinesisStreamingDestinationInput { - DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput { - TableName: Default::default() - } - } - } + impl AsRef + for DescribeExportInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeKinesisStreamingDestinationInput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(487,3) + #[derive(PartialEq, Clone)] + pub enum DescribeExportOutput { + DescribeExportOutput { + ExportDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeKinesisStreamingDestinationOutput { - DescribeKinesisStreamingDestinationOutput { - TableName: Rc>>, - KinesisDataStreamDestinations: Rc>>> - } - } + impl DescribeExportOutput { + /// Returns a borrow of the field ExportDescription + pub fn ExportDescription(&self) -> &Arc>> { + match self { + DescribeExportOutput::DescribeExportOutput{ExportDescription, } => ExportDescription, + } + } + } - impl DescribeKinesisStreamingDestinationOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => TableName, - } - } - pub fn KinesisDataStreamDestinations(&self) -> &Rc>>> { - match self { - DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => KinesisDataStreamDestinations, - } - } - } + impl Debug + for DescribeExportOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeKinesisStreamingDestinationOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeExportOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeExportOutput::DescribeExportOutput{ExportDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeExportOutput.DescribeExportOutput(")?; + DafnyPrint::fmt_print(ExportDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeKinesisStreamingDestinationOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeKinesisStreamingDestinationOutput.DescribeKinesisStreamingDestinationOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KinesisDataStreamDestinations, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeExportOutput {} - impl Eq - for DescribeKinesisStreamingDestinationOutput {} + impl Hash + for DescribeExportOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeExportOutput::DescribeExportOutput{ExportDescription, } => { + Hash::hash(ExportDescription, _state) + }, + } + } + } - impl Hash - for DescribeKinesisStreamingDestinationOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => { - Hash::hash(TableName, _state); - Hash::hash(KinesisDataStreamDestinations, _state) - }, - } - } - } + impl Default + for DescribeExportOutput { + fn default() -> DescribeExportOutput { + DescribeExportOutput::DescribeExportOutput { + ExportDescription: Default::default() + } + } + } - impl Default - for DescribeKinesisStreamingDestinationOutput { - fn default() -> DescribeKinesisStreamingDestinationOutput { - DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput { - TableName: Default::default(), - KinesisDataStreamDestinations: Default::default() - } - } - } + impl AsRef + for DescribeExportOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeKinesisStreamingDestinationOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(490,3) + #[derive(PartialEq, Clone)] + pub enum DescribeGlobalTableInput { + DescribeGlobalTableInput { + GlobalTableName: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeLimitsInput { - DescribeLimitsInput {} - } + impl DescribeGlobalTableInput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Sequence { + match self { + DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => GlobalTableName, + } + } + } - impl DescribeLimitsInput {} + impl Debug + for DescribeGlobalTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeLimitsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeGlobalTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableInput.DescribeGlobalTableInput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeLimitsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeLimitsInput::DescribeLimitsInput{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeLimitsInput.DescribeLimitsInput")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeGlobalTableInput {} - impl DescribeLimitsInput { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DescribeLimitsInput::DescribeLimitsInput {})].iter() - } - } + impl Hash + for DescribeGlobalTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeGlobalTableInput::DescribeGlobalTableInput{GlobalTableName, } => { + Hash::hash(GlobalTableName, _state) + }, + } + } + } - impl Eq - for DescribeLimitsInput {} + impl Default + for DescribeGlobalTableInput { + fn default() -> DescribeGlobalTableInput { + DescribeGlobalTableInput::DescribeGlobalTableInput { + GlobalTableName: Default::default() + } + } + } - impl Hash - for DescribeLimitsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeLimitsInput::DescribeLimitsInput{} => { + impl AsRef + for DescribeGlobalTableInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(493,3) + #[derive(PartialEq, Clone)] + pub enum DescribeGlobalTableOutput { + DescribeGlobalTableOutput { + GlobalTableDescription: Arc>> + } + } - impl Default - for DescribeLimitsInput { - fn default() -> DescribeLimitsInput { - DescribeLimitsInput::DescribeLimitsInput {} - } - } + impl DescribeGlobalTableOutput { + /// Returns a borrow of the field GlobalTableDescription + pub fn GlobalTableDescription(&self) -> &Arc>> { + match self { + DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, + } + } + } - impl AsRef - for &DescribeLimitsInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DescribeGlobalTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeLimitsOutput { - DescribeLimitsOutput { - AccountMaxReadCapacityUnits: Rc>, - AccountMaxWriteCapacityUnits: Rc>, - TableMaxReadCapacityUnits: Rc>, - TableMaxWriteCapacityUnits: Rc> - } - } + impl DafnyPrint + for DescribeGlobalTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableOutput.DescribeGlobalTableOutput(")?; + DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeLimitsOutput { - pub fn AccountMaxReadCapacityUnits(&self) -> &Rc> { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => AccountMaxReadCapacityUnits, - } - } - pub fn AccountMaxWriteCapacityUnits(&self) -> &Rc> { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => AccountMaxWriteCapacityUnits, - } - } - pub fn TableMaxReadCapacityUnits(&self) -> &Rc> { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => TableMaxReadCapacityUnits, - } - } - pub fn TableMaxWriteCapacityUnits(&self) -> &Rc> { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => TableMaxWriteCapacityUnits, - } - } - } + impl Eq + for DescribeGlobalTableOutput {} - impl Debug - for DescribeLimitsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DescribeGlobalTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeGlobalTableOutput::DescribeGlobalTableOutput{GlobalTableDescription, } => { + Hash::hash(GlobalTableDescription, _state) + }, + } + } + } - impl DafnyPrint - for DescribeLimitsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeLimitsOutput.DescribeLimitsOutput(")?; - DafnyPrint::fmt_print(AccountMaxReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AccountMaxWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableMaxReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableMaxWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DescribeGlobalTableOutput { + fn default() -> DescribeGlobalTableOutput { + DescribeGlobalTableOutput::DescribeGlobalTableOutput { + GlobalTableDescription: Default::default() + } + } + } - impl Eq - for DescribeLimitsOutput {} + impl AsRef + for DescribeGlobalTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeLimitsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => { - Hash::hash(AccountMaxReadCapacityUnits, _state); - Hash::hash(AccountMaxWriteCapacityUnits, _state); - Hash::hash(TableMaxReadCapacityUnits, _state); - Hash::hash(TableMaxWriteCapacityUnits, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(496,3) + #[derive(PartialEq, Clone)] + pub enum DescribeGlobalTableSettingsInput { + DescribeGlobalTableSettingsInput { + GlobalTableName: Sequence + } + } - impl Default - for DescribeLimitsOutput { - fn default() -> DescribeLimitsOutput { - DescribeLimitsOutput::DescribeLimitsOutput { - AccountMaxReadCapacityUnits: Default::default(), - AccountMaxWriteCapacityUnits: Default::default(), - TableMaxReadCapacityUnits: Default::default(), - TableMaxWriteCapacityUnits: Default::default() - } - } - } + impl DescribeGlobalTableSettingsInput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Sequence { + match self { + DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => GlobalTableName, + } + } + } - impl AsRef - for &DescribeLimitsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DescribeGlobalTableSettingsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTableInput { - DescribeTableInput { - TableName: Sequence - } - } + impl DafnyPrint + for DescribeGlobalTableSettingsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableSettingsInput.DescribeGlobalTableSettingsInput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeTableInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeTableInput::DescribeTableInput{TableName, } => TableName, - } - } - } + impl Eq + for DescribeGlobalTableSettingsInput {} - impl Debug - for DescribeTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DescribeGlobalTableSettingsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput{GlobalTableName, } => { + Hash::hash(GlobalTableName, _state) + }, + } + } + } - impl DafnyPrint - for DescribeTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTableInput::DescribeTableInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableInput.DescribeTableInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DescribeGlobalTableSettingsInput { + fn default() -> DescribeGlobalTableSettingsInput { + DescribeGlobalTableSettingsInput::DescribeGlobalTableSettingsInput { + GlobalTableName: Default::default() + } + } + } - impl Eq - for DescribeTableInput {} + impl AsRef + for DescribeGlobalTableSettingsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DescribeTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTableInput::DescribeTableInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(499,3) + #[derive(PartialEq, Clone)] + pub enum DescribeGlobalTableSettingsOutput { + DescribeGlobalTableSettingsOutput { + GlobalTableName: Arc>>, + ReplicaSettings: Arc>>> + } + } - impl Default - for DescribeTableInput { - fn default() -> DescribeTableInput { - DescribeTableInput::DescribeTableInput { - TableName: Default::default() - } - } - } + impl DescribeGlobalTableSettingsOutput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Arc>> { + match self { + DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => GlobalTableName, + } + } + /// Returns a borrow of the field ReplicaSettings + pub fn ReplicaSettings(&self) -> &Arc>>> { + match self { + DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => ReplicaSettings, + } + } + } - impl AsRef - for &DescribeTableInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DescribeGlobalTableSettingsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTableOutput { - DescribeTableOutput { - Table: Rc>> - } - } + impl DafnyPrint + for DescribeGlobalTableSettingsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeGlobalTableSettingsOutput.DescribeGlobalTableSettingsOutput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaSettings, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DescribeTableOutput { - pub fn Table(&self) -> &Rc>> { - match self { - DescribeTableOutput::DescribeTableOutput{Table, } => Table, - } - } - } + impl Eq + for DescribeGlobalTableSettingsOutput {} + + impl Hash + for DescribeGlobalTableSettingsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(ReplicaSettings, _state) + }, + } + } + } - impl Debug - for DescribeTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DescribeGlobalTableSettingsOutput { + fn default() -> DescribeGlobalTableSettingsOutput { + DescribeGlobalTableSettingsOutput::DescribeGlobalTableSettingsOutput { + GlobalTableName: Default::default(), + ReplicaSettings: Default::default() + } + } + } - impl DafnyPrint - for DescribeTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTableOutput::DescribeTableOutput{Table, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableOutput.DescribeTableOutput(")?; - DafnyPrint::fmt_print(Table, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DescribeGlobalTableSettingsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DescribeTableOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(503,3) + #[derive(PartialEq, Clone)] + pub enum DescribeImportInput { + DescribeImportInput { + ImportArn: Sequence + } + } - impl Hash - for DescribeTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTableOutput::DescribeTableOutput{Table, } => { - Hash::hash(Table, _state) - }, - } - } - } + impl DescribeImportInput { + /// Returns a borrow of the field ImportArn + pub fn ImportArn(&self) -> &Sequence { + match self { + DescribeImportInput::DescribeImportInput{ImportArn, } => ImportArn, + } + } + } - impl Default - for DescribeTableOutput { - fn default() -> DescribeTableOutput { - DescribeTableOutput::DescribeTableOutput { - Table: Default::default() - } - } - } + impl Debug + for DescribeImportInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DescribeTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DescribeImportInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeImportInput::DescribeImportInput{ImportArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeImportInput.DescribeImportInput(")?; + DafnyPrint::fmt_print(ImportArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTableReplicaAutoScalingInput { - DescribeTableReplicaAutoScalingInput { - TableName: Sequence - } - } + impl Eq + for DescribeImportInput {} - impl DescribeTableReplicaAutoScalingInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => TableName, - } - } - } + impl Hash + for DescribeImportInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeImportInput::DescribeImportInput{ImportArn, } => { + Hash::hash(ImportArn, _state) + }, + } + } + } - impl Debug - for DescribeTableReplicaAutoScalingInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DescribeImportInput { + fn default() -> DescribeImportInput { + DescribeImportInput::DescribeImportInput { + ImportArn: Default::default() + } + } + } - impl DafnyPrint - for DescribeTableReplicaAutoScalingInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableReplicaAutoScalingInput.DescribeTableReplicaAutoScalingInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DescribeImportInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DescribeTableReplicaAutoScalingInput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(506,3) + #[derive(PartialEq, Clone)] + pub enum DescribeImportOutput { + DescribeImportOutput { + ImportTableDescription: Arc + } + } - impl Hash - for DescribeTableReplicaAutoScalingInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + impl DescribeImportOutput { + /// Returns a borrow of the field ImportTableDescription + pub fn ImportTableDescription(&self) -> &Arc { + match self { + DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => ImportTableDescription, + } + } + } - impl Default - for DescribeTableReplicaAutoScalingInput { - fn default() -> DescribeTableReplicaAutoScalingInput { - DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput { - TableName: Default::default() - } - } - } + impl Debug + for DescribeImportOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DescribeTableReplicaAutoScalingInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DescribeImportOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeImportOutput.DescribeImportOutput(")?; + DafnyPrint::fmt_print(ImportTableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTableReplicaAutoScalingOutput { - DescribeTableReplicaAutoScalingOutput { - TableAutoScalingDescription: Rc>> - } - } + impl Eq + for DescribeImportOutput {} - impl DescribeTableReplicaAutoScalingOutput { - pub fn TableAutoScalingDescription(&self) -> &Rc>> { - match self { - DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => TableAutoScalingDescription, - } - } - } + impl Hash + for DescribeImportOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeImportOutput::DescribeImportOutput{ImportTableDescription, } => { + Hash::hash(ImportTableDescription, _state) + }, + } + } + } - impl Debug - for DescribeTableReplicaAutoScalingOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DescribeImportOutput { + fn default() -> DescribeImportOutput { + DescribeImportOutput::DescribeImportOutput { + ImportTableDescription: Default::default() + } + } + } - impl DafnyPrint - for DescribeTableReplicaAutoScalingOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableReplicaAutoScalingOutput.DescribeTableReplicaAutoScalingOutput(")?; - DafnyPrint::fmt_print(TableAutoScalingDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DescribeImportOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DescribeTableReplicaAutoScalingOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(509,3) + #[derive(PartialEq, Clone)] + pub enum DescribeKinesisStreamingDestinationInput { + DescribeKinesisStreamingDestinationInput { + TableName: Sequence + } + } - impl Hash - for DescribeTableReplicaAutoScalingOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { - Hash::hash(TableAutoScalingDescription, _state) - }, - } - } - } + impl DescribeKinesisStreamingDestinationInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => TableName, + } + } + } - impl Default - for DescribeTableReplicaAutoScalingOutput { - fn default() -> DescribeTableReplicaAutoScalingOutput { - DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput { - TableAutoScalingDescription: Default::default() - } - } - } + impl Debug + for DescribeKinesisStreamingDestinationInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DescribeTableReplicaAutoScalingOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DescribeKinesisStreamingDestinationInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeKinesisStreamingDestinationInput.DescribeKinesisStreamingDestinationInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTimeToLiveInput { - DescribeTimeToLiveInput { - TableName: Sequence - } - } + impl Eq + for DescribeKinesisStreamingDestinationInput {} - impl DescribeTimeToLiveInput { - pub fn TableName(&self) -> &Sequence { - match self { - DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => TableName, - } - } - } + impl Hash + for DescribeKinesisStreamingDestinationInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - impl Debug - for DescribeTimeToLiveInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DescribeKinesisStreamingDestinationInput { + fn default() -> DescribeKinesisStreamingDestinationInput { + DescribeKinesisStreamingDestinationInput::DescribeKinesisStreamingDestinationInput { + TableName: Default::default() + } + } + } - impl DafnyPrint - for DescribeTimeToLiveInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTimeToLiveInput.DescribeTimeToLiveInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DescribeKinesisStreamingDestinationInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DescribeTimeToLiveInput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(512,3) + #[derive(PartialEq, Clone)] + pub enum DescribeKinesisStreamingDestinationOutput { + DescribeKinesisStreamingDestinationOutput { + TableName: Arc>>, + KinesisDataStreamDestinations: Arc>>> + } + } - impl Hash - for DescribeTimeToLiveInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => { - Hash::hash(TableName, _state) - }, - } - } - } + impl DescribeKinesisStreamingDestinationOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => TableName, + } + } + /// Returns a borrow of the field KinesisDataStreamDestinations + pub fn KinesisDataStreamDestinations(&self) -> &Arc>>> { + match self { + DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => KinesisDataStreamDestinations, + } + } + } - impl Default - for DescribeTimeToLiveInput { - fn default() -> DescribeTimeToLiveInput { - DescribeTimeToLiveInput::DescribeTimeToLiveInput { - TableName: Default::default() - } - } - } + impl Debug + for DescribeKinesisStreamingDestinationOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DescribeTimeToLiveInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DescribeKinesisStreamingDestinationOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeKinesisStreamingDestinationOutput.DescribeKinesisStreamingDestinationOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KinesisDataStreamDestinations, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeTimeToLiveOutput { - DescribeTimeToLiveOutput { - TimeToLiveDescription: Rc>> - } - } + impl Eq + for DescribeKinesisStreamingDestinationOutput {} + + impl Hash + for DescribeKinesisStreamingDestinationOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput{TableName, KinesisDataStreamDestinations, } => { + Hash::hash(TableName, _state); + Hash::hash(KinesisDataStreamDestinations, _state) + }, + } + } + } - impl DescribeTimeToLiveOutput { - pub fn TimeToLiveDescription(&self) -> &Rc>> { - match self { - DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => TimeToLiveDescription, - } - } - } + impl Default + for DescribeKinesisStreamingDestinationOutput { + fn default() -> DescribeKinesisStreamingDestinationOutput { + DescribeKinesisStreamingDestinationOutput::DescribeKinesisStreamingDestinationOutput { + TableName: Default::default(), + KinesisDataStreamDestinations: Default::default() + } + } + } - impl Debug - for DescribeTimeToLiveOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DescribeKinesisStreamingDestinationOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DescribeTimeToLiveOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTimeToLiveOutput.DescribeTimeToLiveOutput(")?; - DafnyPrint::fmt_print(TimeToLiveDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(516,3) + #[derive(PartialEq, Clone)] + pub enum DescribeLimitsInput { + DescribeLimitsInput {} + } - impl Eq - for DescribeTimeToLiveOutput {} + impl DescribeLimitsInput {} - impl Hash - for DescribeTimeToLiveOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => { - Hash::hash(TimeToLiveDescription, _state) - }, - } - } - } + impl Debug + for DescribeLimitsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for DescribeTimeToLiveOutput { - fn default() -> DescribeTimeToLiveOutput { - DescribeTimeToLiveOutput::DescribeTimeToLiveOutput { - TimeToLiveDescription: Default::default() - } - } - } + impl DafnyPrint + for DescribeLimitsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeLimitsInput::DescribeLimitsInput{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeLimitsInput.DescribeLimitsInput")?; + Ok(()) + }, + } + } + } - impl AsRef - for &DescribeTimeToLiveOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DescribeLimitsInput { + /// Enumerates all possible values of DescribeLimitsInput + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DescribeLimitsInput::DescribeLimitsInput {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum DestinationStatus { - ENABLING {}, - ACTIVE {}, - DISABLING {}, - DISABLED {}, - ENABLE_FAILED {}, - UPDATING {} - } + impl Eq + for DescribeLimitsInput {} - impl DestinationStatus {} + impl Hash + for DescribeLimitsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeLimitsInput::DescribeLimitsInput{} => { - impl Debug - for DestinationStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for DestinationStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DestinationStatus::ENABLING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ENABLING")?; - Ok(()) - }, - DestinationStatus::ACTIVE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ACTIVE")?; - Ok(()) - }, - DestinationStatus::DISABLING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.DISABLING")?; - Ok(()) - }, - DestinationStatus::DISABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.DISABLED")?; - Ok(()) - }, - DestinationStatus::ENABLE_FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ENABLE__FAILED")?; - Ok(()) - }, - DestinationStatus::UPDATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.UPDATING")?; - Ok(()) - }, - } - } - } + impl Default + for DescribeLimitsInput { + fn default() -> DescribeLimitsInput { + DescribeLimitsInput::DescribeLimitsInput {} + } + } - impl DestinationStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DestinationStatus::ENABLING {}), Rc::new(DestinationStatus::ACTIVE {}), Rc::new(DestinationStatus::DISABLING {}), Rc::new(DestinationStatus::DISABLED {}), Rc::new(DestinationStatus::ENABLE_FAILED {}), Rc::new(DestinationStatus::UPDATING {})].iter() - } - } + impl AsRef + for DescribeLimitsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DestinationStatus {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(519,3) + #[derive(PartialEq, Clone)] + pub enum DescribeLimitsOutput { + DescribeLimitsOutput { + AccountMaxReadCapacityUnits: Arc>, + AccountMaxWriteCapacityUnits: Arc>, + TableMaxReadCapacityUnits: Arc>, + TableMaxWriteCapacityUnits: Arc> + } + } - impl Hash - for DestinationStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DestinationStatus::ENABLING{} => { + impl DescribeLimitsOutput { + /// Returns a borrow of the field AccountMaxReadCapacityUnits + pub fn AccountMaxReadCapacityUnits(&self) -> &Arc> { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => AccountMaxReadCapacityUnits, + } + } + /// Returns a borrow of the field AccountMaxWriteCapacityUnits + pub fn AccountMaxWriteCapacityUnits(&self) -> &Arc> { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => AccountMaxWriteCapacityUnits, + } + } + /// Returns a borrow of the field TableMaxReadCapacityUnits + pub fn TableMaxReadCapacityUnits(&self) -> &Arc> { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => TableMaxReadCapacityUnits, + } + } + /// Returns a borrow of the field TableMaxWriteCapacityUnits + pub fn TableMaxWriteCapacityUnits(&self) -> &Arc> { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => TableMaxWriteCapacityUnits, + } + } + } - }, - DestinationStatus::ACTIVE{} => { + impl Debug + for DescribeLimitsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - DestinationStatus::DISABLING{} => { + impl DafnyPrint + for DescribeLimitsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeLimitsOutput.DescribeLimitsOutput(")?; + DafnyPrint::fmt_print(AccountMaxReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AccountMaxWriteCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableMaxReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableMaxWriteCapacityUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - DestinationStatus::DISABLED{} => { + impl Eq + for DescribeLimitsOutput {} + + impl Hash + for DescribeLimitsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeLimitsOutput::DescribeLimitsOutput{AccountMaxReadCapacityUnits, AccountMaxWriteCapacityUnits, TableMaxReadCapacityUnits, TableMaxWriteCapacityUnits, } => { + Hash::hash(AccountMaxReadCapacityUnits, _state); + Hash::hash(AccountMaxWriteCapacityUnits, _state); + Hash::hash(TableMaxReadCapacityUnits, _state); + Hash::hash(TableMaxWriteCapacityUnits, _state) + }, + } + } + } - }, - DestinationStatus::ENABLE_FAILED{} => { + impl Default + for DescribeLimitsOutput { + fn default() -> DescribeLimitsOutput { + DescribeLimitsOutput::DescribeLimitsOutput { + AccountMaxReadCapacityUnits: Default::default(), + AccountMaxWriteCapacityUnits: Default::default(), + TableMaxReadCapacityUnits: Default::default(), + TableMaxWriteCapacityUnits: Default::default() + } + } + } - }, - DestinationStatus::UPDATING{} => { + impl AsRef + for DescribeLimitsOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(525,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTableInput { + DescribeTableInput { + TableName: Sequence + } + } - impl Default - for DestinationStatus { - fn default() -> DestinationStatus { - DestinationStatus::ENABLING {} - } - } + impl DescribeTableInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeTableInput::DescribeTableInput{TableName, } => TableName, + } + } + } - impl AsRef - for &DestinationStatus { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for DescribeTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DisableKinesisStreamingDestinationInput { - DisableKinesisStreamingDestinationInput { - TableName: Sequence, - StreamArn: Sequence, - EnableKinesisStreamingConfiguration: Rc>> - } - } + impl DafnyPrint + for DescribeTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTableInput::DescribeTableInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableInput.DescribeTableInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DisableKinesisStreamingDestinationInput { - pub fn TableName(&self) -> &Sequence { - match self { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Sequence { - match self { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } + impl Eq + for DescribeTableInput {} - impl Debug - for DisableKinesisStreamingDestinationInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for DescribeTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTableInput::DescribeTableInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - impl DafnyPrint - for DisableKinesisStreamingDestinationInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DisableKinesisStreamingDestinationInput.DisableKinesisStreamingDestinationInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for DescribeTableInput { + fn default() -> DescribeTableInput { + DescribeTableInput::DescribeTableInput { + TableName: Default::default() + } + } + } - impl Eq - for DisableKinesisStreamingDestinationInput {} + impl AsRef + for DescribeTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DisableKinesisStreamingDestinationInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for DisableKinesisStreamingDestinationInput { - fn default() -> DisableKinesisStreamingDestinationInput { - DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput { - TableName: Default::default(), - StreamArn: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &DisableKinesisStreamingDestinationInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DisableKinesisStreamingDestinationOutput { - DisableKinesisStreamingDestinationOutput { - TableName: Rc>>, - StreamArn: Rc>>, - DestinationStatus: Rc>>, - EnableKinesisStreamingConfiguration: Rc>> - } - } - - impl DisableKinesisStreamingDestinationOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Rc>> { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn DestinationStatus(&self) -> &Rc>> { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } - - impl Debug - for DisableKinesisStreamingDestinationOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(528,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTableOutput { + DescribeTableOutput { + Table: Arc>> + } + } - impl DafnyPrint - for DisableKinesisStreamingDestinationOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DisableKinesisStreamingDestinationOutput.DisableKinesisStreamingDestinationOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DescribeTableOutput { + /// Returns a borrow of the field Table + pub fn Table(&self) -> &Arc>> { + match self { + DescribeTableOutput::DescribeTableOutput{Table, } => Table, + } + } + } - impl Eq - for DisableKinesisStreamingDestinationOutput {} + impl Debug + for DescribeTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for DisableKinesisStreamingDestinationOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(DestinationStatus, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } + impl DafnyPrint + for DescribeTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTableOutput::DescribeTableOutput{Table, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableOutput.DescribeTableOutput(")?; + DafnyPrint::fmt_print(Table, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for DisableKinesisStreamingDestinationOutput { - fn default() -> DisableKinesisStreamingDestinationOutput { - DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput { - TableName: Default::default(), - StreamArn: Default::default(), - DestinationStatus: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } + impl Eq + for DescribeTableOutput {} - impl AsRef - for &DisableKinesisStreamingDestinationOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for DescribeTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTableOutput::DescribeTableOutput{Table, } => { + Hash::hash(Table, _state) + }, + } + } + } - pub type DoubleObject = Sequence; + impl Default + for DescribeTableOutput { + fn default() -> DescribeTableOutput { + DescribeTableOutput::DescribeTableOutput { + Table: Default::default() + } + } + } - pub struct IDynamoDBClientCallHistory {} + impl AsRef + for DescribeTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl IDynamoDBClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClientCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IDynamoDBClient: Any + UpcastObject { - fn BatchExecuteStatement(&self, input: &Rc) -> Rc, Rc>>; - fn BatchGetItem(&self, input: &Rc) -> Rc, Rc>>; - fn BatchWriteItem(&self, input: &Rc) -> Rc, Rc>>; - fn CreateBackup(&self, input: &Rc) -> Rc, Rc>>; - fn CreateGlobalTable(&self, input: &Rc) -> Rc, Rc>>; - fn CreateTable(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteBackup(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteItem(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteResourcePolicy(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteTable(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeBackup(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeContinuousBackups(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeContributorInsights(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeEndpoints(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeExport(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeGlobalTable(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeGlobalTableSettings(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeImport(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeKinesisStreamingDestination(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeLimits(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeTable(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeTableReplicaAutoScaling(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeTimeToLive(&self, input: &Rc) -> Rc, Rc>>; - fn DisableKinesisStreamingDestination(&self, input: &Rc) -> Rc, Rc>>; - fn EnableKinesisStreamingDestination(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteStatement(&self, input: &Rc) -> Rc, Rc>>; - fn ExecuteTransaction(&self, input: &Rc) -> Rc, Rc>>; - fn ExportTableToPointInTime(&self, input: &Rc) -> Rc, Rc>>; - fn GetItem(&self, input: &Rc) -> Rc, Rc>>; - fn GetResourcePolicy(&self, input: &Rc) -> Rc, Rc>>; - fn ImportTable(&self, input: &Rc) -> Rc, Rc>>; - fn ListBackups(&self, input: &Rc) -> Rc, Rc>>; - fn ListContributorInsights(&self, input: &Rc) -> Rc, Rc>>; - fn ListExports(&self, input: &Rc) -> Rc, Rc>>; - fn ListGlobalTables(&self, input: &Rc) -> Rc, Rc>>; - fn ListImports(&self, input: &Rc) -> Rc, Rc>>; - fn ListTables(&self, input: &Rc) -> Rc, Rc>>; - fn ListTagsOfResource(&self, input: &Rc) -> Rc, Rc>>; - fn PutItem(&self, input: &Rc) -> Rc, Rc>>; - fn PutResourcePolicy(&self, input: &Rc) -> Rc, Rc>>; - fn Query(&self, input: &Rc) -> Rc, Rc>>; - fn RestoreTableFromBackup(&self, input: &Rc) -> Rc, Rc>>; - fn RestoreTableToPointInTime(&self, input: &Rc) -> Rc, Rc>>; - fn Scan(&self, input: &Rc) -> Rc, Rc>>; - fn TagResource(&self, input: &Rc) -> Rc>>; - fn TransactGetItems(&self, input: &Rc) -> Rc, Rc>>; - fn TransactWriteItems(&self, input: &Rc) -> Rc, Rc>>; - fn UntagResource(&self, input: &Rc) -> Rc>>; - fn UpdateContinuousBackups(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateContributorInsights(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateGlobalTable(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateGlobalTableSettings(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateItem(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateKinesisStreamingDestination(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateTable(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateTableReplicaAutoScaling(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateTimeToLive(&self, input: &Rc) -> Rc, Rc>>; - } - - #[derive(PartialEq, Clone)] - pub enum EnableKinesisStreamingConfiguration { - EnableKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: Rc>> - } - } - - impl EnableKinesisStreamingConfiguration { - pub fn ApproximateCreationDateTimePrecision(&self) -> &Rc>> { - match self { - EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, - } - } - } - - impl Debug - for EnableKinesisStreamingConfiguration { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(531,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTableReplicaAutoScalingInput { + DescribeTableReplicaAutoScalingInput { + TableName: Sequence + } + } - impl DafnyPrint - for EnableKinesisStreamingConfiguration { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingConfiguration.EnableKinesisStreamingConfiguration(")?; - DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DescribeTableReplicaAutoScalingInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => TableName, + } + } + } - impl Eq - for EnableKinesisStreamingConfiguration {} + impl Debug + for DescribeTableReplicaAutoScalingInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for EnableKinesisStreamingConfiguration { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { - Hash::hash(ApproximateCreationDateTimePrecision, _state) - }, - } - } - } + impl DafnyPrint + for DescribeTableReplicaAutoScalingInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableReplicaAutoScalingInput.DescribeTableReplicaAutoScalingInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for EnableKinesisStreamingConfiguration { - fn default() -> EnableKinesisStreamingConfiguration { - EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: Default::default() - } - } - } + impl Eq + for DescribeTableReplicaAutoScalingInput {} - impl AsRef - for &EnableKinesisStreamingConfiguration { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for DescribeTableReplicaAutoScalingInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum EnableKinesisStreamingDestinationInput { - EnableKinesisStreamingDestinationInput { - TableName: Sequence, - StreamArn: Sequence, - EnableKinesisStreamingConfiguration: Rc>> - } - } + impl Default + for DescribeTableReplicaAutoScalingInput { + fn default() -> DescribeTableReplicaAutoScalingInput { + DescribeTableReplicaAutoScalingInput::DescribeTableReplicaAutoScalingInput { + TableName: Default::default() + } + } + } - impl EnableKinesisStreamingDestinationInput { - pub fn TableName(&self) -> &Sequence { - match self { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Sequence { - match self { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } + impl AsRef + for DescribeTableReplicaAutoScalingInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for EnableKinesisStreamingDestinationInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(534,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTableReplicaAutoScalingOutput { + DescribeTableReplicaAutoScalingOutput { + TableAutoScalingDescription: Arc>> + } + } - impl DafnyPrint - for EnableKinesisStreamingDestinationInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingDestinationInput.EnableKinesisStreamingDestinationInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DescribeTableReplicaAutoScalingOutput { + /// Returns a borrow of the field TableAutoScalingDescription + pub fn TableAutoScalingDescription(&self) -> &Arc>> { + match self { + DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => TableAutoScalingDescription, + } + } + } - impl Eq - for EnableKinesisStreamingDestinationInput {} + impl Debug + for DescribeTableReplicaAutoScalingOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for EnableKinesisStreamingDestinationInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for EnableKinesisStreamingDestinationInput { - fn default() -> EnableKinesisStreamingDestinationInput { - EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput { - TableName: Default::default(), - StreamArn: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &EnableKinesisStreamingDestinationInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EnableKinesisStreamingDestinationOutput { - EnableKinesisStreamingDestinationOutput { - TableName: Rc>>, - StreamArn: Rc>>, - DestinationStatus: Rc>>, - EnableKinesisStreamingConfiguration: Rc>> - } - } - - impl EnableKinesisStreamingDestinationOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Rc>> { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn DestinationStatus(&self) -> &Rc>> { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } - - impl Debug - for EnableKinesisStreamingDestinationOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeTableReplicaAutoScalingOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTableReplicaAutoScalingOutput.DescribeTableReplicaAutoScalingOutput(")?; + DafnyPrint::fmt_print(TableAutoScalingDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for EnableKinesisStreamingDestinationOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingDestinationOutput.EnableKinesisStreamingDestinationOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeTableReplicaAutoScalingOutput {} - impl Eq - for EnableKinesisStreamingDestinationOutput {} + impl Hash + for DescribeTableReplicaAutoScalingOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { + Hash::hash(TableAutoScalingDescription, _state) + }, + } + } + } - impl Hash - for EnableKinesisStreamingDestinationOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(DestinationStatus, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } + impl Default + for DescribeTableReplicaAutoScalingOutput { + fn default() -> DescribeTableReplicaAutoScalingOutput { + DescribeTableReplicaAutoScalingOutput::DescribeTableReplicaAutoScalingOutput { + TableAutoScalingDescription: Default::default() + } + } + } - impl Default - for EnableKinesisStreamingDestinationOutput { - fn default() -> EnableKinesisStreamingDestinationOutput { - EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput { - TableName: Default::default(), - StreamArn: Default::default(), - DestinationStatus: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } + impl AsRef + for DescribeTableReplicaAutoScalingOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &EnableKinesisStreamingDestinationOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(537,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTimeToLiveInput { + DescribeTimeToLiveInput { + TableName: Sequence + } + } - #[derive(PartialEq, Clone)] - pub enum Endpoint { - Endpoint { - Address: Sequence, - CachePeriodInMinutes: i64 - } - } + impl DescribeTimeToLiveInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => TableName, + } + } + } - impl Endpoint { - pub fn Address(&self) -> &Sequence { - match self { - Endpoint::Endpoint{Address, CachePeriodInMinutes, } => Address, - } - } - pub fn CachePeriodInMinutes(&self) -> &i64 { - match self { - Endpoint::Endpoint{Address, CachePeriodInMinutes, } => CachePeriodInMinutes, - } - } - } + impl Debug + for DescribeTimeToLiveInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for Endpoint { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DescribeTimeToLiveInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTimeToLiveInput.DescribeTimeToLiveInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for Endpoint { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Endpoint::Endpoint{Address, CachePeriodInMinutes, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Endpoint.Endpoint(")?; - DafnyPrint::fmt_print(Address, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CachePeriodInMinutes, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DescribeTimeToLiveInput {} - impl Eq - for Endpoint {} + impl Hash + for DescribeTimeToLiveInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTimeToLiveInput::DescribeTimeToLiveInput{TableName, } => { + Hash::hash(TableName, _state) + }, + } + } + } - impl Hash - for Endpoint { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Endpoint::Endpoint{Address, CachePeriodInMinutes, } => { - Hash::hash(Address, _state); - Hash::hash(CachePeriodInMinutes, _state) - }, - } - } - } - - impl Default - for Endpoint { - fn default() -> Endpoint { - Endpoint::Endpoint { - Address: Default::default(), - CachePeriodInMinutes: Default::default() - } - } - } - - impl AsRef - for &Endpoint { - fn as_ref(&self) -> Self { - self - } - } - - pub type ErrorCount = i64; - - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementInput { - ExecuteStatementInput { - Statement: Sequence, - Parameters: Rc>, - ConsistentRead: Rc>, - NextToken: Rc>>, - ReturnConsumedCapacity: Rc>>, - Limit: Rc> - } - } - - impl ExecuteStatementInput { - pub fn Statement(&self) -> &Sequence { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Statement, - } - } - pub fn Parameters(&self) -> &Rc> { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Parameters, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => ConsistentRead, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => NextToken, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => ReturnConsumedCapacity, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Limit, - } - } - } - - impl Debug - for ExecuteStatementInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DescribeTimeToLiveInput { + fn default() -> DescribeTimeToLiveInput { + DescribeTimeToLiveInput::DescribeTimeToLiveInput { + TableName: Default::default() + } + } + } - impl DafnyPrint - for ExecuteStatementInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteStatementInput.ExecuteStatementInput(")?; - DafnyPrint::fmt_print(Statement, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Parameters, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for DescribeTimeToLiveInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ExecuteStatementInput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(540,3) + #[derive(PartialEq, Clone)] + pub enum DescribeTimeToLiveOutput { + DescribeTimeToLiveOutput { + TimeToLiveDescription: Arc>> + } + } - impl Hash - for ExecuteStatementInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => { - Hash::hash(Statement, _state); - Hash::hash(Parameters, _state); - Hash::hash(ConsistentRead, _state); - Hash::hash(NextToken, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(Limit, _state) - }, - } - } - } - - impl Default - for ExecuteStatementInput { - fn default() -> ExecuteStatementInput { - ExecuteStatementInput::ExecuteStatementInput { - Statement: Default::default(), - Parameters: Default::default(), - ConsistentRead: Default::default(), - NextToken: Default::default(), - ReturnConsumedCapacity: Default::default(), - Limit: Default::default() - } - } - } - - impl AsRef - for &ExecuteStatementInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExecuteStatementOutput { - ExecuteStatementOutput { - Items: Rc, Rc>>>>, - NextToken: Rc>>, - ConsumedCapacity: Rc>>, - LastEvaluatedKey: Rc, Rc>>> - } - } - - impl ExecuteStatementOutput { - pub fn Items(&self) -> &Rc, Rc>>>> { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => Items, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => NextToken, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => ConsumedCapacity, - } - } - pub fn LastEvaluatedKey(&self) -> &Rc, Rc>>> { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => LastEvaluatedKey, - } - } - } - - impl Debug - for ExecuteStatementOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DescribeTimeToLiveOutput { + /// Returns a borrow of the field TimeToLiveDescription + pub fn TimeToLiveDescription(&self) -> &Arc>> { + match self { + DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => TimeToLiveDescription, + } + } + } - impl DafnyPrint - for ExecuteStatementOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteStatementOutput.ExecuteStatementOutput(")?; - DafnyPrint::fmt_print(Items, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DescribeTimeToLiveOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ExecuteStatementOutput {} + impl DafnyPrint + for DescribeTimeToLiveOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DescribeTimeToLiveOutput.DescribeTimeToLiveOutput(")?; + DafnyPrint::fmt_print(TimeToLiveDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ExecuteStatementOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => { - Hash::hash(Items, _state); - Hash::hash(NextToken, _state); - Hash::hash(ConsumedCapacity, _state); - Hash::hash(LastEvaluatedKey, _state) - }, - } - } - } - - impl Default - for ExecuteStatementOutput { - fn default() -> ExecuteStatementOutput { - ExecuteStatementOutput::ExecuteStatementOutput { - Items: Default::default(), - NextToken: Default::default(), - ConsumedCapacity: Default::default(), - LastEvaluatedKey: Default::default() - } - } - } - - impl AsRef - for &ExecuteStatementOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionInput { - ExecuteTransactionInput { - TransactStatements: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatements, - ClientRequestToken: Rc>>, - ReturnConsumedCapacity: Rc>> - } - } - - impl ExecuteTransactionInput { - pub fn TransactStatements(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatements { - match self { - ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => TransactStatements, - } - } - pub fn ClientRequestToken(&self) -> &Rc>> { - match self { - ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => ClientRequestToken, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => ReturnConsumedCapacity, - } - } - } - - impl Debug - for ExecuteTransactionInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for DescribeTimeToLiveOutput {} - impl DafnyPrint - for ExecuteTransactionInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteTransactionInput.ExecuteTransactionInput(")?; - DafnyPrint::fmt_print(TransactStatements, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ClientRequestToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for DescribeTimeToLiveOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeTimeToLiveOutput::DescribeTimeToLiveOutput{TimeToLiveDescription, } => { + Hash::hash(TimeToLiveDescription, _state) + }, + } + } + } - impl Eq - for ExecuteTransactionInput {} + impl Default + for DescribeTimeToLiveOutput { + fn default() -> DescribeTimeToLiveOutput { + DescribeTimeToLiveOutput::DescribeTimeToLiveOutput { + TimeToLiveDescription: Default::default() + } + } + } - impl Hash - for ExecuteTransactionInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => { - Hash::hash(TransactStatements, _state); - Hash::hash(ClientRequestToken, _state); - Hash::hash(ReturnConsumedCapacity, _state) - }, - } - } - } + impl AsRef + for DescribeTimeToLiveOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ExecuteTransactionInput { - fn default() -> ExecuteTransactionInput { - ExecuteTransactionInput::ExecuteTransactionInput { - TransactStatements: Default::default(), - ClientRequestToken: Default::default(), - ReturnConsumedCapacity: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(543,3) + #[derive(PartialEq, Clone)] + pub enum DestinationStatus { + ENABLING {}, + ACTIVE {}, + DISABLING {}, + DISABLED {}, + ENABLE_FAILED {}, + UPDATING {} + } - impl AsRef - for &ExecuteTransactionInput { - fn as_ref(&self) -> Self { - self - } - } + impl DestinationStatus {} - #[derive(PartialEq, Clone)] - pub enum ExecuteTransactionOutput { - ExecuteTransactionOutput { - Responses: Rc>, - ConsumedCapacity: Rc>>> - } - } + impl Debug + for DestinationStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExecuteTransactionOutput { - pub fn Responses(&self) -> &Rc> { - match self { - ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => Responses, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>>> { - match self { - ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => ConsumedCapacity, - } - } - } + impl DafnyPrint + for DestinationStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DestinationStatus::ENABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ENABLING")?; + Ok(()) + }, + DestinationStatus::ACTIVE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ACTIVE")?; + Ok(()) + }, + DestinationStatus::DISABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.DISABLING")?; + Ok(()) + }, + DestinationStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.DISABLED")?; + Ok(()) + }, + DestinationStatus::ENABLE_FAILED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.ENABLE__FAILED")?; + Ok(()) + }, + DestinationStatus::UPDATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DestinationStatus.UPDATING")?; + Ok(()) + }, + } + } + } - impl Debug - for ExecuteTransactionOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DestinationStatus { + /// Enumerates all possible values of DestinationStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DestinationStatus::ENABLING {}), Arc::new(DestinationStatus::ACTIVE {}), Arc::new(DestinationStatus::DISABLING {}), Arc::new(DestinationStatus::DISABLED {}), Arc::new(DestinationStatus::ENABLE_FAILED {}), Arc::new(DestinationStatus::UPDATING {})].iter() + } + } - impl DafnyPrint - for ExecuteTransactionOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteTransactionOutput.ExecuteTransactionOutput(")?; - DafnyPrint::fmt_print(Responses, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DestinationStatus {} - impl Eq - for ExecuteTransactionOutput {} + impl Hash + for DestinationStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DestinationStatus::ENABLING{} => { - impl Hash - for ExecuteTransactionOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => { - Hash::hash(Responses, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } - - impl Default - for ExecuteTransactionOutput { - fn default() -> ExecuteTransactionOutput { - ExecuteTransactionOutput::ExecuteTransactionOutput { - Responses: Default::default(), - ConsumedCapacity: Default::default() - } - } - } - - impl AsRef - for &ExecuteTransactionOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExpectedAttributeValue { - ExpectedAttributeValue { - Value: Rc>>, - Exists: Rc>, - ComparisonOperator: Rc>>, - AttributeValueList: Rc>>> - } - } - - impl ExpectedAttributeValue { - pub fn Value(&self) -> &Rc>> { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => Value, - } - } - pub fn Exists(&self) -> &Rc> { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => Exists, - } - } - pub fn ComparisonOperator(&self) -> &Rc>> { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => ComparisonOperator, - } - } - pub fn AttributeValueList(&self) -> &Rc>>> { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => AttributeValueList, - } - } - } - - impl Debug - for ExpectedAttributeValue { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + DestinationStatus::ACTIVE{} => { - impl DafnyPrint - for ExpectedAttributeValue { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExpectedAttributeValue.ExpectedAttributeValue(")?; - DafnyPrint::fmt_print(Value, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Exists, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ComparisonOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributeValueList, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + DestinationStatus::DISABLING{} => { - impl Eq - for ExpectedAttributeValue {} + }, + DestinationStatus::DISABLED{} => { - impl Hash - for ExpectedAttributeValue { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => { - Hash::hash(Value, _state); - Hash::hash(Exists, _state); - Hash::hash(ComparisonOperator, _state); - Hash::hash(AttributeValueList, _state) - }, - } - } - } - - impl Default - for ExpectedAttributeValue { - fn default() -> ExpectedAttributeValue { - ExpectedAttributeValue::ExpectedAttributeValue { - Value: Default::default(), - Exists: Default::default(), - ComparisonOperator: Default::default(), - AttributeValueList: Default::default() - } - } - } - - impl AsRef - for &ExpectedAttributeValue { - fn as_ref(&self) -> Self { - self - } - } - - pub type ExportArn = Sequence; - - #[derive(PartialEq, Clone)] - pub enum ExportDescription { - ExportDescription { - ExportArn: Rc>>, - ExportStatus: Rc>>, - StartTime: Rc>>, - EndTime: Rc>>, - ExportManifest: Rc>>, - TableArn: Rc>>, - TableId: Rc>>, - ExportTime: Rc>>, - ClientToken: Rc>>, - S3Bucket: Rc>>, - S3BucketOwner: Rc>>, - S3Prefix: Rc>>, - S3SseAlgorithm: Rc>>, - S3SseKmsKeyId: Rc>>, - FailureCode: Rc>>, - FailureMessage: Rc>>, - ExportFormat: Rc>>, - BilledSizeBytes: Rc>, - ItemCount: Rc>, - ExportType: Rc>>, - IncrementalExportSpecification: Rc>> - } - } - - impl ExportDescription { - pub fn ExportArn(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportArn, - } - } - pub fn ExportStatus(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportStatus, - } - } - pub fn StartTime(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => StartTime, - } - } - pub fn EndTime(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => EndTime, - } - } - pub fn ExportManifest(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportManifest, - } - } - pub fn TableArn(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => TableArn, - } - } - pub fn TableId(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => TableId, - } - } - pub fn ExportTime(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportTime, - } - } - pub fn ClientToken(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ClientToken, - } - } - pub fn S3Bucket(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3Bucket, - } - } - pub fn S3BucketOwner(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3BucketOwner, - } - } - pub fn S3Prefix(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3Prefix, - } - } - pub fn S3SseAlgorithm(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3SseAlgorithm, - } - } - pub fn S3SseKmsKeyId(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3SseKmsKeyId, - } - } - pub fn FailureCode(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => FailureCode, - } - } - pub fn FailureMessage(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => FailureMessage, - } - } - pub fn ExportFormat(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportFormat, - } - } - pub fn BilledSizeBytes(&self) -> &Rc> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => BilledSizeBytes, - } - } - pub fn ItemCount(&self) -> &Rc> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ItemCount, - } - } - pub fn ExportType(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportType, - } - } - pub fn IncrementalExportSpecification(&self) -> &Rc>> { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => IncrementalExportSpecification, - } - } - } - - impl Debug - for ExportDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + DestinationStatus::ENABLE_FAILED{} => { - impl DafnyPrint - for ExportDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportDescription.ExportDescription(")?; - DafnyPrint::fmt_print(ExportArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StartTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EndTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportManifest, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ClientToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3Bucket, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3BucketOwner, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3Prefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3SseAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3SseKmsKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FailureCode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FailureMessage, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportFormat, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BilledSizeBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IncrementalExportSpecification, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + DestinationStatus::UPDATING{} => { - impl Eq - for ExportDescription {} + }, + } + } + } - impl Hash - for ExportDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => { - Hash::hash(ExportArn, _state); - Hash::hash(ExportStatus, _state); - Hash::hash(StartTime, _state); - Hash::hash(EndTime, _state); - Hash::hash(ExportManifest, _state); - Hash::hash(TableArn, _state); - Hash::hash(TableId, _state); - Hash::hash(ExportTime, _state); - Hash::hash(ClientToken, _state); - Hash::hash(S3Bucket, _state); - Hash::hash(S3BucketOwner, _state); - Hash::hash(S3Prefix, _state); - Hash::hash(S3SseAlgorithm, _state); - Hash::hash(S3SseKmsKeyId, _state); - Hash::hash(FailureCode, _state); - Hash::hash(FailureMessage, _state); - Hash::hash(ExportFormat, _state); - Hash::hash(BilledSizeBytes, _state); - Hash::hash(ItemCount, _state); - Hash::hash(ExportType, _state); - Hash::hash(IncrementalExportSpecification, _state) - }, - } - } - } - - impl Default - for ExportDescription { - fn default() -> ExportDescription { - ExportDescription::ExportDescription { - ExportArn: Default::default(), - ExportStatus: Default::default(), - StartTime: Default::default(), - EndTime: Default::default(), - ExportManifest: Default::default(), - TableArn: Default::default(), - TableId: Default::default(), - ExportTime: Default::default(), - ClientToken: Default::default(), - S3Bucket: Default::default(), - S3BucketOwner: Default::default(), - S3Prefix: Default::default(), - S3SseAlgorithm: Default::default(), - S3SseKmsKeyId: Default::default(), - FailureCode: Default::default(), - FailureMessage: Default::default(), - ExportFormat: Default::default(), - BilledSizeBytes: Default::default(), - ItemCount: Default::default(), - ExportType: Default::default(), - IncrementalExportSpecification: Default::default() - } - } - } - - impl AsRef - for &ExportDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExportFormat { - DYNAMODB_JSON {}, - ION {} - } - - impl ExportFormat {} - - impl Debug - for ExportFormat { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for DestinationStatus { + fn default() -> DestinationStatus { + DestinationStatus::ENABLING {} + } + } - impl DafnyPrint - for ExportFormat { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportFormat::DYNAMODB_JSON{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportFormat.DYNAMODB__JSON")?; - Ok(()) - }, - ExportFormat::ION{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportFormat.ION")?; - Ok(()) - }, - } - } - } + impl AsRef + for DestinationStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl ExportFormat { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ExportFormat::DYNAMODB_JSON {}), Rc::new(ExportFormat::ION {})].iter() - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(550,3) + #[derive(PartialEq, Clone)] + pub enum DisableKinesisStreamingDestinationInput { + DisableKinesisStreamingDestinationInput { + TableName: Sequence, + StreamArn: Sequence, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl Eq - for ExportFormat {} + impl DisableKinesisStreamingDestinationInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Sequence { + match self { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl Hash - for ExportFormat { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportFormat::DYNAMODB_JSON{} => { + impl Debug + for DisableKinesisStreamingDestinationInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ExportFormat::ION{} => { + impl DafnyPrint + for DisableKinesisStreamingDestinationInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DisableKinesisStreamingDestinationInput.DisableKinesisStreamingDestinationInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for DisableKinesisStreamingDestinationInput {} + + impl Hash + for DisableKinesisStreamingDestinationInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Default - for ExportFormat { - fn default() -> ExportFormat { - ExportFormat::DYNAMODB_JSON {} - } - } + impl Default + for DisableKinesisStreamingDestinationInput { + fn default() -> DisableKinesisStreamingDestinationInput { + DisableKinesisStreamingDestinationInput::DisableKinesisStreamingDestinationInput { + TableName: Default::default(), + StreamArn: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - impl AsRef - for &ExportFormat { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DisableKinesisStreamingDestinationInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ExportStatus { - IN_PROGRESS {}, - COMPLETED {}, - FAILED {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(555,3) + #[derive(PartialEq, Clone)] + pub enum DisableKinesisStreamingDestinationOutput { + DisableKinesisStreamingDestinationOutput { + TableName: Arc>>, + StreamArn: Arc>>, + DestinationStatus: Arc>>, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl ExportStatus {} + impl DisableKinesisStreamingDestinationOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Arc>> { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field DestinationStatus + pub fn DestinationStatus(&self) -> &Arc>> { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl Debug - for ExportStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DisableKinesisStreamingDestinationOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ExportStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportStatus::IN_PROGRESS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.IN__PROGRESS")?; - Ok(()) - }, - ExportStatus::COMPLETED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.COMPLETED")?; - Ok(()) - }, - ExportStatus::FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.FAILED")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DisableKinesisStreamingDestinationOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.DisableKinesisStreamingDestinationOutput.DisableKinesisStreamingDestinationOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ExportStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ExportStatus::IN_PROGRESS {}), Rc::new(ExportStatus::COMPLETED {}), Rc::new(ExportStatus::FAILED {})].iter() - } - } + impl Eq + for DisableKinesisStreamingDestinationOutput {} + + impl Hash + for DisableKinesisStreamingDestinationOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(DestinationStatus, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Eq - for ExportStatus {} + impl Default + for DisableKinesisStreamingDestinationOutput { + fn default() -> DisableKinesisStreamingDestinationOutput { + DisableKinesisStreamingDestinationOutput::DisableKinesisStreamingDestinationOutput { + TableName: Default::default(), + StreamArn: Default::default(), + DestinationStatus: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - impl Hash - for ExportStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportStatus::IN_PROGRESS{} => { + impl AsRef + for DisableKinesisStreamingDestinationOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - ExportStatus::COMPLETED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(561,3) + pub type DoubleObject = Sequence; - }, - ExportStatus::FAILED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(565,3) + pub struct IDynamoDBClientCallHistory {} - }, - } - } - } + impl IDynamoDBClientCallHistory { + /// Allocates an UNINITIALIZED instance. Only the Dafny compiler should use that. + pub fn _allocate_object() -> Object { + allocate_object::() + } + } - impl Default - for ExportStatus { - fn default() -> ExportStatus { - ExportStatus::IN_PROGRESS {} - } - } + impl UpcastObject + for crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::IDynamoDBClientCallHistory { + UpcastObjectFn!(DynAny); + } - impl AsRef - for &ExportStatus { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(683,3) + pub trait IDynamoDBClient: Any + Sync + Send + UpcastObject { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(712,5) + fn BatchExecuteStatement(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(727,5) + fn BatchGetItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(742,5) + fn BatchWriteItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(757,5) + fn CreateBackup(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(772,5) + fn CreateGlobalTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(787,5) + fn CreateTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(802,5) + fn DeleteBackup(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(817,5) + fn DeleteItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(832,5) + fn DeleteResourcePolicy(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(847,5) + fn DeleteTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(862,5) + fn DescribeBackup(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(877,5) + fn DescribeContinuousBackups(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(892,5) + fn DescribeContributorInsights(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(907,5) + fn DescribeEndpoints(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(922,5) + fn DescribeExport(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(937,5) + fn DescribeGlobalTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(952,5) + fn DescribeGlobalTableSettings(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(967,5) + fn DescribeImport(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(982,5) + fn DescribeKinesisStreamingDestination(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(997,5) + fn DescribeLimits(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1012,5) + fn DescribeTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1027,5) + fn DescribeTableReplicaAutoScaling(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1042,5) + fn DescribeTimeToLive(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1057,5) + fn DisableKinesisStreamingDestination(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1072,5) + fn EnableKinesisStreamingDestination(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1087,5) + fn ExecuteStatement(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1102,5) + fn ExecuteTransaction(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1117,5) + fn ExportTableToPointInTime(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1132,5) + fn GetItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1147,5) + fn GetResourcePolicy(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1162,5) + fn ImportTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1177,5) + fn ListBackups(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1192,5) + fn ListContributorInsights(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1207,5) + fn ListExports(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1222,5) + fn ListGlobalTables(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1237,5) + fn ListImports(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1252,5) + fn ListTables(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1267,5) + fn ListTagsOfResource(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1282,5) + fn PutItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1297,5) + fn PutResourcePolicy(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1312,5) + fn Query(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1327,5) + fn RestoreTableFromBackup(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1342,5) + fn RestoreTableToPointInTime(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1357,5) + fn Scan(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1372,5) + fn TagResource(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1387,5) + fn TransactGetItems(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1402,5) + fn TransactWriteItems(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1417,5) + fn UntagResource(&self, input: &Arc) -> Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1432,5) + fn UpdateContinuousBackups(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1447,5) + fn UpdateContributorInsights(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1462,5) + fn UpdateGlobalTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1477,5) + fn UpdateGlobalTableSettings(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1492,5) + fn UpdateItem(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1507,5) + fn UpdateKinesisStreamingDestination(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1522,5) + fn UpdateTable(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1537,5) + fn UpdateTableReplicaAutoScaling(&self, input: &Arc) -> Arc, Arc>>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1552,5) + fn UpdateTimeToLive(&self, input: &Arc) -> Arc, Arc>>; + } - #[derive(PartialEq, Clone)] - pub enum ExportSummary { - ExportSummary { - ExportArn: Rc>>, - ExportStatus: Rc>>, - ExportType: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1566,3) + #[derive(PartialEq, Clone)] + pub enum EnableKinesisStreamingConfiguration { + EnableKinesisStreamingConfiguration { + ApproximateCreationDateTimePrecision: Arc>> + } + } - impl ExportSummary { - pub fn ExportArn(&self) -> &Rc>> { - match self { - ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportArn, - } - } - pub fn ExportStatus(&self) -> &Rc>> { - match self { - ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportStatus, - } - } - pub fn ExportType(&self) -> &Rc>> { - match self { - ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportType, - } - } - } + impl EnableKinesisStreamingConfiguration { + /// Returns a borrow of the field ApproximateCreationDateTimePrecision + pub fn ApproximateCreationDateTimePrecision(&self) -> &Arc>> { + match self { + EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, + } + } + } - impl Debug - for ExportSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for EnableKinesisStreamingConfiguration { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ExportSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportSummary.ExportSummary(")?; - DafnyPrint::fmt_print(ExportArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for EnableKinesisStreamingConfiguration { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingConfiguration.EnableKinesisStreamingConfiguration(")?; + DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ExportSummary {} + impl Eq + for EnableKinesisStreamingConfiguration {} - impl Hash - for ExportSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => { - Hash::hash(ExportArn, _state); - Hash::hash(ExportStatus, _state); - Hash::hash(ExportType, _state) - }, - } - } - } - - impl Default - for ExportSummary { - fn default() -> ExportSummary { - ExportSummary::ExportSummary { - ExportArn: Default::default(), - ExportStatus: Default::default(), - ExportType: Default::default() - } - } - } - - impl AsRef - for &ExportSummary { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExportTableToPointInTimeInput { - ExportTableToPointInTimeInput { - TableArn: Sequence, - ExportTime: Rc>>, - ClientToken: Rc>>, - S3Bucket: Sequence, - S3BucketOwner: Rc>>, - S3Prefix: Rc>>, - S3SseAlgorithm: Rc>>, - S3SseKmsKeyId: Rc>>, - ExportFormat: Rc>>, - ExportType: Rc>>, - IncrementalExportSpecification: Rc>> - } - } - - impl ExportTableToPointInTimeInput { - pub fn TableArn(&self) -> &Sequence { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => TableArn, - } - } - pub fn ExportTime(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportTime, - } - } - pub fn ClientToken(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ClientToken, - } - } - pub fn S3Bucket(&self) -> &Sequence { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3Bucket, - } - } - pub fn S3BucketOwner(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3BucketOwner, - } - } - pub fn S3Prefix(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3Prefix, - } - } - pub fn S3SseAlgorithm(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3SseAlgorithm, - } - } - pub fn S3SseKmsKeyId(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3SseKmsKeyId, - } - } - pub fn ExportFormat(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportFormat, - } - } - pub fn ExportType(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportType, - } - } - pub fn IncrementalExportSpecification(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => IncrementalExportSpecification, - } - } - } - - impl Debug - for ExportTableToPointInTimeInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for EnableKinesisStreamingConfiguration { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { + Hash::hash(ApproximateCreationDateTimePrecision, _state) + }, + } + } + } - impl DafnyPrint - for ExportTableToPointInTimeInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportTableToPointInTimeInput.ExportTableToPointInTimeInput(")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ClientToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3Bucket, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3BucketOwner, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3Prefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3SseAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3SseKmsKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportFormat, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IncrementalExportSpecification, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for EnableKinesisStreamingConfiguration { + fn default() -> EnableKinesisStreamingConfiguration { + EnableKinesisStreamingConfiguration::EnableKinesisStreamingConfiguration { + ApproximateCreationDateTimePrecision: Default::default() + } + } + } - impl Eq - for ExportTableToPointInTimeInput {} + impl AsRef + for EnableKinesisStreamingConfiguration { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ExportTableToPointInTimeInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => { - Hash::hash(TableArn, _state); - Hash::hash(ExportTime, _state); - Hash::hash(ClientToken, _state); - Hash::hash(S3Bucket, _state); - Hash::hash(S3BucketOwner, _state); - Hash::hash(S3Prefix, _state); - Hash::hash(S3SseAlgorithm, _state); - Hash::hash(S3SseKmsKeyId, _state); - Hash::hash(ExportFormat, _state); - Hash::hash(ExportType, _state); - Hash::hash(IncrementalExportSpecification, _state) - }, - } - } - } - - impl Default - for ExportTableToPointInTimeInput { - fn default() -> ExportTableToPointInTimeInput { - ExportTableToPointInTimeInput::ExportTableToPointInTimeInput { - TableArn: Default::default(), - ExportTime: Default::default(), - ClientToken: Default::default(), - S3Bucket: Default::default(), - S3BucketOwner: Default::default(), - S3Prefix: Default::default(), - S3SseAlgorithm: Default::default(), - S3SseKmsKeyId: Default::default(), - ExportFormat: Default::default(), - ExportType: Default::default(), - IncrementalExportSpecification: Default::default() - } - } - } - - impl AsRef - for &ExportTableToPointInTimeInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ExportTableToPointInTimeOutput { - ExportTableToPointInTimeOutput { - ExportDescription: Rc>> - } - } - - impl ExportTableToPointInTimeOutput { - pub fn ExportDescription(&self) -> &Rc>> { - match self { - ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => ExportDescription, - } - } - } - - impl Debug - for ExportTableToPointInTimeOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1569,3) + #[derive(PartialEq, Clone)] + pub enum EnableKinesisStreamingDestinationInput { + EnableKinesisStreamingDestinationInput { + TableName: Sequence, + StreamArn: Sequence, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl DafnyPrint - for ExportTableToPointInTimeOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportTableToPointInTimeOutput.ExportTableToPointInTimeOutput(")?; - DafnyPrint::fmt_print(ExportDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl EnableKinesisStreamingDestinationInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Sequence { + match self { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl Eq - for ExportTableToPointInTimeOutput {} + impl Debug + for EnableKinesisStreamingDestinationInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ExportTableToPointInTimeOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => { - Hash::hash(ExportDescription, _state) - }, - } - } - } + impl DafnyPrint + for EnableKinesisStreamingDestinationInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingDestinationInput.EnableKinesisStreamingDestinationInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ExportTableToPointInTimeOutput { - fn default() -> ExportTableToPointInTimeOutput { - ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput { - ExportDescription: Default::default() - } - } - } + impl Eq + for EnableKinesisStreamingDestinationInput {} + + impl Hash + for EnableKinesisStreamingDestinationInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl AsRef - for &ExportTableToPointInTimeOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for EnableKinesisStreamingDestinationInput { + fn default() -> EnableKinesisStreamingDestinationInput { + EnableKinesisStreamingDestinationInput::EnableKinesisStreamingDestinationInput { + TableName: Default::default(), + StreamArn: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExportType { - FULL_EXPORT {}, - INCREMENTAL_EXPORT {} - } + impl AsRef + for EnableKinesisStreamingDestinationInput { + fn as_ref(&self) -> &Self { + self + } + } - impl ExportType {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1574,3) + #[derive(PartialEq, Clone)] + pub enum EnableKinesisStreamingDestinationOutput { + EnableKinesisStreamingDestinationOutput { + TableName: Arc>>, + StreamArn: Arc>>, + DestinationStatus: Arc>>, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl Debug - for ExportType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl EnableKinesisStreamingDestinationOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Arc>> { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field DestinationStatus + pub fn DestinationStatus(&self) -> &Arc>> { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl DafnyPrint - for ExportType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportType::FULL_EXPORT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportType.FULL__EXPORT")?; - Ok(()) - }, - ExportType::INCREMENTAL_EXPORT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportType.INCREMENTAL__EXPORT")?; - Ok(()) - }, - } - } - } + impl Debug + for EnableKinesisStreamingDestinationOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExportType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ExportType::FULL_EXPORT {}), Rc::new(ExportType::INCREMENTAL_EXPORT {})].iter() - } - } + impl DafnyPrint + for EnableKinesisStreamingDestinationOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.EnableKinesisStreamingDestinationOutput.EnableKinesisStreamingDestinationOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ExportType {} + impl Eq + for EnableKinesisStreamingDestinationOutput {} + + impl Hash + for EnableKinesisStreamingDestinationOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(DestinationStatus, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Hash - for ExportType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportType::FULL_EXPORT{} => { + impl Default + for EnableKinesisStreamingDestinationOutput { + fn default() -> EnableKinesisStreamingDestinationOutput { + EnableKinesisStreamingDestinationOutput::EnableKinesisStreamingDestinationOutput { + TableName: Default::default(), + StreamArn: Default::default(), + DestinationStatus: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - }, - ExportType::INCREMENTAL_EXPORT{} => { + impl AsRef + for EnableKinesisStreamingDestinationOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1580,3) + #[derive(PartialEq, Clone)] + pub enum Endpoint { + Endpoint { + Address: Sequence, + CachePeriodInMinutes: i64 + } + } - impl Default - for ExportType { - fn default() -> ExportType { - ExportType::FULL_EXPORT {} - } - } + impl Endpoint { + /// Returns a borrow of the field Address + pub fn Address(&self) -> &Sequence { + match self { + Endpoint::Endpoint{Address, CachePeriodInMinutes, } => Address, + } + } + /// Returns a borrow of the field CachePeriodInMinutes + pub fn CachePeriodInMinutes(&self) -> &i64 { + match self { + Endpoint::Endpoint{Address, CachePeriodInMinutes, } => CachePeriodInMinutes, + } + } + } - impl AsRef - for &ExportType { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for Endpoint { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ExportViewType { - NEW_IMAGE {}, - NEW_AND_OLD_IMAGES {} - } + impl DafnyPrint + for Endpoint { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Endpoint::Endpoint{Address, CachePeriodInMinutes, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Endpoint.Endpoint(")?; + DafnyPrint::fmt_print(Address, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CachePeriodInMinutes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ExportViewType {} + impl Eq + for Endpoint {} + + impl Hash + for Endpoint { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Endpoint::Endpoint{Address, CachePeriodInMinutes, } => { + Hash::hash(Address, _state); + Hash::hash(CachePeriodInMinutes, _state) + }, + } + } + } - impl Debug - for ExportViewType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for Endpoint { + fn default() -> Endpoint { + Endpoint::Endpoint { + Address: Default::default(), + CachePeriodInMinutes: Default::default() + } + } + } - impl DafnyPrint - for ExportViewType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExportViewType::NEW_IMAGE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportViewType.NEW__IMAGE")?; - Ok(()) - }, - ExportViewType::NEW_AND_OLD_IMAGES{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportViewType.NEW__AND__OLD__IMAGES")?; - Ok(()) - }, - } - } - } + impl AsRef + for Endpoint { + fn as_ref(&self) -> &Self { + self + } + } - impl ExportViewType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ExportViewType::NEW_IMAGE {}), Rc::new(ExportViewType::NEW_AND_OLD_IMAGES {})].iter() - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1585,3) + pub type ErrorCount = i64; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1592,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementInput { + ExecuteStatementInput { + Statement: Sequence, + Parameters: Arc>, + ConsistentRead: Arc>, + NextToken: Arc>>, + ReturnConsumedCapacity: Arc>>, + Limit: Arc> + } + } - impl Eq - for ExportViewType {} + impl ExecuteStatementInput { + /// Returns a borrow of the field Statement + pub fn Statement(&self) -> &Sequence { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Statement, + } + } + /// Returns a borrow of the field Parameters + pub fn Parameters(&self) -> &Arc> { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Parameters, + } + } + /// Returns a borrow of the field ConsistentRead + pub fn ConsistentRead(&self) -> &Arc> { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => ConsistentRead, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => NextToken, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => Limit, + } + } + } - impl Hash - for ExportViewType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExportViewType::NEW_IMAGE{} => { + impl Debug + for ExecuteStatementInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ExportViewType::NEW_AND_OLD_IMAGES{} => { + impl DafnyPrint + for ExecuteStatementInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteStatementInput.ExecuteStatementInput(")?; + DafnyPrint::fmt_print(Statement, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Parameters, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for ExecuteStatementInput {} + + impl Hash + for ExecuteStatementInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementInput::ExecuteStatementInput{Statement, Parameters, ConsistentRead, NextToken, ReturnConsumedCapacity, Limit, } => { + Hash::hash(Statement, _state); + Hash::hash(Parameters, _state); + Hash::hash(ConsistentRead, _state); + Hash::hash(NextToken, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(Limit, _state) + }, + } + } + } - impl Default - for ExportViewType { - fn default() -> ExportViewType { - ExportViewType::NEW_IMAGE {} - } - } + impl Default + for ExecuteStatementInput { + fn default() -> ExecuteStatementInput { + ExecuteStatementInput::ExecuteStatementInput { + Statement: Default::default(), + Parameters: Default::default(), + ConsistentRead: Default::default(), + NextToken: Default::default(), + ReturnConsumedCapacity: Default::default(), + Limit: Default::default() + } + } + } - impl AsRef - for &ExportViewType { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ExecuteStatementInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum FailureException { - FailureException { - ExceptionName: Rc>>, - ExceptionDescription: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1600,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteStatementOutput { + ExecuteStatementOutput { + Items: Arc, Arc>>>>, + NextToken: Arc>>, + ConsumedCapacity: Arc>>, + LastEvaluatedKey: Arc, Arc>>> + } + } - impl FailureException { - pub fn ExceptionName(&self) -> &Rc>> { - match self { - FailureException::FailureException{ExceptionName, ExceptionDescription, } => ExceptionName, - } - } - pub fn ExceptionDescription(&self) -> &Rc>> { - match self { - FailureException::FailureException{ExceptionName, ExceptionDescription, } => ExceptionDescription, - } - } - } + impl ExecuteStatementOutput { + /// Returns a borrow of the field Items + pub fn Items(&self) -> &Arc, Arc>>>> { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => Items, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => NextToken, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field LastEvaluatedKey + pub fn LastEvaluatedKey(&self) -> &Arc, Arc>>> { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => LastEvaluatedKey, + } + } + } - impl Debug - for FailureException { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ExecuteStatementOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for FailureException { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - FailureException::FailureException{ExceptionName, ExceptionDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.FailureException.FailureException(")?; - DafnyPrint::fmt_print(ExceptionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExceptionDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ExecuteStatementOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteStatementOutput.ExecuteStatementOutput(")?; + DafnyPrint::fmt_print(Items, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastEvaluatedKey, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for FailureException {} + impl Eq + for ExecuteStatementOutput {} + + impl Hash + for ExecuteStatementOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteStatementOutput::ExecuteStatementOutput{Items, NextToken, ConsumedCapacity, LastEvaluatedKey, } => { + Hash::hash(Items, _state); + Hash::hash(NextToken, _state); + Hash::hash(ConsumedCapacity, _state); + Hash::hash(LastEvaluatedKey, _state) + }, + } + } + } - impl Hash - for FailureException { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - FailureException::FailureException{ExceptionName, ExceptionDescription, } => { - Hash::hash(ExceptionName, _state); - Hash::hash(ExceptionDescription, _state) - }, - } - } - } - - impl Default - for FailureException { - fn default() -> FailureException { - FailureException::FailureException { - ExceptionName: Default::default(), - ExceptionDescription: Default::default() - } - } - } - - impl AsRef - for &FailureException { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum Get { - Get { - Key: Map, Rc>, - TableName: Sequence, - ProjectionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>> - } - } - - impl Get { - pub fn Key(&self) -> &Map, Rc> { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => Key, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => TableName, - } - } - pub fn ProjectionExpression(&self) -> &Rc>> { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, - } - } - } - - impl Debug - for Get { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ExecuteStatementOutput { + fn default() -> ExecuteStatementOutput { + ExecuteStatementOutput::ExecuteStatementOutput { + Items: Default::default(), + NextToken: Default::default(), + ConsumedCapacity: Default::default(), + LastEvaluatedKey: Default::default() + } + } + } - impl DafnyPrint - for Get { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Get.Get(")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ExecuteStatementOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for Get {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1606,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionInput { + ExecuteTransactionInput { + TransactStatements: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatements, + ClientRequestToken: Arc>>, + ReturnConsumedCapacity: Arc>> + } + } - impl Hash - for Get { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => { - Hash::hash(Key, _state); - Hash::hash(TableName, _state); - Hash::hash(ProjectionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state) - }, - } - } - } - - impl Default - for Get { - fn default() -> Get { - Get::Get { - Key: Default::default(), - TableName: Default::default(), - ProjectionExpression: Default::default(), - ExpressionAttributeNames: Default::default() - } - } - } - - impl AsRef - for &Get { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetItemInput { - GetItemInput { - TableName: Sequence, - Key: Map, Rc>, - AttributesToGet: Rc>, - ConsistentRead: Rc>, - ReturnConsumedCapacity: Rc>>, - ProjectionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>> - } - } - - impl GetItemInput { - pub fn TableName(&self) -> &Sequence { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => TableName, - } - } - pub fn Key(&self) -> &Map, Rc> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => Key, - } - } - pub fn AttributesToGet(&self) -> &Rc> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => AttributesToGet, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ConsistentRead, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ReturnConsumedCapacity, - } - } - pub fn ProjectionExpression(&self) -> &Rc>> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, - } - } - } - - impl Debug - for GetItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ExecuteTransactionInput { + /// Returns a borrow of the field TransactStatements + pub fn TransactStatements(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::ParameterizedStatements { + match self { + ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => TransactStatements, + } + } + /// Returns a borrow of the field ClientRequestToken + pub fn ClientRequestToken(&self) -> &Arc>> { + match self { + ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => ClientRequestToken, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => ReturnConsumedCapacity, + } + } + } - impl DafnyPrint - for GetItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetItemInput.GetItemInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ExecuteTransactionInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GetItemInput {} + impl DafnyPrint + for ExecuteTransactionInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteTransactionInput.ExecuteTransactionInput(")?; + DafnyPrint::fmt_print(TransactStatements, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ClientRequestToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GetItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => { - Hash::hash(TableName, _state); - Hash::hash(Key, _state); - Hash::hash(AttributesToGet, _state); - Hash::hash(ConsistentRead, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ProjectionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state) - }, - } - } - } - - impl Default - for GetItemInput { - fn default() -> GetItemInput { - GetItemInput::GetItemInput { - TableName: Default::default(), - Key: Default::default(), - AttributesToGet: Default::default(), - ConsistentRead: Default::default(), - ReturnConsumedCapacity: Default::default(), - ProjectionExpression: Default::default(), - ExpressionAttributeNames: Default::default() - } - } - } - - impl AsRef - for &GetItemInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetItemOutput { - GetItemOutput { - Item: Rc, Rc>>>, - ConsumedCapacity: Rc>> - } - } - - impl GetItemOutput { - pub fn Item(&self) -> &Rc, Rc>>> { - match self { - GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => Item, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => ConsumedCapacity, - } - } - } - - impl Debug - for GetItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ExecuteTransactionInput {} + + impl Hash + for ExecuteTransactionInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionInput::ExecuteTransactionInput{TransactStatements, ClientRequestToken, ReturnConsumedCapacity, } => { + Hash::hash(TransactStatements, _state); + Hash::hash(ClientRequestToken, _state); + Hash::hash(ReturnConsumedCapacity, _state) + }, + } + } + } - impl DafnyPrint - for GetItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetItemOutput.GetItemOutput(")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ExecuteTransactionInput { + fn default() -> ExecuteTransactionInput { + ExecuteTransactionInput::ExecuteTransactionInput { + TransactStatements: Default::default(), + ClientRequestToken: Default::default(), + ReturnConsumedCapacity: Default::default() + } + } + } - impl Eq - for GetItemOutput {} + impl AsRef + for ExecuteTransactionInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GetItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => { - Hash::hash(Item, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1611,3) + #[derive(PartialEq, Clone)] + pub enum ExecuteTransactionOutput { + ExecuteTransactionOutput { + Responses: Arc>, + ConsumedCapacity: Arc>>> + } + } - impl Default - for GetItemOutput { - fn default() -> GetItemOutput { - GetItemOutput::GetItemOutput { - Item: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + impl ExecuteTransactionOutput { + /// Returns a borrow of the field Responses + pub fn Responses(&self) -> &Arc> { + match self { + ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => Responses, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl AsRef - for &GetItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for ExecuteTransactionOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GetResourcePolicyInput { - GetResourcePolicyInput { - ResourceArn: Sequence - } - } + impl DafnyPrint + for ExecuteTransactionOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExecuteTransactionOutput.ExecuteTransactionOutput(")?; + DafnyPrint::fmt_print(Responses, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GetResourcePolicyInput { - pub fn ResourceArn(&self) -> &Sequence { - match self { - GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => ResourceArn, - } - } - } + impl Eq + for ExecuteTransactionOutput {} + + impl Hash + for ExecuteTransactionOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExecuteTransactionOutput::ExecuteTransactionOutput{Responses, ConsumedCapacity, } => { + Hash::hash(Responses, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - impl Debug - for GetResourcePolicyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ExecuteTransactionOutput { + fn default() -> ExecuteTransactionOutput { + ExecuteTransactionOutput::ExecuteTransactionOutput { + Responses: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - impl DafnyPrint - for GetResourcePolicyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetResourcePolicyInput.GetResourcePolicyInput(")?; - DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ExecuteTransactionOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GetResourcePolicyInput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1616,3) + #[derive(PartialEq, Clone)] + pub enum ExpectedAttributeValue { + ExpectedAttributeValue { + Value: Arc>>, + Exists: Arc>, + ComparisonOperator: Arc>>, + AttributeValueList: Arc>>> + } + } - impl Hash - for GetResourcePolicyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => { - Hash::hash(ResourceArn, _state) - }, - } - } - } + impl ExpectedAttributeValue { + /// Returns a borrow of the field Value + pub fn Value(&self) -> &Arc>> { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => Value, + } + } + /// Returns a borrow of the field Exists + pub fn Exists(&self) -> &Arc> { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => Exists, + } + } + /// Returns a borrow of the field ComparisonOperator + pub fn ComparisonOperator(&self) -> &Arc>> { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => ComparisonOperator, + } + } + /// Returns a borrow of the field AttributeValueList + pub fn AttributeValueList(&self) -> &Arc>>> { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => AttributeValueList, + } + } + } - impl Default - for GetResourcePolicyInput { - fn default() -> GetResourcePolicyInput { - GetResourcePolicyInput::GetResourcePolicyInput { - ResourceArn: Default::default() - } - } - } + impl Debug + for ExpectedAttributeValue { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &GetResourcePolicyInput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for ExpectedAttributeValue { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExpectedAttributeValue.ExpectedAttributeValue(")?; + DafnyPrint::fmt_print(Value, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Exists, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ComparisonOperator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeValueList, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetResourcePolicyOutput { - GetResourcePolicyOutput { - Policy: Rc>>, - RevisionId: Rc>> - } - } + impl Eq + for ExpectedAttributeValue {} + + impl Hash + for ExpectedAttributeValue { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExpectedAttributeValue::ExpectedAttributeValue{Value, Exists, ComparisonOperator, AttributeValueList, } => { + Hash::hash(Value, _state); + Hash::hash(Exists, _state); + Hash::hash(ComparisonOperator, _state); + Hash::hash(AttributeValueList, _state) + }, + } + } + } - impl GetResourcePolicyOutput { - pub fn Policy(&self) -> &Rc>> { - match self { - GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => Policy, - } - } - pub fn RevisionId(&self) -> &Rc>> { - match self { - GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => RevisionId, - } - } - } + impl Default + for ExpectedAttributeValue { + fn default() -> ExpectedAttributeValue { + ExpectedAttributeValue::ExpectedAttributeValue { + Value: Default::default(), + Exists: Default::default(), + ComparisonOperator: Default::default(), + AttributeValueList: Default::default() + } + } + } - impl Debug - for GetResourcePolicyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ExpectedAttributeValue { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GetResourcePolicyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetResourcePolicyOutput.GetResourcePolicyOutput(")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RevisionId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1622,3) + pub type ExportArn = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1626,3) + #[derive(PartialEq, Clone)] + pub enum ExportDescription { + ExportDescription { + ExportArn: Arc>>, + ExportStatus: Arc>>, + StartTime: Arc>>, + EndTime: Arc>>, + ExportManifest: Arc>>, + TableArn: Arc>>, + TableId: Arc>>, + ExportTime: Arc>>, + ClientToken: Arc>>, + S3Bucket: Arc>>, + S3BucketOwner: Arc>>, + S3Prefix: Arc>>, + S3SseAlgorithm: Arc>>, + S3SseKmsKeyId: Arc>>, + FailureCode: Arc>>, + FailureMessage: Arc>>, + ExportFormat: Arc>>, + BilledSizeBytes: Arc>, + ItemCount: Arc>, + ExportType: Arc>>, + IncrementalExportSpecification: Arc>> + } + } - impl Eq - for GetResourcePolicyOutput {} + impl ExportDescription { + /// Returns a borrow of the field ExportArn + pub fn ExportArn(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportArn, + } + } + /// Returns a borrow of the field ExportStatus + pub fn ExportStatus(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportStatus, + } + } + /// Returns a borrow of the field StartTime + pub fn StartTime(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => StartTime, + } + } + /// Returns a borrow of the field EndTime + pub fn EndTime(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => EndTime, + } + } + /// Returns a borrow of the field ExportManifest + pub fn ExportManifest(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportManifest, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => TableArn, + } + } + /// Returns a borrow of the field TableId + pub fn TableId(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => TableId, + } + } + /// Returns a borrow of the field ExportTime + pub fn ExportTime(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportTime, + } + } + /// Returns a borrow of the field ClientToken + pub fn ClientToken(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ClientToken, + } + } + /// Returns a borrow of the field S3Bucket + pub fn S3Bucket(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3Bucket, + } + } + /// Returns a borrow of the field S3BucketOwner + pub fn S3BucketOwner(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3BucketOwner, + } + } + /// Returns a borrow of the field S3Prefix + pub fn S3Prefix(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3Prefix, + } + } + /// Returns a borrow of the field S3SseAlgorithm + pub fn S3SseAlgorithm(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3SseAlgorithm, + } + } + /// Returns a borrow of the field S3SseKmsKeyId + pub fn S3SseKmsKeyId(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => S3SseKmsKeyId, + } + } + /// Returns a borrow of the field FailureCode + pub fn FailureCode(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => FailureCode, + } + } + /// Returns a borrow of the field FailureMessage + pub fn FailureMessage(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => FailureMessage, + } + } + /// Returns a borrow of the field ExportFormat + pub fn ExportFormat(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportFormat, + } + } + /// Returns a borrow of the field BilledSizeBytes + pub fn BilledSizeBytes(&self) -> &Arc> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => BilledSizeBytes, + } + } + /// Returns a borrow of the field ItemCount + pub fn ItemCount(&self) -> &Arc> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ItemCount, + } + } + /// Returns a borrow of the field ExportType + pub fn ExportType(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => ExportType, + } + } + /// Returns a borrow of the field IncrementalExportSpecification + pub fn IncrementalExportSpecification(&self) -> &Arc>> { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => IncrementalExportSpecification, + } + } + } - impl Hash - for GetResourcePolicyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => { - Hash::hash(Policy, _state); - Hash::hash(RevisionId, _state) - }, - } - } - } - - impl Default - for GetResourcePolicyOutput { - fn default() -> GetResourcePolicyOutput { - GetResourcePolicyOutput::GetResourcePolicyOutput { - Policy: Default::default(), - RevisionId: Default::default() - } - } - } - - impl AsRef - for &GetResourcePolicyOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GlobalSecondaryIndex { - GlobalSecondaryIndex { - IndexName: Sequence, - KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, - Projection: Rc, - ProvisionedThroughput: Rc>>, - OnDemandThroughput: Rc>> - } - } - - impl GlobalSecondaryIndex { - pub fn IndexName(&self) -> &Sequence { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, - } - } - pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for GlobalSecondaryIndex { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ExportDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GlobalSecondaryIndex { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndex.GlobalSecondaryIndex(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ExportDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportDescription.ExportDescription(")?; + DafnyPrint::fmt_print(ExportArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StartTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EndTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportManifest, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ClientToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3Bucket, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3BucketOwner, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3Prefix, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3SseAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3SseKmsKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FailureCode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FailureMessage, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportFormat, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BilledSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IncrementalExportSpecification, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GlobalSecondaryIndex {} + impl Eq + for ExportDescription {} + + impl Hash + for ExportDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportDescription::ExportDescription{ExportArn, ExportStatus, StartTime, EndTime, ExportManifest, TableArn, TableId, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, FailureCode, FailureMessage, ExportFormat, BilledSizeBytes, ItemCount, ExportType, IncrementalExportSpecification, } => { + Hash::hash(ExportArn, _state); + Hash::hash(ExportStatus, _state); + Hash::hash(StartTime, _state); + Hash::hash(EndTime, _state); + Hash::hash(ExportManifest, _state); + Hash::hash(TableArn, _state); + Hash::hash(TableId, _state); + Hash::hash(ExportTime, _state); + Hash::hash(ClientToken, _state); + Hash::hash(S3Bucket, _state); + Hash::hash(S3BucketOwner, _state); + Hash::hash(S3Prefix, _state); + Hash::hash(S3SseAlgorithm, _state); + Hash::hash(S3SseKmsKeyId, _state); + Hash::hash(FailureCode, _state); + Hash::hash(FailureMessage, _state); + Hash::hash(ExportFormat, _state); + Hash::hash(BilledSizeBytes, _state); + Hash::hash(ItemCount, _state); + Hash::hash(ExportType, _state); + Hash::hash(IncrementalExportSpecification, _state) + }, + } + } + } - impl Hash - for GlobalSecondaryIndex { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } + impl Default + for ExportDescription { + fn default() -> ExportDescription { + ExportDescription::ExportDescription { + ExportArn: Default::default(), + ExportStatus: Default::default(), + StartTime: Default::default(), + EndTime: Default::default(), + ExportManifest: Default::default(), + TableArn: Default::default(), + TableId: Default::default(), + ExportTime: Default::default(), + ClientToken: Default::default(), + S3Bucket: Default::default(), + S3BucketOwner: Default::default(), + S3Prefix: Default::default(), + S3SseAlgorithm: Default::default(), + S3SseKmsKeyId: Default::default(), + FailureCode: Default::default(), + FailureMessage: Default::default(), + ExportFormat: Default::default(), + BilledSizeBytes: Default::default(), + ItemCount: Default::default(), + ExportType: Default::default(), + IncrementalExportSpecification: Default::default() + } + } + } - impl Default - for GlobalSecondaryIndex { - fn default() -> GlobalSecondaryIndex { - GlobalSecondaryIndex::GlobalSecondaryIndex { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default(), - ProvisionedThroughput: Default::default(), - OnDemandThroughput: Default::default() - } - } - } + impl AsRef + for ExportDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GlobalSecondaryIndex { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1649,3) + #[derive(PartialEq, Clone)] + pub enum ExportFormat { + DYNAMODB_JSON {}, + ION {} + } - #[derive(PartialEq, Clone)] - pub enum GlobalSecondaryIndexAutoScalingUpdate { - GlobalSecondaryIndexAutoScalingUpdate { - IndexName: Rc>>, - ProvisionedWriteCapacityAutoScalingUpdate: Rc>> - } - } + impl ExportFormat {} - impl GlobalSecondaryIndexAutoScalingUpdate { - pub fn IndexName(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => IndexName, - } - } - pub fn ProvisionedWriteCapacityAutoScalingUpdate(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => ProvisionedWriteCapacityAutoScalingUpdate, - } - } - } + impl Debug + for ExportFormat { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for GlobalSecondaryIndexAutoScalingUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ExportFormat { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportFormat::DYNAMODB_JSON{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportFormat.DYNAMODB__JSON")?; + Ok(()) + }, + ExportFormat::ION{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportFormat.ION")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GlobalSecondaryIndexAutoScalingUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexAutoScalingUpdate.GlobalSecondaryIndexAutoScalingUpdate(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ExportFormat { + /// Enumerates all possible values of ExportFormat + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ExportFormat::DYNAMODB_JSON {}), Arc::new(ExportFormat::ION {})].iter() + } + } - impl Eq - for GlobalSecondaryIndexAutoScalingUpdate {} + impl Eq + for ExportFormat {} - impl Hash - for GlobalSecondaryIndexAutoScalingUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedWriteCapacityAutoScalingUpdate, _state) - }, - } - } - } - - impl Default - for GlobalSecondaryIndexAutoScalingUpdate { - fn default() -> GlobalSecondaryIndexAutoScalingUpdate { - GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate { - IndexName: Default::default(), - ProvisionedWriteCapacityAutoScalingUpdate: Default::default() - } - } - } - - impl AsRef - for &GlobalSecondaryIndexAutoScalingUpdate { - fn as_ref(&self) -> Self { - self - } - } - - pub type GlobalSecondaryIndexAutoScalingUpdateList = Sequence>; - - #[derive(PartialEq, Clone)] - pub enum GlobalSecondaryIndexDescription { - GlobalSecondaryIndexDescription { - IndexName: Rc>>, - KeySchema: Rc>, - Projection: Rc>>, - IndexStatus: Rc>>, - Backfilling: Rc>, - ProvisionedThroughput: Rc>>, - IndexSizeBytes: Rc>, - ItemCount: Rc>, - IndexArn: Rc>>, - OnDemandThroughput: Rc>> - } - } - - impl GlobalSecondaryIndexDescription { - pub fn IndexName(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexName, - } - } - pub fn KeySchema(&self) -> &Rc> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => Projection, - } - } - pub fn IndexStatus(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexStatus, - } - } - pub fn Backfilling(&self) -> &Rc> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => Backfilling, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn IndexSizeBytes(&self) -> &Rc> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexSizeBytes, - } - } - pub fn ItemCount(&self) -> &Rc> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => ItemCount, - } - } - pub fn IndexArn(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexArn, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for GlobalSecondaryIndexDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for ExportFormat { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportFormat::DYNAMODB_JSON{} => { - impl DafnyPrint - for GlobalSecondaryIndexDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexDescription.GlobalSecondaryIndexDescription(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Backfilling, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexSizeBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ExportFormat::ION{} => { - impl Eq - for GlobalSecondaryIndexDescription {} + }, + } + } + } - impl Hash - for GlobalSecondaryIndexDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state); - Hash::hash(IndexStatus, _state); - Hash::hash(Backfilling, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(IndexSizeBytes, _state); - Hash::hash(ItemCount, _state); - Hash::hash(IndexArn, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } - - impl Default - for GlobalSecondaryIndexDescription { - fn default() -> GlobalSecondaryIndexDescription { - GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default(), - IndexStatus: Default::default(), - Backfilling: Default::default(), - ProvisionedThroughput: Default::default(), - IndexSizeBytes: Default::default(), - ItemCount: Default::default(), - IndexArn: Default::default(), - OnDemandThroughput: Default::default() - } - } - } - - impl AsRef - for &GlobalSecondaryIndexDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GlobalSecondaryIndexInfo { - GlobalSecondaryIndexInfo { - IndexName: Rc>>, - KeySchema: Rc>, - Projection: Rc>>, - ProvisionedThroughput: Rc>>, - OnDemandThroughput: Rc>> - } - } - - impl GlobalSecondaryIndexInfo { - pub fn IndexName(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, - } - } - pub fn KeySchema(&self) -> &Rc> { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for GlobalSecondaryIndexInfo { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ExportFormat { + fn default() -> ExportFormat { + ExportFormat::DYNAMODB_JSON {} + } + } - impl DafnyPrint - for GlobalSecondaryIndexInfo { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexInfo.GlobalSecondaryIndexInfo(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ExportFormat { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GlobalSecondaryIndexInfo {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1654,3) + #[derive(PartialEq, Clone)] + pub enum ExportStatus { + IN_PROGRESS {}, + COMPLETED {}, + FAILED {} + } - impl Hash - for GlobalSecondaryIndexInfo { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } - - impl Default - for GlobalSecondaryIndexInfo { - fn default() -> GlobalSecondaryIndexInfo { - GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default(), - ProvisionedThroughput: Default::default(), - OnDemandThroughput: Default::default() - } - } - } - - impl AsRef - for &GlobalSecondaryIndexInfo { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GlobalSecondaryIndexUpdate { - GlobalSecondaryIndexUpdate { - Update: Rc>>, - Create: Rc>>, - Delete: Rc>> - } - } - - impl GlobalSecondaryIndexUpdate { - pub fn Update(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Update, - } - } - pub fn Create(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Create, - } - } - pub fn Delete(&self) -> &Rc>> { - match self { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Delete, - } - } - } - - impl Debug - for GlobalSecondaryIndexUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ExportStatus {} - impl DafnyPrint - for GlobalSecondaryIndexUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexUpdate.GlobalSecondaryIndexUpdate(")?; - DafnyPrint::fmt_print(Update, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Create, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Delete, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ExportStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GlobalSecondaryIndexUpdate {} + impl DafnyPrint + for ExportStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportStatus::IN_PROGRESS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.IN__PROGRESS")?; + Ok(()) + }, + ExportStatus::COMPLETED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.COMPLETED")?; + Ok(()) + }, + ExportStatus::FAILED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportStatus.FAILED")?; + Ok(()) + }, + } + } + } - impl Hash - for GlobalSecondaryIndexUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => { - Hash::hash(Update, _state); - Hash::hash(Create, _state); - Hash::hash(Delete, _state) - }, - } - } - } + impl ExportStatus { + /// Enumerates all possible values of ExportStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ExportStatus::IN_PROGRESS {}), Arc::new(ExportStatus::COMPLETED {}), Arc::new(ExportStatus::FAILED {})].iter() + } + } - impl Default - for GlobalSecondaryIndexUpdate { - fn default() -> GlobalSecondaryIndexUpdate { - GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate { - Update: Default::default(), - Create: Default::default(), - Delete: Default::default() - } - } - } + impl Eq + for ExportStatus {} - impl AsRef - for &GlobalSecondaryIndexUpdate { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for ExportStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportStatus::IN_PROGRESS{} => { - #[derive(PartialEq, Clone)] - pub enum GlobalTable { - GlobalTable { - GlobalTableName: Rc>>, - ReplicationGroup: Rc>>> - } - } + }, + ExportStatus::COMPLETED{} => { - impl GlobalTable { - pub fn GlobalTableName(&self) -> &Rc>> { - match self { - GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => GlobalTableName, - } - } - pub fn ReplicationGroup(&self) -> &Rc>>> { - match self { - GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => ReplicationGroup, - } - } - } + }, + ExportStatus::FAILED{} => { - impl Debug - for GlobalTable { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for GlobalTable { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTable.GlobalTable(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ExportStatus { + fn default() -> ExportStatus { + ExportStatus::IN_PROGRESS {} + } + } - impl Eq - for GlobalTable {} + impl AsRef + for ExportStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GlobalTable { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(ReplicationGroup, _state) - }, - } - } - } - - impl Default - for GlobalTable { - fn default() -> GlobalTable { - GlobalTable::GlobalTable { - GlobalTableName: Default::default(), - ReplicationGroup: Default::default() - } - } - } - - impl AsRef - for &GlobalTable { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GlobalTableDescription { - GlobalTableDescription { - ReplicationGroup: Rc>>>, - GlobalTableArn: Rc>>, - CreationDateTime: Rc>>, - GlobalTableStatus: Rc>>, - GlobalTableName: Rc>> - } - } - - impl GlobalTableDescription { - pub fn ReplicationGroup(&self) -> &Rc>>> { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => ReplicationGroup, - } - } - pub fn GlobalTableArn(&self) -> &Rc>> { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableArn, - } - } - pub fn CreationDateTime(&self) -> &Rc>> { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => CreationDateTime, - } - } - pub fn GlobalTableStatus(&self) -> &Rc>> { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableStatus, - } - } - pub fn GlobalTableName(&self) -> &Rc>> { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableName, - } - } - } - - impl Debug - for GlobalTableDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1659,3) + #[derive(PartialEq, Clone)] + pub enum ExportSummary { + ExportSummary { + ExportArn: Arc>>, + ExportStatus: Arc>>, + ExportType: Arc>> + } + } - impl DafnyPrint - for GlobalTableDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableDescription.GlobalTableDescription(")?; - DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CreationDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ExportSummary { + /// Returns a borrow of the field ExportArn + pub fn ExportArn(&self) -> &Arc>> { + match self { + ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportArn, + } + } + /// Returns a borrow of the field ExportStatus + pub fn ExportStatus(&self) -> &Arc>> { + match self { + ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportStatus, + } + } + /// Returns a borrow of the field ExportType + pub fn ExportType(&self) -> &Arc>> { + match self { + ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => ExportType, + } + } + } - impl Eq - for GlobalTableDescription {} + impl Debug + for ExportSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for GlobalTableDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => { - Hash::hash(ReplicationGroup, _state); - Hash::hash(GlobalTableArn, _state); - Hash::hash(CreationDateTime, _state); - Hash::hash(GlobalTableStatus, _state); - Hash::hash(GlobalTableName, _state) - }, - } - } - } - - impl Default - for GlobalTableDescription { - fn default() -> GlobalTableDescription { - GlobalTableDescription::GlobalTableDescription { - ReplicationGroup: Default::default(), - GlobalTableArn: Default::default(), - CreationDateTime: Default::default(), - GlobalTableStatus: Default::default(), - GlobalTableName: Default::default() - } - } - } - - impl AsRef - for &GlobalTableDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GlobalTableGlobalSecondaryIndexSettingsUpdate { - GlobalTableGlobalSecondaryIndexSettingsUpdate { - IndexName: Sequence, - ProvisionedWriteCapacityUnits: Rc>, - ProvisionedWriteCapacityAutoScalingSettingsUpdate: Rc>> - } - } - - impl GlobalTableGlobalSecondaryIndexSettingsUpdate { - pub fn IndexName(&self) -> &Sequence { - match self { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => IndexName, - } - } - pub fn ProvisionedWriteCapacityUnits(&self) -> &Rc> { - match self { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => ProvisionedWriteCapacityUnits, - } - } - pub fn ProvisionedWriteCapacityAutoScalingSettingsUpdate(&self) -> &Rc>> { - match self { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => ProvisionedWriteCapacityAutoScalingSettingsUpdate, - } - } - } - - impl Debug - for GlobalTableGlobalSecondaryIndexSettingsUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ExportSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportSummary.ExportSummary(")?; + DafnyPrint::fmt_print(ExportArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GlobalTableGlobalSecondaryIndexSettingsUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableGlobalSecondaryIndexSettingsUpdate.GlobalTableGlobalSecondaryIndexSettingsUpdate(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingSettingsUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ExportSummary {} + + impl Hash + for ExportSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportSummary::ExportSummary{ExportArn, ExportStatus, ExportType, } => { + Hash::hash(ExportArn, _state); + Hash::hash(ExportStatus, _state); + Hash::hash(ExportType, _state) + }, + } + } + } - impl Eq - for GlobalTableGlobalSecondaryIndexSettingsUpdate {} + impl Default + for ExportSummary { + fn default() -> ExportSummary { + ExportSummary::ExportSummary { + ExportArn: Default::default(), + ExportStatus: Default::default(), + ExportType: Default::default() + } + } + } - impl Hash - for GlobalTableGlobalSecondaryIndexSettingsUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedWriteCapacityUnits, _state); - Hash::hash(ProvisionedWriteCapacityAutoScalingSettingsUpdate, _state) - }, - } - } - } + impl AsRef + for ExportSummary { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for GlobalTableGlobalSecondaryIndexSettingsUpdate { - fn default() -> GlobalTableGlobalSecondaryIndexSettingsUpdate { - GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate { - IndexName: Default::default(), - ProvisionedWriteCapacityUnits: Default::default(), - ProvisionedWriteCapacityAutoScalingSettingsUpdate: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1664,3) + #[derive(PartialEq, Clone)] + pub enum ExportTableToPointInTimeInput { + ExportTableToPointInTimeInput { + TableArn: Sequence, + ExportTime: Arc>>, + ClientToken: Arc>>, + S3Bucket: Sequence, + S3BucketOwner: Arc>>, + S3Prefix: Arc>>, + S3SseAlgorithm: Arc>>, + S3SseKmsKeyId: Arc>>, + ExportFormat: Arc>>, + ExportType: Arc>>, + IncrementalExportSpecification: Arc>> + } + } - impl AsRef - for &GlobalTableGlobalSecondaryIndexSettingsUpdate { - fn as_ref(&self) -> Self { - self - } - } + impl ExportTableToPointInTimeInput { + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Sequence { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => TableArn, + } + } + /// Returns a borrow of the field ExportTime + pub fn ExportTime(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportTime, + } + } + /// Returns a borrow of the field ClientToken + pub fn ClientToken(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ClientToken, + } + } + /// Returns a borrow of the field S3Bucket + pub fn S3Bucket(&self) -> &Sequence { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3Bucket, + } + } + /// Returns a borrow of the field S3BucketOwner + pub fn S3BucketOwner(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3BucketOwner, + } + } + /// Returns a borrow of the field S3Prefix + pub fn S3Prefix(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3Prefix, + } + } + /// Returns a borrow of the field S3SseAlgorithm + pub fn S3SseAlgorithm(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3SseAlgorithm, + } + } + /// Returns a borrow of the field S3SseKmsKeyId + pub fn S3SseKmsKeyId(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => S3SseKmsKeyId, + } + } + /// Returns a borrow of the field ExportFormat + pub fn ExportFormat(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportFormat, + } + } + /// Returns a borrow of the field ExportType + pub fn ExportType(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => ExportType, + } + } + /// Returns a borrow of the field IncrementalExportSpecification + pub fn IncrementalExportSpecification(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => IncrementalExportSpecification, + } + } + } - pub type GlobalTableGlobalSecondaryIndexSettingsUpdateList = Sequence>; + impl Debug + for ExportTableToPointInTimeInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum GlobalTableStatus { - CREATING {}, - ACTIVE {}, - DELETING {}, - UPDATING {} - } + impl DafnyPrint + for ExportTableToPointInTimeInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportTableToPointInTimeInput.ExportTableToPointInTimeInput(")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ClientToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3Bucket, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3BucketOwner, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3Prefix, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3SseAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3SseKmsKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportFormat, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IncrementalExportSpecification, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl GlobalTableStatus {} + impl Eq + for ExportTableToPointInTimeInput {} + + impl Hash + for ExportTableToPointInTimeInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput{TableArn, ExportTime, ClientToken, S3Bucket, S3BucketOwner, S3Prefix, S3SseAlgorithm, S3SseKmsKeyId, ExportFormat, ExportType, IncrementalExportSpecification, } => { + Hash::hash(TableArn, _state); + Hash::hash(ExportTime, _state); + Hash::hash(ClientToken, _state); + Hash::hash(S3Bucket, _state); + Hash::hash(S3BucketOwner, _state); + Hash::hash(S3Prefix, _state); + Hash::hash(S3SseAlgorithm, _state); + Hash::hash(S3SseKmsKeyId, _state); + Hash::hash(ExportFormat, _state); + Hash::hash(ExportType, _state); + Hash::hash(IncrementalExportSpecification, _state) + }, + } + } + } - impl Debug - for GlobalTableStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ExportTableToPointInTimeInput { + fn default() -> ExportTableToPointInTimeInput { + ExportTableToPointInTimeInput::ExportTableToPointInTimeInput { + TableArn: Default::default(), + ExportTime: Default::default(), + ClientToken: Default::default(), + S3Bucket: Default::default(), + S3BucketOwner: Default::default(), + S3Prefix: Default::default(), + S3SseAlgorithm: Default::default(), + S3SseKmsKeyId: Default::default(), + ExportFormat: Default::default(), + ExportType: Default::default(), + IncrementalExportSpecification: Default::default() + } + } + } - impl DafnyPrint - for GlobalTableStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GlobalTableStatus::CREATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.CREATING")?; - Ok(()) - }, - GlobalTableStatus::ACTIVE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.ACTIVE")?; - Ok(()) - }, - GlobalTableStatus::DELETING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.DELETING")?; - Ok(()) - }, - GlobalTableStatus::UPDATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.UPDATING")?; - Ok(()) - }, - } - } - } + impl AsRef + for ExportTableToPointInTimeInput { + fn as_ref(&self) -> &Self { + self + } + } - impl GlobalTableStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(GlobalTableStatus::CREATING {}), Rc::new(GlobalTableStatus::ACTIVE {}), Rc::new(GlobalTableStatus::DELETING {}), Rc::new(GlobalTableStatus::UPDATING {})].iter() - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1677,3) + #[derive(PartialEq, Clone)] + pub enum ExportTableToPointInTimeOutput { + ExportTableToPointInTimeOutput { + ExportDescription: Arc>> + } + } - impl Eq - for GlobalTableStatus {} + impl ExportTableToPointInTimeOutput { + /// Returns a borrow of the field ExportDescription + pub fn ExportDescription(&self) -> &Arc>> { + match self { + ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => ExportDescription, + } + } + } - impl Hash - for GlobalTableStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GlobalTableStatus::CREATING{} => { + impl Debug + for ExportTableToPointInTimeOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - GlobalTableStatus::ACTIVE{} => { + impl DafnyPrint + for ExportTableToPointInTimeOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportTableToPointInTimeOutput.ExportTableToPointInTimeOutput(")?; + DafnyPrint::fmt_print(ExportDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - GlobalTableStatus::DELETING{} => { + impl Eq + for ExportTableToPointInTimeOutput {} - }, - GlobalTableStatus::UPDATING{} => { + impl Hash + for ExportTableToPointInTimeOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput{ExportDescription, } => { + Hash::hash(ExportDescription, _state) + }, + } + } + } - }, - } - } - } + impl Default + for ExportTableToPointInTimeOutput { + fn default() -> ExportTableToPointInTimeOutput { + ExportTableToPointInTimeOutput::ExportTableToPointInTimeOutput { + ExportDescription: Default::default() + } + } + } - impl Default - for GlobalTableStatus { - fn default() -> GlobalTableStatus { - GlobalTableStatus::CREATING {} - } - } + impl AsRef + for ExportTableToPointInTimeOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GlobalTableStatus { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1680,3) + #[derive(PartialEq, Clone)] + pub enum ExportType { + FULL_EXPORT {}, + INCREMENTAL_EXPORT {} + } - pub type ImportArn = Sequence; + impl ExportType {} - pub type ImportedItemCount = i64; + impl Debug + for ExportType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type ImportNextToken = Sequence; + impl DafnyPrint + for ExportType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportType::FULL_EXPORT{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportType.FULL__EXPORT")?; + Ok(()) + }, + ExportType::INCREMENTAL_EXPORT{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportType.INCREMENTAL__EXPORT")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ImportStatus { - IN_PROGRESS {}, - COMPLETED {}, - CANCELLING {}, - CANCELLED {}, - FAILED {} - } + impl ExportType { + /// Enumerates all possible values of ExportType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ExportType::FULL_EXPORT {}), Arc::new(ExportType::INCREMENTAL_EXPORT {})].iter() + } + } - impl ImportStatus {} + impl Eq + for ExportType {} - impl Debug - for ImportStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for ExportType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportType::FULL_EXPORT{} => { - impl DafnyPrint - for ImportStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportStatus::IN_PROGRESS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.IN__PROGRESS")?; - Ok(()) - }, - ImportStatus::COMPLETED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.COMPLETED")?; - Ok(()) - }, - ImportStatus::CANCELLING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.CANCELLING")?; - Ok(()) - }, - ImportStatus::CANCELLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.CANCELLED")?; - Ok(()) - }, - ImportStatus::FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.FAILED")?; - Ok(()) - }, - } - } - } + }, + ExportType::INCREMENTAL_EXPORT{} => { - impl ImportStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ImportStatus::IN_PROGRESS {}), Rc::new(ImportStatus::COMPLETED {}), Rc::new(ImportStatus::CANCELLING {}), Rc::new(ImportStatus::CANCELLED {}), Rc::new(ImportStatus::FAILED {})].iter() - } - } + }, + } + } + } - impl Eq - for ImportStatus {} + impl Default + for ExportType { + fn default() -> ExportType { + ExportType::FULL_EXPORT {} + } + } - impl Hash - for ImportStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportStatus::IN_PROGRESS{} => { + impl AsRef + for ExportType { + fn as_ref(&self) -> &Self { + self + } + } - }, - ImportStatus::COMPLETED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1683,3) + #[derive(PartialEq, Clone)] + pub enum ExportViewType { + NEW_IMAGE {}, + NEW_AND_OLD_IMAGES {} + } - }, - ImportStatus::CANCELLING{} => { + impl ExportViewType {} - }, - ImportStatus::CANCELLED{} => { + impl Debug + for ExportViewType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ImportStatus::FAILED{} => { + impl DafnyPrint + for ExportViewType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExportViewType::NEW_IMAGE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportViewType.NEW__IMAGE")?; + Ok(()) + }, + ExportViewType::NEW_AND_OLD_IMAGES{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ExportViewType.NEW__AND__OLD__IMAGES")?; + Ok(()) + }, + } + } + } - }, - } - } - } - - impl Default - for ImportStatus { - fn default() -> ImportStatus { - ImportStatus::IN_PROGRESS {} - } - } - - impl AsRef - for &ImportStatus { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ImportSummary { - ImportSummary { - ImportArn: Rc>>, - ImportStatus: Rc>>, - TableArn: Rc>>, - S3BucketSource: Rc>>, - CloudWatchLogGroupArn: Rc>>, - InputFormat: Rc>>, - StartTime: Rc>>, - EndTime: Rc>> - } - } - - impl ImportSummary { - pub fn ImportArn(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => ImportArn, - } - } - pub fn ImportStatus(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => ImportStatus, - } - } - pub fn TableArn(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => TableArn, - } - } - pub fn S3BucketSource(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => S3BucketSource, - } - } - pub fn CloudWatchLogGroupArn(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => CloudWatchLogGroupArn, - } - } - pub fn InputFormat(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => InputFormat, - } - } - pub fn StartTime(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => StartTime, - } - } - pub fn EndTime(&self) -> &Rc>> { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => EndTime, - } - } - } - - impl Debug - for ImportSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ExportViewType { + /// Enumerates all possible values of ExportViewType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ExportViewType::NEW_IMAGE {}), Arc::new(ExportViewType::NEW_AND_OLD_IMAGES {})].iter() + } + } - impl DafnyPrint - for ImportSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportSummary.ImportSummary(")?; - DafnyPrint::fmt_print(ImportArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ImportStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudWatchLogGroupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputFormat, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StartTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EndTime, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ExportViewType {} - impl Eq - for ImportSummary {} + impl Hash + for ExportViewType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExportViewType::NEW_IMAGE{} => { - impl Hash - for ImportSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => { - Hash::hash(ImportArn, _state); - Hash::hash(ImportStatus, _state); - Hash::hash(TableArn, _state); - Hash::hash(S3BucketSource, _state); - Hash::hash(CloudWatchLogGroupArn, _state); - Hash::hash(InputFormat, _state); - Hash::hash(StartTime, _state); - Hash::hash(EndTime, _state) - }, - } - } - } - - impl Default - for ImportSummary { - fn default() -> ImportSummary { - ImportSummary::ImportSummary { - ImportArn: Default::default(), - ImportStatus: Default::default(), - TableArn: Default::default(), - S3BucketSource: Default::default(), - CloudWatchLogGroupArn: Default::default(), - InputFormat: Default::default(), - StartTime: Default::default(), - EndTime: Default::default() - } - } - } - - impl AsRef - for &ImportSummary { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ImportTableDescription { - ImportTableDescription { - ImportArn: Rc>>, - ImportStatus: Rc>>, - TableArn: Rc>>, - TableId: Rc>>, - ClientToken: Rc>>, - S3BucketSource: Rc>>, - ErrorCount: Rc>, - CloudWatchLogGroupArn: Rc>>, - InputFormat: Rc>>, - InputFormatOptions: Rc>>, - InputCompressionType: Rc>>, - TableCreationParameters: Rc>>, - StartTime: Rc>>, - EndTime: Rc>>, - ProcessedSizeBytes: Rc>, - ProcessedItemCount: Rc>, - ImportedItemCount: Rc>, - FailureCode: Rc>>, - FailureMessage: Rc>> - } - } - - impl ImportTableDescription { - pub fn ImportArn(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportArn, - } - } - pub fn ImportStatus(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportStatus, - } - } - pub fn TableArn(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableArn, - } - } - pub fn TableId(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableId, - } - } - pub fn ClientToken(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ClientToken, - } - } - pub fn S3BucketSource(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => S3BucketSource, - } - } - pub fn ErrorCount(&self) -> &Rc> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ErrorCount, - } - } - pub fn CloudWatchLogGroupArn(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => CloudWatchLogGroupArn, - } - } - pub fn InputFormat(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputFormat, - } - } - pub fn InputFormatOptions(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputFormatOptions, - } - } - pub fn InputCompressionType(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputCompressionType, - } - } - pub fn TableCreationParameters(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableCreationParameters, - } - } - pub fn StartTime(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => StartTime, - } - } - pub fn EndTime(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => EndTime, - } - } - pub fn ProcessedSizeBytes(&self) -> &Rc> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ProcessedSizeBytes, - } - } - pub fn ProcessedItemCount(&self) -> &Rc> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ProcessedItemCount, - } - } - pub fn ImportedItemCount(&self) -> &Rc> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportedItemCount, - } - } - pub fn FailureCode(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => FailureCode, - } - } - pub fn FailureMessage(&self) -> &Rc>> { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => FailureMessage, - } - } - } - - impl Debug - for ImportTableDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ExportViewType::NEW_AND_OLD_IMAGES{} => { - impl DafnyPrint - for ImportTableDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableDescription.ImportTableDescription(")?; - DafnyPrint::fmt_print(ImportArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ImportStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ClientToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ErrorCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudWatchLogGroupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputFormat, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputFormatOptions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputCompressionType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableCreationParameters, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StartTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EndTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProcessedSizeBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProcessedItemCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ImportedItemCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FailureCode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FailureMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl Eq - for ImportTableDescription {} + impl Default + for ExportViewType { + fn default() -> ExportViewType { + ExportViewType::NEW_IMAGE {} + } + } - impl Hash - for ImportTableDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => { - Hash::hash(ImportArn, _state); - Hash::hash(ImportStatus, _state); - Hash::hash(TableArn, _state); - Hash::hash(TableId, _state); - Hash::hash(ClientToken, _state); - Hash::hash(S3BucketSource, _state); - Hash::hash(ErrorCount, _state); - Hash::hash(CloudWatchLogGroupArn, _state); - Hash::hash(InputFormat, _state); - Hash::hash(InputFormatOptions, _state); - Hash::hash(InputCompressionType, _state); - Hash::hash(TableCreationParameters, _state); - Hash::hash(StartTime, _state); - Hash::hash(EndTime, _state); - Hash::hash(ProcessedSizeBytes, _state); - Hash::hash(ProcessedItemCount, _state); - Hash::hash(ImportedItemCount, _state); - Hash::hash(FailureCode, _state); - Hash::hash(FailureMessage, _state) - }, - } - } - } - - impl Default - for ImportTableDescription { - fn default() -> ImportTableDescription { - ImportTableDescription::ImportTableDescription { - ImportArn: Default::default(), - ImportStatus: Default::default(), - TableArn: Default::default(), - TableId: Default::default(), - ClientToken: Default::default(), - S3BucketSource: Default::default(), - ErrorCount: Default::default(), - CloudWatchLogGroupArn: Default::default(), - InputFormat: Default::default(), - InputFormatOptions: Default::default(), - InputCompressionType: Default::default(), - TableCreationParameters: Default::default(), - StartTime: Default::default(), - EndTime: Default::default(), - ProcessedSizeBytes: Default::default(), - ProcessedItemCount: Default::default(), - ImportedItemCount: Default::default(), - FailureCode: Default::default(), - FailureMessage: Default::default() - } - } - } - - impl AsRef - for &ImportTableDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ImportTableInput { - ImportTableInput { - ClientToken: Rc>>, - S3BucketSource: Rc, - InputFormat: Rc, - InputFormatOptions: Rc>>, - InputCompressionType: Rc>>, - TableCreationParameters: Rc - } - } - - impl ImportTableInput { - pub fn ClientToken(&self) -> &Rc>> { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => ClientToken, - } - } - pub fn S3BucketSource(&self) -> &Rc { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => S3BucketSource, - } - } - pub fn InputFormat(&self) -> &Rc { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputFormat, - } - } - pub fn InputFormatOptions(&self) -> &Rc>> { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputFormatOptions, - } - } - pub fn InputCompressionType(&self) -> &Rc>> { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputCompressionType, - } - } - pub fn TableCreationParameters(&self) -> &Rc { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => TableCreationParameters, - } - } - } - - impl Debug - for ImportTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ExportViewType { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ImportTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableInput.ImportTableInput(")?; - DafnyPrint::fmt_print(ClientToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputFormat, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputFormatOptions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(InputCompressionType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableCreationParameters, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1691,3) + #[derive(PartialEq, Clone)] + pub enum FailureException { + FailureException { + ExceptionName: Arc>>, + ExceptionDescription: Arc>> + } + } - impl Eq - for ImportTableInput {} + impl FailureException { + /// Returns a borrow of the field ExceptionName + pub fn ExceptionName(&self) -> &Arc>> { + match self { + FailureException::FailureException{ExceptionName, ExceptionDescription, } => ExceptionName, + } + } + /// Returns a borrow of the field ExceptionDescription + pub fn ExceptionDescription(&self) -> &Arc>> { + match self { + FailureException::FailureException{ExceptionName, ExceptionDescription, } => ExceptionDescription, + } + } + } - impl Hash - for ImportTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => { - Hash::hash(ClientToken, _state); - Hash::hash(S3BucketSource, _state); - Hash::hash(InputFormat, _state); - Hash::hash(InputFormatOptions, _state); - Hash::hash(InputCompressionType, _state); - Hash::hash(TableCreationParameters, _state) - }, - } - } - } + impl Debug + for FailureException { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ImportTableInput { - fn default() -> ImportTableInput { - ImportTableInput::ImportTableInput { - ClientToken: Default::default(), - S3BucketSource: Default::default(), - InputFormat: Default::default(), - InputFormatOptions: Default::default(), - InputCompressionType: Default::default(), - TableCreationParameters: Default::default() - } - } - } + impl DafnyPrint + for FailureException { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + FailureException::FailureException{ExceptionName, ExceptionDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.FailureException.FailureException(")?; + DafnyPrint::fmt_print(ExceptionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExceptionDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ImportTableInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for FailureException {} + + impl Hash + for FailureException { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + FailureException::FailureException{ExceptionName, ExceptionDescription, } => { + Hash::hash(ExceptionName, _state); + Hash::hash(ExceptionDescription, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ImportTableOutput { - ImportTableOutput { - ImportTableDescription: Rc - } - } + impl Default + for FailureException { + fn default() -> FailureException { + FailureException::FailureException { + ExceptionName: Default::default(), + ExceptionDescription: Default::default() + } + } + } - impl ImportTableOutput { - pub fn ImportTableDescription(&self) -> &Rc { - match self { - ImportTableOutput::ImportTableOutput{ImportTableDescription, } => ImportTableDescription, - } - } - } + impl AsRef + for FailureException { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ImportTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1697,3) + #[derive(PartialEq, Clone)] + pub enum Get { + Get { + Key: Map, Arc>, + TableName: Sequence, + ProjectionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>> + } + } - impl DafnyPrint - for ImportTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportTableOutput::ImportTableOutput{ImportTableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableOutput.ImportTableOutput(")?; - DafnyPrint::fmt_print(ImportTableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Get { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => Key, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => TableName, + } + } + /// Returns a borrow of the field ProjectionExpression + pub fn ProjectionExpression(&self) -> &Arc>> { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, + } + } + } - impl Eq - for ImportTableOutput {} + impl Debug + for Get { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ImportTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportTableOutput::ImportTableOutput{ImportTableDescription, } => { - Hash::hash(ImportTableDescription, _state) - }, - } - } - } + impl DafnyPrint + for Get { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Get.Get(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ImportTableOutput { - fn default() -> ImportTableOutput { - ImportTableOutput::ImportTableOutput { - ImportTableDescription: Default::default() - } - } - } + impl Eq + for Get {} + + impl Hash + for Get { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Get::Get{Key, TableName, ProjectionExpression, ExpressionAttributeNames, } => { + Hash::hash(Key, _state); + Hash::hash(TableName, _state); + Hash::hash(ProjectionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state) + }, + } + } + } - impl AsRef - for &ImportTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for Get { + fn default() -> Get { + Get::Get { + Key: Default::default(), + TableName: Default::default(), + ProjectionExpression: Default::default(), + ExpressionAttributeNames: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum IncrementalExportSpecification { - IncrementalExportSpecification { - ExportFromTime: Rc>>, - ExportToTime: Rc>>, - ExportViewType: Rc>> - } - } + impl AsRef + for Get { + fn as_ref(&self) -> &Self { + self + } + } - impl IncrementalExportSpecification { - pub fn ExportFromTime(&self) -> &Rc>> { - match self { - IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportFromTime, - } - } - pub fn ExportToTime(&self) -> &Rc>> { - match self { - IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportToTime, - } - } - pub fn ExportViewType(&self) -> &Rc>> { - match self { - IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportViewType, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1703,3) + #[derive(PartialEq, Clone)] + pub enum GetItemInput { + GetItemInput { + TableName: Sequence, + Key: Map, Arc>, + AttributesToGet: Arc>, + ConsistentRead: Arc>, + ReturnConsumedCapacity: Arc>>, + ProjectionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>> + } + } - impl Debug - for IncrementalExportSpecification { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GetItemInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => TableName, + } + } + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => Key, + } + } + /// Returns a borrow of the field AttributesToGet + pub fn AttributesToGet(&self) -> &Arc> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => AttributesToGet, + } + } + /// Returns a borrow of the field ConsistentRead + pub fn ConsistentRead(&self) -> &Arc> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ConsistentRead, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ProjectionExpression + pub fn ProjectionExpression(&self) -> &Arc>> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, + } + } + } - impl DafnyPrint - for IncrementalExportSpecification { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IncrementalExportSpecification.IncrementalExportSpecification(")?; - DafnyPrint::fmt_print(ExportFromTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportToTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExportViewType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GetItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for IncrementalExportSpecification {} + impl DafnyPrint + for GetItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetItemInput.GetItemInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for IncrementalExportSpecification { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => { - Hash::hash(ExportFromTime, _state); - Hash::hash(ExportToTime, _state); - Hash::hash(ExportViewType, _state) - }, - } - } - } + impl Eq + for GetItemInput {} + + impl Hash + for GetItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemInput::GetItemInput{TableName, Key, AttributesToGet, ConsistentRead, ReturnConsumedCapacity, ProjectionExpression, ExpressionAttributeNames, } => { + Hash::hash(TableName, _state); + Hash::hash(Key, _state); + Hash::hash(AttributesToGet, _state); + Hash::hash(ConsistentRead, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ProjectionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state) + }, + } + } + } - impl Default - for IncrementalExportSpecification { - fn default() -> IncrementalExportSpecification { - IncrementalExportSpecification::IncrementalExportSpecification { - ExportFromTime: Default::default(), - ExportToTime: Default::default(), - ExportViewType: Default::default() - } - } - } + impl Default + for GetItemInput { + fn default() -> GetItemInput { + GetItemInput::GetItemInput { + TableName: Default::default(), + Key: Default::default(), + AttributesToGet: Default::default(), + ConsistentRead: Default::default(), + ReturnConsumedCapacity: Default::default(), + ProjectionExpression: Default::default(), + ExpressionAttributeNames: Default::default() + } + } + } - impl AsRef - for &IncrementalExportSpecification { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetItemInput { + fn as_ref(&self) -> &Self { + self + } + } - pub type IndexName = Sequence; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1712,3) + #[derive(PartialEq, Clone)] + pub enum GetItemOutput { + GetItemOutput { + Item: Arc, Arc>>>, + ConsumedCapacity: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum IndexStatus { - CREATING {}, - UPDATING {}, - DELETING {}, - ACTIVE {} - } + impl GetItemOutput { + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Arc, Arc>>> { + match self { + GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => Item, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl IndexStatus {} + impl Debug + for GetItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for IndexStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GetItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetItemOutput.GetItemOutput(")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for IndexStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - IndexStatus::CREATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.CREATING")?; - Ok(()) - }, - IndexStatus::UPDATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.UPDATING")?; - Ok(()) - }, - IndexStatus::DELETING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.DELETING")?; - Ok(()) - }, - IndexStatus::ACTIVE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.ACTIVE")?; - Ok(()) - }, - } - } - } + impl Eq + for GetItemOutput {} + + impl Hash + for GetItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetItemOutput::GetItemOutput{Item, ConsumedCapacity, } => { + Hash::hash(Item, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - impl IndexStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(IndexStatus::CREATING {}), Rc::new(IndexStatus::UPDATING {}), Rc::new(IndexStatus::DELETING {}), Rc::new(IndexStatus::ACTIVE {})].iter() - } - } + impl Default + for GetItemOutput { + fn default() -> GetItemOutput { + GetItemOutput::GetItemOutput { + Item: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - impl Eq - for IndexStatus {} + impl AsRef + for GetItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for IndexStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - IndexStatus::CREATING{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1716,3) + #[derive(PartialEq, Clone)] + pub enum GetResourcePolicyInput { + GetResourcePolicyInput { + ResourceArn: Sequence + } + } - }, - IndexStatus::UPDATING{} => { + impl GetResourcePolicyInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => ResourceArn, + } + } + } - }, - IndexStatus::DELETING{} => { + impl Debug + for GetResourcePolicyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - IndexStatus::ACTIVE{} => { + impl DafnyPrint + for GetResourcePolicyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetResourcePolicyInput.GetResourcePolicyInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } + impl Eq + for GetResourcePolicyInput {} - impl Default - for IndexStatus { - fn default() -> IndexStatus { - IndexStatus::CREATING {} - } - } + impl Hash + for GetResourcePolicyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetResourcePolicyInput::GetResourcePolicyInput{ResourceArn, } => { + Hash::hash(ResourceArn, _state) + }, + } + } + } - impl AsRef - for &IndexStatus { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for GetResourcePolicyInput { + fn default() -> GetResourcePolicyInput { + GetResourcePolicyInput::GetResourcePolicyInput { + ResourceArn: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum InputCompressionType { - GZIP {}, - ZSTD {}, - NONE {} - } + impl AsRef + for GetResourcePolicyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl InputCompressionType {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1719,3) + #[derive(PartialEq, Clone)] + pub enum GetResourcePolicyOutput { + GetResourcePolicyOutput { + Policy: Arc>>, + RevisionId: Arc>> + } + } - impl Debug - for InputCompressionType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GetResourcePolicyOutput { + /// Returns a borrow of the field Policy + pub fn Policy(&self) -> &Arc>> { + match self { + GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => Policy, + } + } + /// Returns a borrow of the field RevisionId + pub fn RevisionId(&self) -> &Arc>> { + match self { + GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => RevisionId, + } + } + } - impl DafnyPrint - for InputCompressionType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - InputCompressionType::GZIP{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.GZIP")?; - Ok(()) - }, - InputCompressionType::ZSTD{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.ZSTD")?; - Ok(()) - }, - InputCompressionType::NONE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.NONE")?; - Ok(()) - }, - } - } - } + impl Debug + for GetResourcePolicyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl InputCompressionType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(InputCompressionType::GZIP {}), Rc::new(InputCompressionType::ZSTD {}), Rc::new(InputCompressionType::NONE {})].iter() - } - } + impl DafnyPrint + for GetResourcePolicyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GetResourcePolicyOutput.GetResourcePolicyOutput(")?; + DafnyPrint::fmt_print(Policy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RevisionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for InputCompressionType {} + impl Eq + for GetResourcePolicyOutput {} + + impl Hash + for GetResourcePolicyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetResourcePolicyOutput::GetResourcePolicyOutput{Policy, RevisionId, } => { + Hash::hash(Policy, _state); + Hash::hash(RevisionId, _state) + }, + } + } + } - impl Hash - for InputCompressionType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - InputCompressionType::GZIP{} => { + impl Default + for GetResourcePolicyOutput { + fn default() -> GetResourcePolicyOutput { + GetResourcePolicyOutput::GetResourcePolicyOutput { + Policy: Default::default(), + RevisionId: Default::default() + } + } + } - }, - InputCompressionType::ZSTD{} => { + impl AsRef + for GetResourcePolicyOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - InputCompressionType::NONE{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1723,3) + #[derive(PartialEq, Clone)] + pub enum GlobalSecondaryIndex { + GlobalSecondaryIndex { + IndexName: Sequence, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + Projection: Arc, + ProvisionedThroughput: Arc>>, + OnDemandThroughput: Arc>> + } + } - }, - } - } - } + impl GlobalSecondaryIndex { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - impl Default - for InputCompressionType { - fn default() -> InputCompressionType { - InputCompressionType::GZIP {} - } - } + impl Debug + for GlobalSecondaryIndex { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &InputCompressionType { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GlobalSecondaryIndex { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndex.GlobalSecondaryIndex(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum InputFormat { - DYNAMODB_JSON {}, - ION {}, - CSV {} - } + impl Eq + for GlobalSecondaryIndex {} + + impl Hash + for GlobalSecondaryIndex { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalSecondaryIndex::GlobalSecondaryIndex{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - impl InputFormat {} + impl Default + for GlobalSecondaryIndex { + fn default() -> GlobalSecondaryIndex { + GlobalSecondaryIndex::GlobalSecondaryIndex { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl Debug - for InputFormat { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GlobalSecondaryIndex { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for InputFormat { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - InputFormat::DYNAMODB_JSON{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.DYNAMODB__JSON")?; - Ok(()) - }, - InputFormat::ION{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.ION")?; - Ok(()) - }, - InputFormat::CSV{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.CSV")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1730,3) + #[derive(PartialEq, Clone)] + pub enum GlobalSecondaryIndexAutoScalingUpdate { + GlobalSecondaryIndexAutoScalingUpdate { + IndexName: Arc>>, + ProvisionedWriteCapacityAutoScalingUpdate: Arc>> + } + } - impl InputFormat { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(InputFormat::DYNAMODB_JSON {}), Rc::new(InputFormat::ION {}), Rc::new(InputFormat::CSV {})].iter() - } - } + impl GlobalSecondaryIndexAutoScalingUpdate { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => IndexName, + } + } + /// Returns a borrow of the field ProvisionedWriteCapacityAutoScalingUpdate + pub fn ProvisionedWriteCapacityAutoScalingUpdate(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => ProvisionedWriteCapacityAutoScalingUpdate, + } + } + } - impl Eq - for InputFormat {} + impl Debug + for GlobalSecondaryIndexAutoScalingUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for InputFormat { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - InputFormat::DYNAMODB_JSON{} => { + impl DafnyPrint + for GlobalSecondaryIndexAutoScalingUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexAutoScalingUpdate.GlobalSecondaryIndexAutoScalingUpdate(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingUpdate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - InputFormat::ION{} => { + impl Eq + for GlobalSecondaryIndexAutoScalingUpdate {} + + impl Hash + for GlobalSecondaryIndexAutoScalingUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedWriteCapacityAutoScalingUpdate, } => { + Hash::hash(IndexName, _state); + Hash::hash(ProvisionedWriteCapacityAutoScalingUpdate, _state) + }, + } + } + } - }, - InputFormat::CSV{} => { + impl Default + for GlobalSecondaryIndexAutoScalingUpdate { + fn default() -> GlobalSecondaryIndexAutoScalingUpdate { + GlobalSecondaryIndexAutoScalingUpdate::GlobalSecondaryIndexAutoScalingUpdate { + IndexName: Default::default(), + ProvisionedWriteCapacityAutoScalingUpdate: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for GlobalSecondaryIndexAutoScalingUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for InputFormat { - fn default() -> InputFormat { - InputFormat::DYNAMODB_JSON {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1734,3) + pub type GlobalSecondaryIndexAutoScalingUpdateList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1738,3) + #[derive(PartialEq, Clone)] + pub enum GlobalSecondaryIndexDescription { + GlobalSecondaryIndexDescription { + IndexName: Arc>>, + KeySchema: Arc>, + Projection: Arc>>, + IndexStatus: Arc>>, + Backfilling: Arc>, + ProvisionedThroughput: Arc>>, + IndexSizeBytes: Arc>, + ItemCount: Arc>, + IndexArn: Arc>>, + OnDemandThroughput: Arc>> + } + } - impl AsRef - for &InputFormat { - fn as_ref(&self) -> Self { - self - } - } + impl GlobalSecondaryIndexDescription { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &Arc> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => Projection, + } + } + /// Returns a borrow of the field IndexStatus + pub fn IndexStatus(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexStatus, + } + } + /// Returns a borrow of the field Backfilling + pub fn Backfilling(&self) -> &Arc> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => Backfilling, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field IndexSizeBytes + pub fn IndexSizeBytes(&self) -> &Arc> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexSizeBytes, + } + } + /// Returns a borrow of the field ItemCount + pub fn ItemCount(&self) -> &Arc> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => ItemCount, + } + } + /// Returns a borrow of the field IndexArn + pub fn IndexArn(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => IndexArn, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - #[derive(PartialEq, Clone)] - pub enum InputFormatOptions { - InputFormatOptions { - Csv: Rc>> - } - } + impl Debug + for GlobalSecondaryIndexDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl InputFormatOptions { - pub fn Csv(&self) -> &Rc>> { - match self { - InputFormatOptions::InputFormatOptions{Csv, } => Csv, - } - } - } + impl DafnyPrint + for GlobalSecondaryIndexDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexDescription.GlobalSecondaryIndexDescription(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Backfilling, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for InputFormatOptions { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GlobalSecondaryIndexDescription {} + + impl Hash + for GlobalSecondaryIndexDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexStatus, Backfilling, ProvisionedThroughput, IndexSizeBytes, ItemCount, IndexArn, OnDemandThroughput, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state); + Hash::hash(IndexStatus, _state); + Hash::hash(Backfilling, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(IndexSizeBytes, _state); + Hash::hash(ItemCount, _state); + Hash::hash(IndexArn, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - impl DafnyPrint - for InputFormatOptions { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - InputFormatOptions::InputFormatOptions{Csv, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormatOptions.InputFormatOptions(")?; - DafnyPrint::fmt_print(Csv, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GlobalSecondaryIndexDescription { + fn default() -> GlobalSecondaryIndexDescription { + GlobalSecondaryIndexDescription::GlobalSecondaryIndexDescription { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default(), + IndexStatus: Default::default(), + Backfilling: Default::default(), + ProvisionedThroughput: Default::default(), + IndexSizeBytes: Default::default(), + ItemCount: Default::default(), + IndexArn: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl Eq - for InputFormatOptions {} + impl AsRef + for GlobalSecondaryIndexDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for InputFormatOptions { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - InputFormatOptions::InputFormatOptions{Csv, } => { - Hash::hash(Csv, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1752,3) + #[derive(PartialEq, Clone)] + pub enum GlobalSecondaryIndexInfo { + GlobalSecondaryIndexInfo { + IndexName: Arc>>, + KeySchema: Arc>, + Projection: Arc>>, + ProvisionedThroughput: Arc>>, + OnDemandThroughput: Arc>> + } + } - impl Default - for InputFormatOptions { - fn default() -> InputFormatOptions { - InputFormatOptions::InputFormatOptions { - Csv: Default::default() - } - } - } + impl GlobalSecondaryIndexInfo { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &Arc> { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => Projection, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - impl AsRef - for &InputFormatOptions { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GlobalSecondaryIndexInfo { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ItemCollectionMetrics { - ItemCollectionMetrics { - ItemCollectionKey: Rc, Rc>>>, - SizeEstimateRangeGB: Rc>> - } - } + impl DafnyPrint + for GlobalSecondaryIndexInfo { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexInfo.GlobalSecondaryIndexInfo(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ItemCollectionMetrics { - pub fn ItemCollectionKey(&self) -> &Rc, Rc>>> { - match self { - ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => ItemCollectionKey, - } - } - pub fn SizeEstimateRangeGB(&self) -> &Rc>> { - match self { - ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => SizeEstimateRangeGB, - } - } - } + impl Eq + for GlobalSecondaryIndexInfo {} + + impl Hash + for GlobalSecondaryIndexInfo { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo{IndexName, KeySchema, Projection, ProvisionedThroughput, OnDemandThroughput, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - impl Debug - for ItemCollectionMetrics { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GlobalSecondaryIndexInfo { + fn default() -> GlobalSecondaryIndexInfo { + GlobalSecondaryIndexInfo::GlobalSecondaryIndexInfo { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl DafnyPrint - for ItemCollectionMetrics { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ItemCollectionMetrics.ItemCollectionMetrics(")?; - DafnyPrint::fmt_print(ItemCollectionKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SizeEstimateRangeGB, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GlobalSecondaryIndexInfo { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ItemCollectionMetrics {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1760,3) + #[derive(PartialEq, Clone)] + pub enum GlobalSecondaryIndexUpdate { + GlobalSecondaryIndexUpdate { + Update: Arc>>, + Create: Arc>>, + Delete: Arc>> + } + } - impl Hash - for ItemCollectionMetrics { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => { - Hash::hash(ItemCollectionKey, _state); - Hash::hash(SizeEstimateRangeGB, _state) - }, - } - } - } + impl GlobalSecondaryIndexUpdate { + /// Returns a borrow of the field Update + pub fn Update(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Update, + } + } + /// Returns a borrow of the field Create + pub fn Create(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Create, + } + } + /// Returns a borrow of the field Delete + pub fn Delete(&self) -> &Arc>> { + match self { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => Delete, + } + } + } - impl Default - for ItemCollectionMetrics { - fn default() -> ItemCollectionMetrics { - ItemCollectionMetrics::ItemCollectionMetrics { - ItemCollectionKey: Default::default(), - SizeEstimateRangeGB: Default::default() - } - } - } + impl Debug + for GlobalSecondaryIndexUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ItemCollectionMetrics { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GlobalSecondaryIndexUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalSecondaryIndexUpdate.GlobalSecondaryIndexUpdate(")?; + DafnyPrint::fmt_print(Update, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Create, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Delete, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type ItemCollectionSizeEstimateBound = Sequence; + impl Eq + for GlobalSecondaryIndexUpdate {} + + impl Hash + for GlobalSecondaryIndexUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate{Update, Create, Delete, } => { + Hash::hash(Update, _state); + Hash::hash(Create, _state); + Hash::hash(Delete, _state) + }, + } + } + } - pub type ItemCount = i64; + impl Default + for GlobalSecondaryIndexUpdate { + fn default() -> GlobalSecondaryIndexUpdate { + GlobalSecondaryIndexUpdate::GlobalSecondaryIndexUpdate { + Update: Default::default(), + Create: Default::default(), + Delete: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ItemResponse { - ItemResponse { - Item: Rc, Rc>>> - } - } + impl AsRef + for GlobalSecondaryIndexUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl ItemResponse { - pub fn Item(&self) -> &Rc, Rc>>> { - match self { - ItemResponse::ItemResponse{Item, } => Item, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1766,3) + #[derive(PartialEq, Clone)] + pub enum GlobalTable { + GlobalTable { + GlobalTableName: Arc>>, + ReplicationGroup: Arc>>> + } + } - impl Debug - for ItemResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GlobalTable { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Arc>> { + match self { + GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => GlobalTableName, + } + } + /// Returns a borrow of the field ReplicationGroup + pub fn ReplicationGroup(&self) -> &Arc>>> { + match self { + GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => ReplicationGroup, + } + } + } - impl DafnyPrint - for ItemResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ItemResponse::ItemResponse{Item, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ItemResponse.ItemResponse(")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GlobalTable { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ItemResponse {} + impl DafnyPrint + for GlobalTable { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTable.GlobalTable(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ItemResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ItemResponse::ItemResponse{Item, } => { - Hash::hash(Item, _state) - }, - } - } - } + impl Eq + for GlobalTable {} + + impl Hash + for GlobalTable { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalTable::GlobalTable{GlobalTableName, ReplicationGroup, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(ReplicationGroup, _state) + }, + } + } + } - impl Default - for ItemResponse { - fn default() -> ItemResponse { - ItemResponse::ItemResponse { - Item: Default::default() - } - } - } + impl Default + for GlobalTable { + fn default() -> GlobalTable { + GlobalTable::GlobalTable { + GlobalTableName: Default::default(), + ReplicationGroup: Default::default() + } + } + } - impl AsRef - for &ItemResponse { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GlobalTable { + fn as_ref(&self) -> &Self { + self + } + } - pub type ItemResponseList = Sequence>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1771,3) + #[derive(PartialEq, Clone)] + pub enum GlobalTableDescription { + GlobalTableDescription { + ReplicationGroup: Arc>>>, + GlobalTableArn: Arc>>, + CreationDateTime: Arc>>, + GlobalTableStatus: Arc>>, + GlobalTableName: Arc>> + } + } - pub type KeyList = Sequence, Rc>>; + impl GlobalTableDescription { + /// Returns a borrow of the field ReplicationGroup + pub fn ReplicationGroup(&self) -> &Arc>>> { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => ReplicationGroup, + } + } + /// Returns a borrow of the field GlobalTableArn + pub fn GlobalTableArn(&self) -> &Arc>> { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableArn, + } + } + /// Returns a borrow of the field CreationDateTime + pub fn CreationDateTime(&self) -> &Arc>> { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => CreationDateTime, + } + } + /// Returns a borrow of the field GlobalTableStatus + pub fn GlobalTableStatus(&self) -> &Arc>> { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableStatus, + } + } + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Arc>> { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => GlobalTableName, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KeysAndAttributes { - KeysAndAttributes { - Keys: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyList, - AttributesToGet: Rc>, - ConsistentRead: Rc>, - ProjectionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>> - } - } + impl Debug + for GlobalTableDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl KeysAndAttributes { - pub fn Keys(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyList { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => Keys, - } - } - pub fn AttributesToGet(&self) -> &Rc> { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => AttributesToGet, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ConsistentRead, - } - } - pub fn ProjectionExpression(&self) -> &Rc>> { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, - } - } - } + impl DafnyPrint + for GlobalTableDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableDescription.GlobalTableDescription(")?; + DafnyPrint::fmt_print(ReplicationGroup, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for KeysAndAttributes { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GlobalTableDescription {} + + impl Hash + for GlobalTableDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalTableDescription::GlobalTableDescription{ReplicationGroup, GlobalTableArn, CreationDateTime, GlobalTableStatus, GlobalTableName, } => { + Hash::hash(ReplicationGroup, _state); + Hash::hash(GlobalTableArn, _state); + Hash::hash(CreationDateTime, _state); + Hash::hash(GlobalTableStatus, _state); + Hash::hash(GlobalTableName, _state) + }, + } + } + } - impl DafnyPrint - for KeysAndAttributes { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeysAndAttributes.KeysAndAttributes(")?; - DafnyPrint::fmt_print(Keys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GlobalTableDescription { + fn default() -> GlobalTableDescription { + GlobalTableDescription::GlobalTableDescription { + ReplicationGroup: Default::default(), + GlobalTableArn: Default::default(), + CreationDateTime: Default::default(), + GlobalTableStatus: Default::default(), + GlobalTableName: Default::default() + } + } + } - impl Eq - for KeysAndAttributes {} + impl AsRef + for GlobalTableDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for KeysAndAttributes { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => { - Hash::hash(Keys, _state); - Hash::hash(AttributesToGet, _state); - Hash::hash(ConsistentRead, _state); - Hash::hash(ProjectionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1778,3) + #[derive(PartialEq, Clone)] + pub enum GlobalTableGlobalSecondaryIndexSettingsUpdate { + GlobalTableGlobalSecondaryIndexSettingsUpdate { + IndexName: Sequence, + ProvisionedWriteCapacityUnits: Arc>, + ProvisionedWriteCapacityAutoScalingSettingsUpdate: Arc>> + } + } - impl Default - for KeysAndAttributes { - fn default() -> KeysAndAttributes { - KeysAndAttributes::KeysAndAttributes { - Keys: Default::default(), - AttributesToGet: Default::default(), - ConsistentRead: Default::default(), - ProjectionExpression: Default::default(), - ExpressionAttributeNames: Default::default() - } - } - } + impl GlobalTableGlobalSecondaryIndexSettingsUpdate { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => IndexName, + } + } + /// Returns a borrow of the field ProvisionedWriteCapacityUnits + pub fn ProvisionedWriteCapacityUnits(&self) -> &Arc> { + match self { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => ProvisionedWriteCapacityUnits, + } + } + /// Returns a borrow of the field ProvisionedWriteCapacityAutoScalingSettingsUpdate + pub fn ProvisionedWriteCapacityAutoScalingSettingsUpdate(&self) -> &Arc>> { + match self { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => ProvisionedWriteCapacityAutoScalingSettingsUpdate, + } + } + } - impl AsRef - for &KeysAndAttributes { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GlobalTableGlobalSecondaryIndexSettingsUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type KeySchema = Sequence>; + impl DafnyPrint + for GlobalTableGlobalSecondaryIndexSettingsUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableGlobalSecondaryIndexSettingsUpdate.GlobalTableGlobalSecondaryIndexSettingsUpdate(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedWriteCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingSettingsUpdate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type KeySchemaAttributeName = Sequence; + impl Eq + for GlobalTableGlobalSecondaryIndexSettingsUpdate {} + + impl Hash + for GlobalTableGlobalSecondaryIndexSettingsUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettingsUpdate, } => { + Hash::hash(IndexName, _state); + Hash::hash(ProvisionedWriteCapacityUnits, _state); + Hash::hash(ProvisionedWriteCapacityAutoScalingSettingsUpdate, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KeySchemaElement { - KeySchemaElement { - AttributeName: Sequence, - KeyType: Rc - } - } + impl Default + for GlobalTableGlobalSecondaryIndexSettingsUpdate { + fn default() -> GlobalTableGlobalSecondaryIndexSettingsUpdate { + GlobalTableGlobalSecondaryIndexSettingsUpdate::GlobalTableGlobalSecondaryIndexSettingsUpdate { + IndexName: Default::default(), + ProvisionedWriteCapacityUnits: Default::default(), + ProvisionedWriteCapacityAutoScalingSettingsUpdate: Default::default() + } + } + } - impl KeySchemaElement { - pub fn AttributeName(&self) -> &Sequence { - match self { - KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => AttributeName, - } - } - pub fn KeyType(&self) -> &Rc { - match self { - KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => KeyType, - } - } - } + impl AsRef + for GlobalTableGlobalSecondaryIndexSettingsUpdate { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for KeySchemaElement { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1783,3) + pub type GlobalTableGlobalSecondaryIndexSettingsUpdateList = Sequence>; - impl DafnyPrint - for KeySchemaElement { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeySchemaElement.KeySchemaElement(")?; - DafnyPrint::fmt_print(AttributeName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1788,3) + #[derive(PartialEq, Clone)] + pub enum GlobalTableStatus { + CREATING {}, + ACTIVE {}, + DELETING {}, + UPDATING {} + } - impl Eq - for KeySchemaElement {} + impl GlobalTableStatus {} - impl Hash - for KeySchemaElement { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => { - Hash::hash(AttributeName, _state); - Hash::hash(KeyType, _state) - }, - } - } - } + impl Debug + for GlobalTableStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for KeySchemaElement { - fn default() -> KeySchemaElement { - KeySchemaElement::KeySchemaElement { - AttributeName: Default::default(), - KeyType: Default::default() - } - } - } + impl DafnyPrint + for GlobalTableStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GlobalTableStatus::CREATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.CREATING")?; + Ok(()) + }, + GlobalTableStatus::ACTIVE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.ACTIVE")?; + Ok(()) + }, + GlobalTableStatus::DELETING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.DELETING")?; + Ok(()) + }, + GlobalTableStatus::UPDATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.GlobalTableStatus.UPDATING")?; + Ok(()) + }, + } + } + } - impl AsRef - for &KeySchemaElement { - fn as_ref(&self) -> Self { - self - } - } + impl GlobalTableStatus { + /// Enumerates all possible values of GlobalTableStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(GlobalTableStatus::CREATING {}), Arc::new(GlobalTableStatus::ACTIVE {}), Arc::new(GlobalTableStatus::DELETING {}), Arc::new(GlobalTableStatus::UPDATING {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum KeyType { - HASH {}, - RANGE {} - } + impl Eq + for GlobalTableStatus {} - impl KeyType {} + impl Hash + for GlobalTableStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GlobalTableStatus::CREATING{} => { - impl Debug - for KeyType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + GlobalTableStatus::ACTIVE{} => { - impl DafnyPrint - for KeyType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyType::HASH{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeyType.HASH")?; - Ok(()) - }, - KeyType::RANGE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeyType.RANGE")?; - Ok(()) - }, - } - } - } + }, + GlobalTableStatus::DELETING{} => { - impl KeyType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyType::HASH {}), Rc::new(KeyType::RANGE {})].iter() - } - } + }, + GlobalTableStatus::UPDATING{} => { - impl Eq - for KeyType {} + }, + } + } + } - impl Hash - for KeyType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyType::HASH{} => { + impl Default + for GlobalTableStatus { + fn default() -> GlobalTableStatus { + GlobalTableStatus::CREATING {} + } + } - }, - KeyType::RANGE{} => { + impl AsRef + for GlobalTableStatus { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1793,3) + pub type ImportArn = Sequence; - impl Default - for KeyType { - fn default() -> KeyType { - KeyType::HASH {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1797,3) + pub type ImportedItemCount = i64; - impl AsRef - for &KeyType { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1801,3) + pub type ImportNextToken = Sequence; - #[derive(PartialEq, Clone)] - pub enum KinesisDataStreamDestination { - KinesisDataStreamDestination { - StreamArn: Rc>>, - DestinationStatus: Rc>>, - DestinationStatusDescription: Rc>>, - ApproximateCreationDateTimePrecision: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1805,3) + #[derive(PartialEq, Clone)] + pub enum ImportStatus { + IN_PROGRESS {}, + COMPLETED {}, + CANCELLING {}, + CANCELLED {}, + FAILED {} + } - impl KinesisDataStreamDestination { - pub fn StreamArn(&self) -> &Rc>> { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => StreamArn, - } - } - pub fn DestinationStatus(&self) -> &Rc>> { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => DestinationStatus, - } - } - pub fn DestinationStatusDescription(&self) -> &Rc>> { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => DestinationStatusDescription, - } - } - pub fn ApproximateCreationDateTimePrecision(&self) -> &Rc>> { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, - } - } - } + impl ImportStatus {} - impl Debug - for KinesisDataStreamDestination { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ImportStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for KinesisDataStreamDestination { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisDataStreamDestination.KinesisDataStreamDestination(")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatusDescription, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ImportStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportStatus::IN_PROGRESS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.IN__PROGRESS")?; + Ok(()) + }, + ImportStatus::COMPLETED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.COMPLETED")?; + Ok(()) + }, + ImportStatus::CANCELLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.CANCELLING")?; + Ok(()) + }, + ImportStatus::CANCELLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.CANCELLED")?; + Ok(()) + }, + ImportStatus::FAILED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportStatus.FAILED")?; + Ok(()) + }, + } + } + } - impl Eq - for KinesisDataStreamDestination {} + impl ImportStatus { + /// Enumerates all possible values of ImportStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ImportStatus::IN_PROGRESS {}), Arc::new(ImportStatus::COMPLETED {}), Arc::new(ImportStatus::CANCELLING {}), Arc::new(ImportStatus::CANCELLED {}), Arc::new(ImportStatus::FAILED {})].iter() + } + } - impl Hash - for KinesisDataStreamDestination { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => { - Hash::hash(StreamArn, _state); - Hash::hash(DestinationStatus, _state); - Hash::hash(DestinationStatusDescription, _state); - Hash::hash(ApproximateCreationDateTimePrecision, _state) - }, - } - } - } - - impl Default - for KinesisDataStreamDestination { - fn default() -> KinesisDataStreamDestination { - KinesisDataStreamDestination::KinesisDataStreamDestination { - StreamArn: Default::default(), - DestinationStatus: Default::default(), - DestinationStatusDescription: Default::default(), - ApproximateCreationDateTimePrecision: Default::default() - } - } - } - - impl AsRef - for &KinesisDataStreamDestination { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum KinesisStreamingDestinationInput { - KinesisStreamingDestinationInput { - TableName: Sequence, - StreamArn: Sequence, - EnableKinesisStreamingConfiguration: Rc>> - } - } - - impl KinesisStreamingDestinationInput { - pub fn TableName(&self) -> &Sequence { - match self { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Sequence { - match self { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } - - impl Debug - for KinesisStreamingDestinationInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ImportStatus {} - impl DafnyPrint - for KinesisStreamingDestinationInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisStreamingDestinationInput.KinesisStreamingDestinationInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ImportStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportStatus::IN_PROGRESS{} => { - impl Eq - for KinesisStreamingDestinationInput {} + }, + ImportStatus::COMPLETED{} => { - impl Hash - for KinesisStreamingDestinationInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for KinesisStreamingDestinationInput { - fn default() -> KinesisStreamingDestinationInput { - KinesisStreamingDestinationInput::KinesisStreamingDestinationInput { - TableName: Default::default(), - StreamArn: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &KinesisStreamingDestinationInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum KinesisStreamingDestinationOutput { - KinesisStreamingDestinationOutput { - TableName: Rc>>, - StreamArn: Rc>>, - DestinationStatus: Rc>>, - EnableKinesisStreamingConfiguration: Rc>> - } - } - - impl KinesisStreamingDestinationOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Rc>> { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn DestinationStatus(&self) -> &Rc>> { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, - } - } - pub fn EnableKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, - } - } - } - - impl Debug - for KinesisStreamingDestinationOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ImportStatus::CANCELLING{} => { - impl DafnyPrint - for KinesisStreamingDestinationOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisStreamingDestinationOutput.KinesisStreamingDestinationOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ImportStatus::CANCELLED{} => { - impl Eq - for KinesisStreamingDestinationOutput {} + }, + ImportStatus::FAILED{} => { - impl Hash - for KinesisStreamingDestinationOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(DestinationStatus, _state); - Hash::hash(EnableKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for KinesisStreamingDestinationOutput { - fn default() -> KinesisStreamingDestinationOutput { - KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput { - TableName: Default::default(), - StreamArn: Default::default(), - DestinationStatus: Default::default(), - EnableKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &KinesisStreamingDestinationOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ListBackupsInput { - ListBackupsInput { - TableName: Rc>>, - Limit: Rc>, - TimeRangeLowerBound: Rc>>, - TimeRangeUpperBound: Rc>>, - ExclusiveStartBackupArn: Rc>>, - BackupType: Rc>> - } - } - - impl ListBackupsInput { - pub fn TableName(&self) -> &Rc>> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TableName, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => Limit, - } - } - pub fn TimeRangeLowerBound(&self) -> &Rc>> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TimeRangeLowerBound, - } - } - pub fn TimeRangeUpperBound(&self) -> &Rc>> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TimeRangeUpperBound, - } - } - pub fn ExclusiveStartBackupArn(&self) -> &Rc>> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => ExclusiveStartBackupArn, - } - } - pub fn BackupType(&self) -> &Rc>> { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => BackupType, - } - } - } - - impl Debug - for ListBackupsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for ListBackupsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListBackupsInput.ListBackupsInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TimeRangeLowerBound, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TimeRangeUpperBound, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExclusiveStartBackupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ImportStatus { + fn default() -> ImportStatus { + ImportStatus::IN_PROGRESS {} + } + } - impl Eq - for ListBackupsInput {} + impl AsRef + for ImportStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ListBackupsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => { - Hash::hash(TableName, _state); - Hash::hash(Limit, _state); - Hash::hash(TimeRangeLowerBound, _state); - Hash::hash(TimeRangeUpperBound, _state); - Hash::hash(ExclusiveStartBackupArn, _state); - Hash::hash(BackupType, _state) - }, - } - } - } - - impl Default - for ListBackupsInput { - fn default() -> ListBackupsInput { - ListBackupsInput::ListBackupsInput { - TableName: Default::default(), - Limit: Default::default(), - TimeRangeLowerBound: Default::default(), - TimeRangeUpperBound: Default::default(), - ExclusiveStartBackupArn: Default::default(), - BackupType: Default::default() - } - } - } - - impl AsRef - for &ListBackupsInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ListBackupsOutput { - ListBackupsOutput { - BackupSummaries: Rc>>>, - LastEvaluatedBackupArn: Rc>> - } - } - - impl ListBackupsOutput { - pub fn BackupSummaries(&self) -> &Rc>>> { - match self { - ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => BackupSummaries, - } - } - pub fn LastEvaluatedBackupArn(&self) -> &Rc>> { - match self { - ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => LastEvaluatedBackupArn, - } - } - } - - impl Debug - for ListBackupsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1811,3) + #[derive(PartialEq, Clone)] + pub enum ImportSummary { + ImportSummary { + ImportArn: Arc>>, + ImportStatus: Arc>>, + TableArn: Arc>>, + S3BucketSource: Arc>>, + CloudWatchLogGroupArn: Arc>>, + InputFormat: Arc>>, + StartTime: Arc>>, + EndTime: Arc>> + } + } - impl DafnyPrint - for ListBackupsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListBackupsOutput.ListBackupsOutput(")?; - DafnyPrint::fmt_print(BackupSummaries, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedBackupArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ImportSummary { + /// Returns a borrow of the field ImportArn + pub fn ImportArn(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => ImportArn, + } + } + /// Returns a borrow of the field ImportStatus + pub fn ImportStatus(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => ImportStatus, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => TableArn, + } + } + /// Returns a borrow of the field S3BucketSource + pub fn S3BucketSource(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => S3BucketSource, + } + } + /// Returns a borrow of the field CloudWatchLogGroupArn + pub fn CloudWatchLogGroupArn(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => CloudWatchLogGroupArn, + } + } + /// Returns a borrow of the field InputFormat + pub fn InputFormat(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => InputFormat, + } + } + /// Returns a borrow of the field StartTime + pub fn StartTime(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => StartTime, + } + } + /// Returns a borrow of the field EndTime + pub fn EndTime(&self) -> &Arc>> { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => EndTime, + } + } + } - impl Eq - for ListBackupsOutput {} + impl Debug + for ImportSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ListBackupsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => { - Hash::hash(BackupSummaries, _state); - Hash::hash(LastEvaluatedBackupArn, _state) - }, - } - } - } + impl DafnyPrint + for ImportSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportSummary.ImportSummary(")?; + DafnyPrint::fmt_print(ImportArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ImportStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CloudWatchLogGroupArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputFormat, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StartTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EndTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ListBackupsOutput { - fn default() -> ListBackupsOutput { - ListBackupsOutput::ListBackupsOutput { - BackupSummaries: Default::default(), - LastEvaluatedBackupArn: Default::default() - } - } - } + impl Eq + for ImportSummary {} + + impl Hash + for ImportSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportSummary::ImportSummary{ImportArn, ImportStatus, TableArn, S3BucketSource, CloudWatchLogGroupArn, InputFormat, StartTime, EndTime, } => { + Hash::hash(ImportArn, _state); + Hash::hash(ImportStatus, _state); + Hash::hash(TableArn, _state); + Hash::hash(S3BucketSource, _state); + Hash::hash(CloudWatchLogGroupArn, _state); + Hash::hash(InputFormat, _state); + Hash::hash(StartTime, _state); + Hash::hash(EndTime, _state) + }, + } + } + } - impl AsRef - for &ListBackupsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ImportSummary { + fn default() -> ImportSummary { + ImportSummary::ImportSummary { + ImportArn: Default::default(), + ImportStatus: Default::default(), + TableArn: Default::default(), + S3BucketSource: Default::default(), + CloudWatchLogGroupArn: Default::default(), + InputFormat: Default::default(), + StartTime: Default::default(), + EndTime: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListContributorInsightsInput { - ListContributorInsightsInput { - TableName: Rc>>, - NextToken: Rc>>, - MaxResults: Rc> - } - } + impl AsRef + for ImportSummary { + fn as_ref(&self) -> &Self { + self + } + } - impl ListContributorInsightsInput { - pub fn TableName(&self) -> &Rc>> { - match self { - ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => TableName, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => NextToken, - } - } - pub fn MaxResults(&self) -> &Rc> { - match self { - ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => MaxResults, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1822,3) + #[derive(PartialEq, Clone)] + pub enum ImportTableDescription { + ImportTableDescription { + ImportArn: Arc>>, + ImportStatus: Arc>>, + TableArn: Arc>>, + TableId: Arc>>, + ClientToken: Arc>>, + S3BucketSource: Arc>>, + ErrorCount: Arc>, + CloudWatchLogGroupArn: Arc>>, + InputFormat: Arc>>, + InputFormatOptions: Arc>>, + InputCompressionType: Arc>>, + TableCreationParameters: Arc>>, + StartTime: Arc>>, + EndTime: Arc>>, + ProcessedSizeBytes: Arc>, + ProcessedItemCount: Arc>, + ImportedItemCount: Arc>, + FailureCode: Arc>>, + FailureMessage: Arc>> + } + } - impl Debug - for ListContributorInsightsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ImportTableDescription { + /// Returns a borrow of the field ImportArn + pub fn ImportArn(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportArn, + } + } + /// Returns a borrow of the field ImportStatus + pub fn ImportStatus(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportStatus, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableArn, + } + } + /// Returns a borrow of the field TableId + pub fn TableId(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableId, + } + } + /// Returns a borrow of the field ClientToken + pub fn ClientToken(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ClientToken, + } + } + /// Returns a borrow of the field S3BucketSource + pub fn S3BucketSource(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => S3BucketSource, + } + } + /// Returns a borrow of the field ErrorCount + pub fn ErrorCount(&self) -> &Arc> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ErrorCount, + } + } + /// Returns a borrow of the field CloudWatchLogGroupArn + pub fn CloudWatchLogGroupArn(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => CloudWatchLogGroupArn, + } + } + /// Returns a borrow of the field InputFormat + pub fn InputFormat(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputFormat, + } + } + /// Returns a borrow of the field InputFormatOptions + pub fn InputFormatOptions(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputFormatOptions, + } + } + /// Returns a borrow of the field InputCompressionType + pub fn InputCompressionType(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => InputCompressionType, + } + } + /// Returns a borrow of the field TableCreationParameters + pub fn TableCreationParameters(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => TableCreationParameters, + } + } + /// Returns a borrow of the field StartTime + pub fn StartTime(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => StartTime, + } + } + /// Returns a borrow of the field EndTime + pub fn EndTime(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => EndTime, + } + } + /// Returns a borrow of the field ProcessedSizeBytes + pub fn ProcessedSizeBytes(&self) -> &Arc> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ProcessedSizeBytes, + } + } + /// Returns a borrow of the field ProcessedItemCount + pub fn ProcessedItemCount(&self) -> &Arc> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ProcessedItemCount, + } + } + /// Returns a borrow of the field ImportedItemCount + pub fn ImportedItemCount(&self) -> &Arc> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => ImportedItemCount, + } + } + /// Returns a borrow of the field FailureCode + pub fn FailureCode(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => FailureCode, + } + } + /// Returns a borrow of the field FailureMessage + pub fn FailureMessage(&self) -> &Arc>> { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => FailureMessage, + } + } + } - impl DafnyPrint - for ListContributorInsightsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListContributorInsightsInput.ListContributorInsightsInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MaxResults, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ImportTableDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListContributorInsightsInput {} + impl DafnyPrint + for ImportTableDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableDescription.ImportTableDescription(")?; + DafnyPrint::fmt_print(ImportArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ImportStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ClientToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ErrorCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CloudWatchLogGroupArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputFormat, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputFormatOptions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputCompressionType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableCreationParameters, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StartTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EndTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProcessedSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProcessedItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ImportedItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FailureCode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FailureMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListContributorInsightsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => { - Hash::hash(TableName, _state); - Hash::hash(NextToken, _state); - Hash::hash(MaxResults, _state) - }, - } - } - } + impl Eq + for ImportTableDescription {} + + impl Hash + for ImportTableDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportTableDescription::ImportTableDescription{ImportArn, ImportStatus, TableArn, TableId, ClientToken, S3BucketSource, ErrorCount, CloudWatchLogGroupArn, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, StartTime, EndTime, ProcessedSizeBytes, ProcessedItemCount, ImportedItemCount, FailureCode, FailureMessage, } => { + Hash::hash(ImportArn, _state); + Hash::hash(ImportStatus, _state); + Hash::hash(TableArn, _state); + Hash::hash(TableId, _state); + Hash::hash(ClientToken, _state); + Hash::hash(S3BucketSource, _state); + Hash::hash(ErrorCount, _state); + Hash::hash(CloudWatchLogGroupArn, _state); + Hash::hash(InputFormat, _state); + Hash::hash(InputFormatOptions, _state); + Hash::hash(InputCompressionType, _state); + Hash::hash(TableCreationParameters, _state); + Hash::hash(StartTime, _state); + Hash::hash(EndTime, _state); + Hash::hash(ProcessedSizeBytes, _state); + Hash::hash(ProcessedItemCount, _state); + Hash::hash(ImportedItemCount, _state); + Hash::hash(FailureCode, _state); + Hash::hash(FailureMessage, _state) + }, + } + } + } - impl Default - for ListContributorInsightsInput { - fn default() -> ListContributorInsightsInput { - ListContributorInsightsInput::ListContributorInsightsInput { - TableName: Default::default(), - NextToken: Default::default(), - MaxResults: Default::default() - } - } - } + impl Default + for ImportTableDescription { + fn default() -> ImportTableDescription { + ImportTableDescription::ImportTableDescription { + ImportArn: Default::default(), + ImportStatus: Default::default(), + TableArn: Default::default(), + TableId: Default::default(), + ClientToken: Default::default(), + S3BucketSource: Default::default(), + ErrorCount: Default::default(), + CloudWatchLogGroupArn: Default::default(), + InputFormat: Default::default(), + InputFormatOptions: Default::default(), + InputCompressionType: Default::default(), + TableCreationParameters: Default::default(), + StartTime: Default::default(), + EndTime: Default::default(), + ProcessedSizeBytes: Default::default(), + ProcessedItemCount: Default::default(), + ImportedItemCount: Default::default(), + FailureCode: Default::default(), + FailureMessage: Default::default() + } + } + } - impl AsRef - for &ListContributorInsightsInput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ImportTableDescription { + fn as_ref(&self) -> &Self { + self + } + } - pub type ListContributorInsightsLimit = i32; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1843,3) + #[derive(PartialEq, Clone)] + pub enum ImportTableInput { + ImportTableInput { + ClientToken: Arc>>, + S3BucketSource: Arc, + InputFormat: Arc, + InputFormatOptions: Arc>>, + InputCompressionType: Arc>>, + TableCreationParameters: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum ListContributorInsightsOutput { - ListContributorInsightsOutput { - ContributorInsightsSummaries: Rc>>>, - NextToken: Rc>> - } - } + impl ImportTableInput { + /// Returns a borrow of the field ClientToken + pub fn ClientToken(&self) -> &Arc>> { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => ClientToken, + } + } + /// Returns a borrow of the field S3BucketSource + pub fn S3BucketSource(&self) -> &Arc { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => S3BucketSource, + } + } + /// Returns a borrow of the field InputFormat + pub fn InputFormat(&self) -> &Arc { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputFormat, + } + } + /// Returns a borrow of the field InputFormatOptions + pub fn InputFormatOptions(&self) -> &Arc>> { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputFormatOptions, + } + } + /// Returns a borrow of the field InputCompressionType + pub fn InputCompressionType(&self) -> &Arc>> { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => InputCompressionType, + } + } + /// Returns a borrow of the field TableCreationParameters + pub fn TableCreationParameters(&self) -> &Arc { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => TableCreationParameters, + } + } + } - impl ListContributorInsightsOutput { - pub fn ContributorInsightsSummaries(&self) -> &Rc>>> { - match self { - ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => ContributorInsightsSummaries, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => NextToken, - } - } - } + impl Debug + for ImportTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ListContributorInsightsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ImportTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableInput.ImportTableInput(")?; + DafnyPrint::fmt_print(ClientToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(S3BucketSource, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputFormat, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputFormatOptions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InputCompressionType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableCreationParameters, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ListContributorInsightsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListContributorInsightsOutput.ListContributorInsightsOutput(")?; - DafnyPrint::fmt_print(ContributorInsightsSummaries, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ImportTableInput {} + + impl Hash + for ImportTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportTableInput::ImportTableInput{ClientToken, S3BucketSource, InputFormat, InputFormatOptions, InputCompressionType, TableCreationParameters, } => { + Hash::hash(ClientToken, _state); + Hash::hash(S3BucketSource, _state); + Hash::hash(InputFormat, _state); + Hash::hash(InputFormatOptions, _state); + Hash::hash(InputCompressionType, _state); + Hash::hash(TableCreationParameters, _state) + }, + } + } + } - impl Eq - for ListContributorInsightsOutput {} + impl Default + for ImportTableInput { + fn default() -> ImportTableInput { + ImportTableInput::ImportTableInput { + ClientToken: Default::default(), + S3BucketSource: Default::default(), + InputFormat: Default::default(), + InputFormatOptions: Default::default(), + InputCompressionType: Default::default(), + TableCreationParameters: Default::default() + } + } + } - impl Hash - for ListContributorInsightsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => { - Hash::hash(ContributorInsightsSummaries, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + impl AsRef + for ImportTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ListContributorInsightsOutput { - fn default() -> ListContributorInsightsOutput { - ListContributorInsightsOutput::ListContributorInsightsOutput { - ContributorInsightsSummaries: Default::default(), - NextToken: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1851,3) + #[derive(PartialEq, Clone)] + pub enum ImportTableOutput { + ImportTableOutput { + ImportTableDescription: Arc + } + } - impl AsRef - for &ListContributorInsightsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl ImportTableOutput { + /// Returns a borrow of the field ImportTableDescription + pub fn ImportTableDescription(&self) -> &Arc { + match self { + ImportTableOutput::ImportTableOutput{ImportTableDescription, } => ImportTableDescription, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListExportsInput { - ListExportsInput { - TableArn: Rc>>, - MaxResults: Rc>, - NextToken: Rc>> - } - } + impl Debug + for ImportTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ListExportsInput { - pub fn TableArn(&self) -> &Rc>> { - match self { - ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => TableArn, - } - } - pub fn MaxResults(&self) -> &Rc> { - match self { - ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => MaxResults, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => NextToken, - } - } - } + impl DafnyPrint + for ImportTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportTableOutput::ImportTableOutput{ImportTableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ImportTableOutput.ImportTableOutput(")?; + DafnyPrint::fmt_print(ImportTableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ListExportsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ImportTableOutput {} - impl DafnyPrint - for ListExportsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListExportsInput.ListExportsInput(")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MaxResults, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ImportTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportTableOutput::ImportTableOutput{ImportTableDescription, } => { + Hash::hash(ImportTableDescription, _state) + }, + } + } + } - impl Eq - for ListExportsInput {} + impl Default + for ImportTableOutput { + fn default() -> ImportTableOutput { + ImportTableOutput::ImportTableOutput { + ImportTableDescription: Default::default() + } + } + } - impl Hash - for ListExportsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => { - Hash::hash(TableArn, _state); - Hash::hash(MaxResults, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + impl AsRef + for ImportTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ListExportsInput { - fn default() -> ListExportsInput { - ListExportsInput::ListExportsInput { - TableArn: Default::default(), - MaxResults: Default::default(), - NextToken: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1854,3) + #[derive(PartialEq, Clone)] + pub enum IncrementalExportSpecification { + IncrementalExportSpecification { + ExportFromTime: Arc>>, + ExportToTime: Arc>>, + ExportViewType: Arc>> + } + } - impl AsRef - for &ListExportsInput { - fn as_ref(&self) -> Self { - self - } - } + impl IncrementalExportSpecification { + /// Returns a borrow of the field ExportFromTime + pub fn ExportFromTime(&self) -> &Arc>> { + match self { + IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportFromTime, + } + } + /// Returns a borrow of the field ExportToTime + pub fn ExportToTime(&self) -> &Arc>> { + match self { + IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportToTime, + } + } + /// Returns a borrow of the field ExportViewType + pub fn ExportViewType(&self) -> &Arc>> { + match self { + IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => ExportViewType, + } + } + } - pub type ListExportsMaxLimit = i32; + impl Debug + for IncrementalExportSpecification { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ListExportsOutput { - ListExportsOutput { - ExportSummaries: Rc>>>, - NextToken: Rc>> - } - } + impl DafnyPrint + for IncrementalExportSpecification { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IncrementalExportSpecification.IncrementalExportSpecification(")?; + DafnyPrint::fmt_print(ExportFromTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportToTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExportViewType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ListExportsOutput { - pub fn ExportSummaries(&self) -> &Rc>>> { - match self { - ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => ExportSummaries, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => NextToken, - } - } - } + impl Eq + for IncrementalExportSpecification {} + + impl Hash + for IncrementalExportSpecification { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + IncrementalExportSpecification::IncrementalExportSpecification{ExportFromTime, ExportToTime, ExportViewType, } => { + Hash::hash(ExportFromTime, _state); + Hash::hash(ExportToTime, _state); + Hash::hash(ExportViewType, _state) + }, + } + } + } - impl Debug - for ListExportsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for IncrementalExportSpecification { + fn default() -> IncrementalExportSpecification { + IncrementalExportSpecification::IncrementalExportSpecification { + ExportFromTime: Default::default(), + ExportToTime: Default::default(), + ExportViewType: Default::default() + } + } + } - impl DafnyPrint - for ListExportsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListExportsOutput.ListExportsOutput(")?; - DafnyPrint::fmt_print(ExportSummaries, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for IncrementalExportSpecification { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ListExportsOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1859,3) + pub type IndexName = Sequence; - impl Hash - for ListExportsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => { - Hash::hash(ExportSummaries, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1863,3) + #[derive(PartialEq, Clone)] + pub enum IndexStatus { + CREATING {}, + UPDATING {}, + DELETING {}, + ACTIVE {} + } - impl Default - for ListExportsOutput { - fn default() -> ListExportsOutput { - ListExportsOutput::ListExportsOutput { - ExportSummaries: Default::default(), - NextToken: Default::default() - } - } - } + impl IndexStatus {} - impl AsRef - for &ListExportsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for IndexStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ListGlobalTablesInput { - ListGlobalTablesInput { - ExclusiveStartGlobalTableName: Rc>>, - Limit: Rc>, - RegionName: Rc>> - } - } + impl DafnyPrint + for IndexStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + IndexStatus::CREATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.CREATING")?; + Ok(()) + }, + IndexStatus::UPDATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.UPDATING")?; + Ok(()) + }, + IndexStatus::DELETING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.DELETING")?; + Ok(()) + }, + IndexStatus::ACTIVE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.IndexStatus.ACTIVE")?; + Ok(()) + }, + } + } + } - impl ListGlobalTablesInput { - pub fn ExclusiveStartGlobalTableName(&self) -> &Rc>> { - match self { - ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => ExclusiveStartGlobalTableName, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => Limit, - } - } - pub fn RegionName(&self) -> &Rc>> { - match self { - ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => RegionName, - } - } - } + impl IndexStatus { + /// Enumerates all possible values of IndexStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(IndexStatus::CREATING {}), Arc::new(IndexStatus::UPDATING {}), Arc::new(IndexStatus::DELETING {}), Arc::new(IndexStatus::ACTIVE {})].iter() + } + } - impl Debug - for ListGlobalTablesInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for IndexStatus {} - impl DafnyPrint - for ListGlobalTablesInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListGlobalTablesInput.ListGlobalTablesInput(")?; - DafnyPrint::fmt_print(ExclusiveStartGlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for IndexStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + IndexStatus::CREATING{} => { - impl Eq - for ListGlobalTablesInput {} + }, + IndexStatus::UPDATING{} => { - impl Hash - for ListGlobalTablesInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => { - Hash::hash(ExclusiveStartGlobalTableName, _state); - Hash::hash(Limit, _state); - Hash::hash(RegionName, _state) - }, - } - } - } + }, + IndexStatus::DELETING{} => { - impl Default - for ListGlobalTablesInput { - fn default() -> ListGlobalTablesInput { - ListGlobalTablesInput::ListGlobalTablesInput { - ExclusiveStartGlobalTableName: Default::default(), - Limit: Default::default(), - RegionName: Default::default() - } - } - } + }, + IndexStatus::ACTIVE{} => { - impl AsRef - for &ListGlobalTablesInput { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListGlobalTablesOutput { - ListGlobalTablesOutput { - GlobalTables: Rc>>>, - LastEvaluatedGlobalTableName: Rc>> - } - } + impl Default + for IndexStatus { + fn default() -> IndexStatus { + IndexStatus::CREATING {} + } + } - impl ListGlobalTablesOutput { - pub fn GlobalTables(&self) -> &Rc>>> { - match self { - ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => GlobalTables, - } - } - pub fn LastEvaluatedGlobalTableName(&self) -> &Rc>> { - match self { - ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => LastEvaluatedGlobalTableName, - } - } - } + impl AsRef + for IndexStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ListGlobalTablesOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1868,3) + #[derive(PartialEq, Clone)] + pub enum InputCompressionType { + GZIP {}, + ZSTD {}, + NONE {} + } - impl DafnyPrint - for ListGlobalTablesOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListGlobalTablesOutput.ListGlobalTablesOutput(")?; - DafnyPrint::fmt_print(GlobalTables, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedGlobalTableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl InputCompressionType {} - impl Eq - for ListGlobalTablesOutput {} + impl Debug + for InputCompressionType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ListGlobalTablesOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => { - Hash::hash(GlobalTables, _state); - Hash::hash(LastEvaluatedGlobalTableName, _state) - }, - } - } - } + impl DafnyPrint + for InputCompressionType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + InputCompressionType::GZIP{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.GZIP")?; + Ok(()) + }, + InputCompressionType::ZSTD{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.ZSTD")?; + Ok(()) + }, + InputCompressionType::NONE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputCompressionType.NONE")?; + Ok(()) + }, + } + } + } - impl Default - for ListGlobalTablesOutput { - fn default() -> ListGlobalTablesOutput { - ListGlobalTablesOutput::ListGlobalTablesOutput { - GlobalTables: Default::default(), - LastEvaluatedGlobalTableName: Default::default() - } - } - } + impl InputCompressionType { + /// Enumerates all possible values of InputCompressionType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(InputCompressionType::GZIP {}), Arc::new(InputCompressionType::ZSTD {}), Arc::new(InputCompressionType::NONE {})].iter() + } + } - impl AsRef - for &ListGlobalTablesOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for InputCompressionType {} - #[derive(PartialEq, Clone)] - pub enum ListImportsInput { - ListImportsInput { - TableArn: Rc>>, - PageSize: Rc>, - NextToken: Rc>> - } - } + impl Hash + for InputCompressionType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + InputCompressionType::GZIP{} => { - impl ListImportsInput { - pub fn TableArn(&self) -> &Rc>> { - match self { - ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => TableArn, - } - } - pub fn PageSize(&self) -> &Rc> { - match self { - ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => PageSize, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => NextToken, - } - } - } + }, + InputCompressionType::ZSTD{} => { - impl Debug - for ListImportsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + InputCompressionType::NONE{} => { - impl DafnyPrint - for ListImportsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListImportsInput.ListImportsInput(")?; - DafnyPrint::fmt_print(TableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PageSize, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl Eq - for ListImportsInput {} + impl Default + for InputCompressionType { + fn default() -> InputCompressionType { + InputCompressionType::GZIP {} + } + } - impl Hash - for ListImportsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => { - Hash::hash(TableArn, _state); - Hash::hash(PageSize, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + impl AsRef + for InputCompressionType { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ListImportsInput { - fn default() -> ListImportsInput { - ListImportsInput::ListImportsInput { - TableArn: Default::default(), - PageSize: Default::default(), - NextToken: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1872,3) + #[derive(PartialEq, Clone)] + pub enum InputFormat { + DYNAMODB_JSON {}, + ION {}, + CSV {} + } - impl AsRef - for &ListImportsInput { - fn as_ref(&self) -> Self { - self - } - } + impl InputFormat {} - pub type ListImportsMaxLimit = i32; + impl Debug + for InputFormat { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum ListImportsOutput { - ListImportsOutput { - ImportSummaryList: Rc>>>, - NextToken: Rc>> - } - } + impl DafnyPrint + for InputFormat { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + InputFormat::DYNAMODB_JSON{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.DYNAMODB__JSON")?; + Ok(()) + }, + InputFormat::ION{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.ION")?; + Ok(()) + }, + InputFormat::CSV{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormat.CSV")?; + Ok(()) + }, + } + } + } - impl ListImportsOutput { - pub fn ImportSummaryList(&self) -> &Rc>>> { - match self { - ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => ImportSummaryList, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => NextToken, - } - } - } + impl InputFormat { + /// Enumerates all possible values of InputFormat + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(InputFormat::DYNAMODB_JSON {}), Arc::new(InputFormat::ION {}), Arc::new(InputFormat::CSV {})].iter() + } + } - impl Debug - for ListImportsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for InputFormat {} - impl DafnyPrint - for ListImportsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListImportsOutput.ListImportsOutput(")?; - DafnyPrint::fmt_print(ImportSummaryList, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for InputFormat { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + InputFormat::DYNAMODB_JSON{} => { - impl Eq - for ListImportsOutput {} + }, + InputFormat::ION{} => { - impl Hash - for ListImportsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => { - Hash::hash(ImportSummaryList, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + }, + InputFormat::CSV{} => { - impl Default - for ListImportsOutput { - fn default() -> ListImportsOutput { - ListImportsOutput::ListImportsOutput { - ImportSummaryList: Default::default(), - NextToken: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &ListImportsOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for InputFormat { + fn default() -> InputFormat { + InputFormat::DYNAMODB_JSON {} + } + } - #[derive(PartialEq, Clone)] - pub enum ListTablesInput { - ListTablesInput { - ExclusiveStartTableName: Rc>>, - Limit: Rc> - } - } + impl AsRef + for InputFormat { + fn as_ref(&self) -> &Self { + self + } + } - impl ListTablesInput { - pub fn ExclusiveStartTableName(&self) -> &Rc>> { - match self { - ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => ExclusiveStartTableName, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => Limit, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1876,3) + #[derive(PartialEq, Clone)] + pub enum InputFormatOptions { + InputFormatOptions { + Csv: Arc>> + } + } - impl Debug - for ListTablesInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl InputFormatOptions { + /// Returns a borrow of the field Csv + pub fn Csv(&self) -> &Arc>> { + match self { + InputFormatOptions::InputFormatOptions{Csv, } => Csv, + } + } + } - impl DafnyPrint - for ListTablesInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTablesInput.ListTablesInput(")?; - DafnyPrint::fmt_print(ExclusiveStartTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for InputFormatOptions { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListTablesInput {} + impl DafnyPrint + for InputFormatOptions { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + InputFormatOptions::InputFormatOptions{Csv, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.InputFormatOptions.InputFormatOptions(")?; + DafnyPrint::fmt_print(Csv, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListTablesInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => { - Hash::hash(ExclusiveStartTableName, _state); - Hash::hash(Limit, _state) - }, - } - } - } + impl Eq + for InputFormatOptions {} - impl Default - for ListTablesInput { - fn default() -> ListTablesInput { - ListTablesInput::ListTablesInput { - ExclusiveStartTableName: Default::default(), - Limit: Default::default() - } - } - } + impl Hash + for InputFormatOptions { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + InputFormatOptions::InputFormatOptions{Csv, } => { + Hash::hash(Csv, _state) + }, + } + } + } - impl AsRef - for &ListTablesInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for InputFormatOptions { + fn default() -> InputFormatOptions { + InputFormatOptions::InputFormatOptions { + Csv: Default::default() + } + } + } - pub type ListTablesInputLimit = i32; + impl AsRef + for InputFormatOptions { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ListTablesOutput { - ListTablesOutput { - TableNames: Rc>>>, - LastEvaluatedTableName: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1882,3) + #[derive(PartialEq, Clone)] + pub enum ItemCollectionMetrics { + ItemCollectionMetrics { + ItemCollectionKey: Arc, Arc>>>, + SizeEstimateRangeGB: Arc>> + } + } - impl ListTablesOutput { - pub fn TableNames(&self) -> &Rc>>> { - match self { - ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => TableNames, - } - } - pub fn LastEvaluatedTableName(&self) -> &Rc>> { - match self { - ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => LastEvaluatedTableName, - } - } - } + impl ItemCollectionMetrics { + /// Returns a borrow of the field ItemCollectionKey + pub fn ItemCollectionKey(&self) -> &Arc, Arc>>> { + match self { + ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => ItemCollectionKey, + } + } + /// Returns a borrow of the field SizeEstimateRangeGB + pub fn SizeEstimateRangeGB(&self) -> &Arc>> { + match self { + ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => SizeEstimateRangeGB, + } + } + } - impl Debug - for ListTablesOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ItemCollectionMetrics { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ListTablesOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTablesOutput.ListTablesOutput(")?; - DafnyPrint::fmt_print(TableNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedTableName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ItemCollectionMetrics { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ItemCollectionMetrics.ItemCollectionMetrics(")?; + DafnyPrint::fmt_print(ItemCollectionKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SizeEstimateRangeGB, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ListTablesOutput {} + impl Eq + for ItemCollectionMetrics {} + + impl Hash + for ItemCollectionMetrics { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ItemCollectionMetrics::ItemCollectionMetrics{ItemCollectionKey, SizeEstimateRangeGB, } => { + Hash::hash(ItemCollectionKey, _state); + Hash::hash(SizeEstimateRangeGB, _state) + }, + } + } + } - impl Hash - for ListTablesOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => { - Hash::hash(TableNames, _state); - Hash::hash(LastEvaluatedTableName, _state) - }, - } - } - } + impl Default + for ItemCollectionMetrics { + fn default() -> ItemCollectionMetrics { + ItemCollectionMetrics::ItemCollectionMetrics { + ItemCollectionKey: Default::default(), + SizeEstimateRangeGB: Default::default() + } + } + } - impl Default - for ListTablesOutput { - fn default() -> ListTablesOutput { - ListTablesOutput::ListTablesOutput { - TableNames: Default::default(), - LastEvaluatedTableName: Default::default() - } - } - } + impl AsRef + for ItemCollectionMetrics { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &ListTablesOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1888,3) + pub type ItemCollectionSizeEstimateBound = Sequence; - #[derive(PartialEq, Clone)] - pub enum ListTagsOfResourceInput { - ListTagsOfResourceInput { - ResourceArn: Sequence, - NextToken: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1893,3) + pub type ItemCount = i64; - impl ListTagsOfResourceInput { - pub fn ResourceArn(&self) -> &Sequence { - match self { - ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => ResourceArn, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => NextToken, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1898,3) + #[derive(PartialEq, Clone)] + pub enum ItemResponse { + ItemResponse { + Item: Arc, Arc>>> + } + } - impl Debug - for ListTagsOfResourceInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ItemResponse { + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Arc, Arc>>> { + match self { + ItemResponse::ItemResponse{Item, } => Item, + } + } + } - impl DafnyPrint - for ListTagsOfResourceInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTagsOfResourceInput.ListTagsOfResourceInput(")?; - DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ItemResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListTagsOfResourceInput {} + impl DafnyPrint + for ItemResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ItemResponse::ItemResponse{Item, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ItemResponse.ItemResponse(")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListTagsOfResourceInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => { - Hash::hash(ResourceArn, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + impl Eq + for ItemResponse {} - impl Default - for ListTagsOfResourceInput { - fn default() -> ListTagsOfResourceInput { - ListTagsOfResourceInput::ListTagsOfResourceInput { - ResourceArn: Default::default(), - NextToken: Default::default() - } - } - } + impl Hash + for ItemResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ItemResponse::ItemResponse{Item, } => { + Hash::hash(Item, _state) + }, + } + } + } - impl AsRef - for &ListTagsOfResourceInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ItemResponse { + fn default() -> ItemResponse { + ItemResponse::ItemResponse { + Item: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListTagsOfResourceOutput { - ListTagsOfResourceOutput { - Tags: Rc>>>, - NextToken: Rc>> - } - } + impl AsRef + for ItemResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl ListTagsOfResourceOutput { - pub fn Tags(&self) -> &Rc>>> { - match self { - ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => Tags, - } - } - pub fn NextToken(&self) -> &Rc>> { - match self { - ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => NextToken, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1901,3) + pub type ItemResponseList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1908,3) + pub type KeyList = Sequence, Arc>>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1912,3) + #[derive(PartialEq, Clone)] + pub enum KeysAndAttributes { + KeysAndAttributes { + Keys: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyList, + AttributesToGet: Arc>, + ConsistentRead: Arc>, + ProjectionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>> + } + } - impl Debug - for ListTagsOfResourceOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl KeysAndAttributes { + /// Returns a borrow of the field Keys + pub fn Keys(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeyList { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => Keys, + } + } + /// Returns a borrow of the field AttributesToGet + pub fn AttributesToGet(&self) -> &Arc> { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => AttributesToGet, + } + } + /// Returns a borrow of the field ConsistentRead + pub fn ConsistentRead(&self) -> &Arc> { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ConsistentRead, + } + } + /// Returns a borrow of the field ProjectionExpression + pub fn ProjectionExpression(&self) -> &Arc>> { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ProjectionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => ExpressionAttributeNames, + } + } + } - impl DafnyPrint - for ListTagsOfResourceOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTagsOfResourceOutput.ListTagsOfResourceOutput(")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextToken, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for KeysAndAttributes { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListTagsOfResourceOutput {} + impl DafnyPrint + for KeysAndAttributes { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeysAndAttributes.KeysAndAttributes(")?; + DafnyPrint::fmt_print(Keys, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListTagsOfResourceOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => { - Hash::hash(Tags, _state); - Hash::hash(NextToken, _state) - }, - } - } - } + impl Eq + for KeysAndAttributes {} + + impl Hash + for KeysAndAttributes { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeysAndAttributes::KeysAndAttributes{Keys, AttributesToGet, ConsistentRead, ProjectionExpression, ExpressionAttributeNames, } => { + Hash::hash(Keys, _state); + Hash::hash(AttributesToGet, _state); + Hash::hash(ConsistentRead, _state); + Hash::hash(ProjectionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state) + }, + } + } + } - impl Default - for ListTagsOfResourceOutput { - fn default() -> ListTagsOfResourceOutput { - ListTagsOfResourceOutput::ListTagsOfResourceOutput { - Tags: Default::default(), - NextToken: Default::default() - } - } - } + impl Default + for KeysAndAttributes { + fn default() -> KeysAndAttributes { + KeysAndAttributes::KeysAndAttributes { + Keys: Default::default(), + AttributesToGet: Default::default(), + ConsistentRead: Default::default(), + ProjectionExpression: Default::default(), + ExpressionAttributeNames: Default::default() + } + } + } - impl AsRef - for &ListTagsOfResourceOutput { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for KeysAndAttributes { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum LocalSecondaryIndex { - LocalSecondaryIndex { - IndexName: Sequence, - KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, - Projection: Rc - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1919,3) + pub type KeySchema = Sequence>; - impl LocalSecondaryIndex { - pub fn IndexName(&self) -> &Sequence { - match self { - LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => IndexName, - } - } - pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { - match self { - LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc { - match self { - LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => Projection, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1923,3) + pub type KeySchemaAttributeName = Sequence; - impl Debug - for LocalSecondaryIndex { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1927,3) + #[derive(PartialEq, Clone)] + pub enum KeySchemaElement { + KeySchemaElement { + AttributeName: Sequence, + KeyType: Arc + } + } - impl DafnyPrint - for LocalSecondaryIndex { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndex.LocalSecondaryIndex(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl KeySchemaElement { + /// Returns a borrow of the field AttributeName + pub fn AttributeName(&self) -> &Sequence { + match self { + KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => AttributeName, + } + } + /// Returns a borrow of the field KeyType + pub fn KeyType(&self) -> &Arc { + match self { + KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => KeyType, + } + } + } - impl Eq - for LocalSecondaryIndex {} + impl Debug + for KeySchemaElement { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for LocalSecondaryIndex { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state) - }, - } - } - } - - impl Default - for LocalSecondaryIndex { - fn default() -> LocalSecondaryIndex { - LocalSecondaryIndex::LocalSecondaryIndex { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default() - } - } - } - - impl AsRef - for &LocalSecondaryIndex { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum LocalSecondaryIndexDescription { - LocalSecondaryIndexDescription { - IndexName: Rc>>, - KeySchema: Rc>, - Projection: Rc>>, - IndexSizeBytes: Rc>, - ItemCount: Rc>, - IndexArn: Rc>> - } - } - - impl LocalSecondaryIndexDescription { - pub fn IndexName(&self) -> &Rc>> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexName, - } - } - pub fn KeySchema(&self) -> &Rc> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc>> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => Projection, - } - } - pub fn IndexSizeBytes(&self) -> &Rc> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexSizeBytes, - } - } - pub fn ItemCount(&self) -> &Rc> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => ItemCount, - } - } - pub fn IndexArn(&self) -> &Rc>> { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexArn, - } - } - } - - impl Debug - for LocalSecondaryIndexDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for KeySchemaElement { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeySchemaElement.KeySchemaElement(")?; + DafnyPrint::fmt_print(AttributeName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for LocalSecondaryIndexDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndexDescription.LocalSecondaryIndexDescription(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexSizeBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for KeySchemaElement {} + + impl Hash + for KeySchemaElement { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeySchemaElement::KeySchemaElement{AttributeName, KeyType, } => { + Hash::hash(AttributeName, _state); + Hash::hash(KeyType, _state) + }, + } + } + } - impl Eq - for LocalSecondaryIndexDescription {} + impl Default + for KeySchemaElement { + fn default() -> KeySchemaElement { + KeySchemaElement::KeySchemaElement { + AttributeName: Default::default(), + KeyType: Default::default() + } + } + } - impl Hash - for LocalSecondaryIndexDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state); - Hash::hash(IndexSizeBytes, _state); - Hash::hash(ItemCount, _state); - Hash::hash(IndexArn, _state) - }, - } - } - } - - impl Default - for LocalSecondaryIndexDescription { - fn default() -> LocalSecondaryIndexDescription { - LocalSecondaryIndexDescription::LocalSecondaryIndexDescription { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default(), - IndexSizeBytes: Default::default(), - ItemCount: Default::default(), - IndexArn: Default::default() - } - } - } - - impl AsRef - for &LocalSecondaryIndexDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum LocalSecondaryIndexInfo { - LocalSecondaryIndexInfo { - IndexName: Rc>>, - KeySchema: Rc>, - Projection: Rc>> - } - } - - impl LocalSecondaryIndexInfo { - pub fn IndexName(&self) -> &Rc>> { - match self { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => IndexName, - } - } - pub fn KeySchema(&self) -> &Rc> { - match self { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => KeySchema, - } - } - pub fn Projection(&self) -> &Rc>> { - match self { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => Projection, - } - } - } - - impl Debug - for LocalSecondaryIndexInfo { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for KeySchemaElement { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for LocalSecondaryIndexInfo { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndexInfo.LocalSecondaryIndexInfo(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySchema, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Projection, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1931,3) + #[derive(PartialEq, Clone)] + pub enum KeyType { + HASH {}, + RANGE {} + } - impl Eq - for LocalSecondaryIndexInfo {} + impl KeyType {} - impl Hash - for LocalSecondaryIndexInfo { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => { - Hash::hash(IndexName, _state); - Hash::hash(KeySchema, _state); - Hash::hash(Projection, _state) - }, - } - } - } + impl Debug + for KeyType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for LocalSecondaryIndexInfo { - fn default() -> LocalSecondaryIndexInfo { - LocalSecondaryIndexInfo::LocalSecondaryIndexInfo { - IndexName: Default::default(), - KeySchema: Default::default(), - Projection: Default::default() - } - } - } + impl DafnyPrint + for KeyType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyType::HASH{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeyType.HASH")?; + Ok(()) + }, + KeyType::RANGE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KeyType.RANGE")?; + Ok(()) + }, + } + } + } - impl AsRef - for &LocalSecondaryIndexInfo { - fn as_ref(&self) -> Self { - self - } - } + impl KeyType { + /// Enumerates all possible values of KeyType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeyType::HASH {}), Arc::new(KeyType::RANGE {})].iter() + } + } - pub type NonKeyAttributeName = Sequence; + impl Eq + for KeyType {} - pub type NonKeyAttributeNameList = Sequence>; + impl Hash + for KeyType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyType::HASH{} => { - pub type NonNegativeLongObject = i64; + }, + KeyType::RANGE{} => { - #[derive(PartialEq, Clone)] - pub enum OnDemandThroughput { - OnDemandThroughput { - MaxReadRequestUnits: Rc>, - MaxWriteRequestUnits: Rc> - } - } + }, + } + } + } - impl OnDemandThroughput { - pub fn MaxReadRequestUnits(&self) -> &Rc> { - match self { - OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => MaxReadRequestUnits, - } - } - pub fn MaxWriteRequestUnits(&self) -> &Rc> { - match self { - OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => MaxWriteRequestUnits, - } - } - } + impl Default + for KeyType { + fn default() -> KeyType { + KeyType::HASH {} + } + } - impl Debug - for OnDemandThroughput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for KeyType { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for OnDemandThroughput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.OnDemandThroughput.OnDemandThroughput(")?; - DafnyPrint::fmt_print(MaxReadRequestUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MaxWriteRequestUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1934,3) + #[derive(PartialEq, Clone)] + pub enum KinesisDataStreamDestination { + KinesisDataStreamDestination { + StreamArn: Arc>>, + DestinationStatus: Arc>>, + DestinationStatusDescription: Arc>>, + ApproximateCreationDateTimePrecision: Arc>> + } + } - impl Eq - for OnDemandThroughput {} + impl KinesisDataStreamDestination { + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Arc>> { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => StreamArn, + } + } + /// Returns a borrow of the field DestinationStatus + pub fn DestinationStatus(&self) -> &Arc>> { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => DestinationStatus, + } + } + /// Returns a borrow of the field DestinationStatusDescription + pub fn DestinationStatusDescription(&self) -> &Arc>> { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => DestinationStatusDescription, + } + } + /// Returns a borrow of the field ApproximateCreationDateTimePrecision + pub fn ApproximateCreationDateTimePrecision(&self) -> &Arc>> { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, + } + } + } - impl Hash - for OnDemandThroughput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => { - Hash::hash(MaxReadRequestUnits, _state); - Hash::hash(MaxWriteRequestUnits, _state) - }, - } - } - } + impl Debug + for KinesisDataStreamDestination { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for OnDemandThroughput { - fn default() -> OnDemandThroughput { - OnDemandThroughput::OnDemandThroughput { - MaxReadRequestUnits: Default::default(), - MaxWriteRequestUnits: Default::default() - } - } - } + impl DafnyPrint + for KinesisDataStreamDestination { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisDataStreamDestination.KinesisDataStreamDestination(")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatusDescription, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &OnDemandThroughput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for KinesisDataStreamDestination {} + + impl Hash + for KinesisDataStreamDestination { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KinesisDataStreamDestination::KinesisDataStreamDestination{StreamArn, DestinationStatus, DestinationStatusDescription, ApproximateCreationDateTimePrecision, } => { + Hash::hash(StreamArn, _state); + Hash::hash(DestinationStatus, _state); + Hash::hash(DestinationStatusDescription, _state); + Hash::hash(ApproximateCreationDateTimePrecision, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum OnDemandThroughputOverride { - OnDemandThroughputOverride { - MaxReadRequestUnits: Rc> - } - } + impl Default + for KinesisDataStreamDestination { + fn default() -> KinesisDataStreamDestination { + KinesisDataStreamDestination::KinesisDataStreamDestination { + StreamArn: Default::default(), + DestinationStatus: Default::default(), + DestinationStatusDescription: Default::default(), + ApproximateCreationDateTimePrecision: Default::default() + } + } + } - impl OnDemandThroughputOverride { - pub fn MaxReadRequestUnits(&self) -> &Rc> { - match self { - OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => MaxReadRequestUnits, - } - } - } + impl AsRef + for KinesisDataStreamDestination { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for OnDemandThroughputOverride { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1941,3) + #[derive(PartialEq, Clone)] + pub enum KinesisStreamingDestinationInput { + KinesisStreamingDestinationInput { + TableName: Sequence, + StreamArn: Sequence, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl DafnyPrint - for OnDemandThroughputOverride { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.OnDemandThroughputOverride.OnDemandThroughputOverride(")?; - DafnyPrint::fmt_print(MaxReadRequestUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl KinesisStreamingDestinationInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Sequence { + match self { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl Eq - for OnDemandThroughputOverride {} + impl Debug + for KinesisStreamingDestinationInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for OnDemandThroughputOverride { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => { - Hash::hash(MaxReadRequestUnits, _state) - }, - } - } - } + impl DafnyPrint + for KinesisStreamingDestinationInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisStreamingDestinationInput.KinesisStreamingDestinationInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for OnDemandThroughputOverride { - fn default() -> OnDemandThroughputOverride { - OnDemandThroughputOverride::OnDemandThroughputOverride { - MaxReadRequestUnits: Default::default() - } - } - } + impl Eq + for KinesisStreamingDestinationInput {} + + impl Hash + for KinesisStreamingDestinationInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput{TableName, StreamArn, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl AsRef - for &OnDemandThroughputOverride { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for KinesisStreamingDestinationInput { + fn default() -> KinesisStreamingDestinationInput { + KinesisStreamingDestinationInput::KinesisStreamingDestinationInput { + TableName: Default::default(), + StreamArn: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ParameterizedStatement { - ParameterizedStatement { - Statement: Sequence, - Parameters: Rc> - } - } + impl AsRef + for KinesisStreamingDestinationInput { + fn as_ref(&self) -> &Self { + self + } + } - impl ParameterizedStatement { - pub fn Statement(&self) -> &Sequence { - match self { - ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => Statement, - } - } - pub fn Parameters(&self) -> &Rc> { - match self { - ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => Parameters, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1946,3) + #[derive(PartialEq, Clone)] + pub enum KinesisStreamingDestinationOutput { + KinesisStreamingDestinationOutput { + TableName: Arc>>, + StreamArn: Arc>>, + DestinationStatus: Arc>>, + EnableKinesisStreamingConfiguration: Arc>> + } + } - impl Debug - for ParameterizedStatement { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl KinesisStreamingDestinationOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Arc>> { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field DestinationStatus + pub fn DestinationStatus(&self) -> &Arc>> { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => DestinationStatus, + } + } + /// Returns a borrow of the field EnableKinesisStreamingConfiguration + pub fn EnableKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => EnableKinesisStreamingConfiguration, + } + } + } - impl DafnyPrint - for ParameterizedStatement { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ParameterizedStatement.ParameterizedStatement(")?; - DafnyPrint::fmt_print(Statement, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Parameters, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for KinesisStreamingDestinationOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ParameterizedStatement {} + impl DafnyPrint + for KinesisStreamingDestinationOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.KinesisStreamingDestinationOutput.KinesisStreamingDestinationOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EnableKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ParameterizedStatement { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => { - Hash::hash(Statement, _state); - Hash::hash(Parameters, _state) - }, - } - } - } + impl Eq + for KinesisStreamingDestinationOutput {} + + impl Hash + for KinesisStreamingDestinationOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, EnableKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(DestinationStatus, _state); + Hash::hash(EnableKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Default - for ParameterizedStatement { - fn default() -> ParameterizedStatement { - ParameterizedStatement::ParameterizedStatement { - Statement: Default::default(), - Parameters: Default::default() - } - } - } + impl Default + for KinesisStreamingDestinationOutput { + fn default() -> KinesisStreamingDestinationOutput { + KinesisStreamingDestinationOutput::KinesisStreamingDestinationOutput { + TableName: Default::default(), + StreamArn: Default::default(), + DestinationStatus: Default::default(), + EnableKinesisStreamingConfiguration: Default::default() + } + } + } - impl AsRef - for &ParameterizedStatement { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for KinesisStreamingDestinationOutput { + fn as_ref(&self) -> &Self { + self + } + } - pub type ParameterizedStatements = Sequence>; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1955,3) + #[derive(PartialEq, Clone)] + pub enum ListBackupsInput { + ListBackupsInput { + TableName: Arc>>, + Limit: Arc>, + TimeRangeLowerBound: Arc>>, + TimeRangeUpperBound: Arc>>, + ExclusiveStartBackupArn: Arc>>, + BackupType: Arc>> + } + } - pub type PartiQLBatchRequest = Sequence>; + impl ListBackupsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TableName, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => Limit, + } + } + /// Returns a borrow of the field TimeRangeLowerBound + pub fn TimeRangeLowerBound(&self) -> &Arc>> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TimeRangeLowerBound, + } + } + /// Returns a borrow of the field TimeRangeUpperBound + pub fn TimeRangeUpperBound(&self) -> &Arc>> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => TimeRangeUpperBound, + } + } + /// Returns a borrow of the field ExclusiveStartBackupArn + pub fn ExclusiveStartBackupArn(&self) -> &Arc>> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => ExclusiveStartBackupArn, + } + } + /// Returns a borrow of the field BackupType + pub fn BackupType(&self) -> &Arc>> { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => BackupType, + } + } + } - pub type PartiQLNextToken = Sequence; + impl Debug + for ListBackupsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type PartiQLStatement = Sequence; + impl DafnyPrint + for ListBackupsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListBackupsInput.ListBackupsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TimeRangeLowerBound, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TimeRangeUpperBound, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExclusiveStartBackupArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BackupType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PointInTimeRecoveryDescription { - PointInTimeRecoveryDescription { - PointInTimeRecoveryStatus: Rc>>, - EarliestRestorableDateTime: Rc>>, - LatestRestorableDateTime: Rc>> - } - } + impl Eq + for ListBackupsInput {} + + impl Hash + for ListBackupsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListBackupsInput::ListBackupsInput{TableName, Limit, TimeRangeLowerBound, TimeRangeUpperBound, ExclusiveStartBackupArn, BackupType, } => { + Hash::hash(TableName, _state); + Hash::hash(Limit, _state); + Hash::hash(TimeRangeLowerBound, _state); + Hash::hash(TimeRangeUpperBound, _state); + Hash::hash(ExclusiveStartBackupArn, _state); + Hash::hash(BackupType, _state) + }, + } + } + } - impl PointInTimeRecoveryDescription { - pub fn PointInTimeRecoveryStatus(&self) -> &Rc>> { - match self { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => PointInTimeRecoveryStatus, - } - } - pub fn EarliestRestorableDateTime(&self) -> &Rc>> { - match self { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => EarliestRestorableDateTime, - } - } - pub fn LatestRestorableDateTime(&self) -> &Rc>> { - match self { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => LatestRestorableDateTime, - } - } - } + impl Default + for ListBackupsInput { + fn default() -> ListBackupsInput { + ListBackupsInput::ListBackupsInput { + TableName: Default::default(), + Limit: Default::default(), + TimeRangeLowerBound: Default::default(), + TimeRangeUpperBound: Default::default(), + ExclusiveStartBackupArn: Default::default(), + BackupType: Default::default() + } + } + } - impl Debug - for PointInTimeRecoveryDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ListBackupsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for PointInTimeRecoveryDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryDescription.PointInTimeRecoveryDescription(")?; - DafnyPrint::fmt_print(PointInTimeRecoveryStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EarliestRestorableDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LatestRestorableDateTime, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1963,3) + #[derive(PartialEq, Clone)] + pub enum ListBackupsOutput { + ListBackupsOutput { + BackupSummaries: Arc>>>, + LastEvaluatedBackupArn: Arc>> + } + } - impl Eq - for PointInTimeRecoveryDescription {} + impl ListBackupsOutput { + /// Returns a borrow of the field BackupSummaries + pub fn BackupSummaries(&self) -> &Arc>>> { + match self { + ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => BackupSummaries, + } + } + /// Returns a borrow of the field LastEvaluatedBackupArn + pub fn LastEvaluatedBackupArn(&self) -> &Arc>> { + match self { + ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => LastEvaluatedBackupArn, + } + } + } - impl Hash - for PointInTimeRecoveryDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => { - Hash::hash(PointInTimeRecoveryStatus, _state); - Hash::hash(EarliestRestorableDateTime, _state); - Hash::hash(LatestRestorableDateTime, _state) - }, - } - } - } + impl Debug + for ListBackupsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for PointInTimeRecoveryDescription { - fn default() -> PointInTimeRecoveryDescription { - PointInTimeRecoveryDescription::PointInTimeRecoveryDescription { - PointInTimeRecoveryStatus: Default::default(), - EarliestRestorableDateTime: Default::default(), - LatestRestorableDateTime: Default::default() - } - } - } + impl DafnyPrint + for ListBackupsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListBackupsOutput.ListBackupsOutput(")?; + DafnyPrint::fmt_print(BackupSummaries, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastEvaluatedBackupArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &PointInTimeRecoveryDescription { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ListBackupsOutput {} + + impl Hash + for ListBackupsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListBackupsOutput::ListBackupsOutput{BackupSummaries, LastEvaluatedBackupArn, } => { + Hash::hash(BackupSummaries, _state); + Hash::hash(LastEvaluatedBackupArn, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PointInTimeRecoverySpecification { - PointInTimeRecoverySpecification { - PointInTimeRecoveryEnabled: bool - } - } + impl Default + for ListBackupsOutput { + fn default() -> ListBackupsOutput { + ListBackupsOutput::ListBackupsOutput { + BackupSummaries: Default::default(), + LastEvaluatedBackupArn: Default::default() + } + } + } - impl PointInTimeRecoverySpecification { - pub fn PointInTimeRecoveryEnabled(&self) -> &bool { - match self { - PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => PointInTimeRecoveryEnabled, - } - } - } + impl AsRef + for ListBackupsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for PointInTimeRecoverySpecification { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1967,3) + #[derive(PartialEq, Clone)] + pub enum ListContributorInsightsInput { + ListContributorInsightsInput { + TableName: Arc>>, + NextToken: Arc>>, + MaxResults: Arc> + } + } - impl DafnyPrint - for PointInTimeRecoverySpecification { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoverySpecification.PointInTimeRecoverySpecification(")?; - DafnyPrint::fmt_print(PointInTimeRecoveryEnabled, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ListContributorInsightsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => TableName, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => NextToken, + } + } + /// Returns a borrow of the field MaxResults + pub fn MaxResults(&self) -> &Arc> { + match self { + ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => MaxResults, + } + } + } - impl Eq - for PointInTimeRecoverySpecification {} + impl Debug + for ListContributorInsightsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for PointInTimeRecoverySpecification { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => { - Hash::hash(PointInTimeRecoveryEnabled, _state) - }, - } - } - } + impl DafnyPrint + for ListContributorInsightsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListContributorInsightsInput.ListContributorInsightsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MaxResults, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for PointInTimeRecoverySpecification { - fn default() -> PointInTimeRecoverySpecification { - PointInTimeRecoverySpecification::PointInTimeRecoverySpecification { - PointInTimeRecoveryEnabled: Default::default() - } - } - } + impl Eq + for ListContributorInsightsInput {} + + impl Hash + for ListContributorInsightsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListContributorInsightsInput::ListContributorInsightsInput{TableName, NextToken, MaxResults, } => { + Hash::hash(TableName, _state); + Hash::hash(NextToken, _state); + Hash::hash(MaxResults, _state) + }, + } + } + } - impl AsRef - for &PointInTimeRecoverySpecification { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for ListContributorInsightsInput { + fn default() -> ListContributorInsightsInput { + ListContributorInsightsInput::ListContributorInsightsInput { + TableName: Default::default(), + NextToken: Default::default(), + MaxResults: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum PointInTimeRecoveryStatus { - ENABLED {}, - DISABLED {} - } + impl AsRef + for ListContributorInsightsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl PointInTimeRecoveryStatus {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1972,3) + pub type ListContributorInsightsLimit = i32; - impl Debug - for PointInTimeRecoveryStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1976,3) + #[derive(PartialEq, Clone)] + pub enum ListContributorInsightsOutput { + ListContributorInsightsOutput { + ContributorInsightsSummaries: Arc>>>, + NextToken: Arc>> + } + } - impl DafnyPrint - for PointInTimeRecoveryStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PointInTimeRecoveryStatus::ENABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryStatus.ENABLED")?; - Ok(()) - }, - PointInTimeRecoveryStatus::DISABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryStatus.DISABLED")?; - Ok(()) - }, - } - } - } + impl ListContributorInsightsOutput { + /// Returns a borrow of the field ContributorInsightsSummaries + pub fn ContributorInsightsSummaries(&self) -> &Arc>>> { + match self { + ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => ContributorInsightsSummaries, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => NextToken, + } + } + } - impl PointInTimeRecoveryStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(PointInTimeRecoveryStatus::ENABLED {}), Rc::new(PointInTimeRecoveryStatus::DISABLED {})].iter() - } - } + impl Debug + for ListContributorInsightsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for PointInTimeRecoveryStatus {} + impl DafnyPrint + for ListContributorInsightsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListContributorInsightsOutput.ListContributorInsightsOutput(")?; + DafnyPrint::fmt_print(ContributorInsightsSummaries, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for PointInTimeRecoveryStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PointInTimeRecoveryStatus::ENABLED{} => { + impl Eq + for ListContributorInsightsOutput {} + + impl Hash + for ListContributorInsightsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListContributorInsightsOutput::ListContributorInsightsOutput{ContributorInsightsSummaries, NextToken, } => { + Hash::hash(ContributorInsightsSummaries, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - }, - PointInTimeRecoveryStatus::DISABLED{} => { + impl Default + for ListContributorInsightsOutput { + fn default() -> ListContributorInsightsOutput { + ListContributorInsightsOutput::ListContributorInsightsOutput { + ContributorInsightsSummaries: Default::default(), + NextToken: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for ListContributorInsightsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for PointInTimeRecoveryStatus { - fn default() -> PointInTimeRecoveryStatus { - PointInTimeRecoveryStatus::ENABLED {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1980,3) + #[derive(PartialEq, Clone)] + pub enum ListExportsInput { + ListExportsInput { + TableArn: Arc>>, + MaxResults: Arc>, + NextToken: Arc>> + } + } - impl AsRef - for &PointInTimeRecoveryStatus { - fn as_ref(&self) -> Self { - self - } - } + impl ListExportsInput { + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => TableArn, + } + } + /// Returns a borrow of the field MaxResults + pub fn MaxResults(&self) -> &Arc> { + match self { + ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => MaxResults, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => NextToken, + } + } + } - pub type PolicyRevisionId = Sequence; + impl Debug + for ListExportsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type PositiveIntegerObject = i32; + impl DafnyPrint + for ListExportsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListExportsInput.ListExportsInput(")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MaxResults, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type PositiveLongObject = i64; + impl Eq + for ListExportsInput {} + + impl Hash + for ListExportsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListExportsInput::ListExportsInput{TableArn, MaxResults, NextToken, } => { + Hash::hash(TableArn, _state); + Hash::hash(MaxResults, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - pub type PreparedStatementParameters = Sequence>; + impl Default + for ListExportsInput { + fn default() -> ListExportsInput { + ListExportsInput::ListExportsInput { + TableArn: Default::default(), + MaxResults: Default::default(), + NextToken: Default::default() + } + } + } - pub type ProcessedItemCount = i64; + impl AsRef + for ListExportsInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum Projection { - Projection { - ProjectionType: Rc>>, - NonKeyAttributes: Rc> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1985,3) + pub type ListExportsMaxLimit = i32; - impl Projection { - pub fn ProjectionType(&self) -> &Rc>> { - match self { - Projection::Projection{ProjectionType, NonKeyAttributes, } => ProjectionType, - } - } - pub fn NonKeyAttributes(&self) -> &Rc> { - match self { - Projection::Projection{ProjectionType, NonKeyAttributes, } => NonKeyAttributes, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1989,3) + #[derive(PartialEq, Clone)] + pub enum ListExportsOutput { + ListExportsOutput { + ExportSummaries: Arc>>>, + NextToken: Arc>> + } + } - impl Debug - for Projection { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ListExportsOutput { + /// Returns a borrow of the field ExportSummaries + pub fn ExportSummaries(&self) -> &Arc>>> { + match self { + ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => ExportSummaries, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => NextToken, + } + } + } - impl DafnyPrint - for Projection { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Projection::Projection{ProjectionType, NonKeyAttributes, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Projection.Projection(")?; - DafnyPrint::fmt_print(ProjectionType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NonKeyAttributes, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ListExportsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for Projection {} + impl DafnyPrint + for ListExportsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListExportsOutput.ListExportsOutput(")?; + DafnyPrint::fmt_print(ExportSummaries, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for Projection { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Projection::Projection{ProjectionType, NonKeyAttributes, } => { - Hash::hash(ProjectionType, _state); - Hash::hash(NonKeyAttributes, _state) - }, - } - } - } + impl Eq + for ListExportsOutput {} + + impl Hash + for ListExportsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListExportsOutput::ListExportsOutput{ExportSummaries, NextToken, } => { + Hash::hash(ExportSummaries, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - impl Default - for Projection { - fn default() -> Projection { - Projection::Projection { - ProjectionType: Default::default(), - NonKeyAttributes: Default::default() - } - } - } + impl Default + for ListExportsOutput { + fn default() -> ListExportsOutput { + ListExportsOutput::ListExportsOutput { + ExportSummaries: Default::default(), + NextToken: Default::default() + } + } + } - impl AsRef - for &Projection { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for ListExportsOutput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ProjectionType { - ALL {}, - KEYS_ONLY {}, - INCLUDE {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1993,3) + #[derive(PartialEq, Clone)] + pub enum ListGlobalTablesInput { + ListGlobalTablesInput { + ExclusiveStartGlobalTableName: Arc>>, + Limit: Arc>, + RegionName: Arc>> + } + } - impl ProjectionType {} + impl ListGlobalTablesInput { + /// Returns a borrow of the field ExclusiveStartGlobalTableName + pub fn ExclusiveStartGlobalTableName(&self) -> &Arc>> { + match self { + ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => ExclusiveStartGlobalTableName, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => Limit, + } + } + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Arc>> { + match self { + ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => RegionName, + } + } + } - impl Debug - for ProjectionType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ListGlobalTablesInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ProjectionType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ProjectionType::ALL{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.ALL")?; - Ok(()) - }, - ProjectionType::KEYS_ONLY{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.KEYS__ONLY")?; - Ok(()) - }, - ProjectionType::INCLUDE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.INCLUDE")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ListGlobalTablesInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListGlobalTablesInput.ListGlobalTablesInput(")?; + DafnyPrint::fmt_print(ExclusiveStartGlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ProjectionType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ProjectionType::ALL {}), Rc::new(ProjectionType::KEYS_ONLY {}), Rc::new(ProjectionType::INCLUDE {})].iter() - } - } + impl Eq + for ListGlobalTablesInput {} + + impl Hash + for ListGlobalTablesInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListGlobalTablesInput::ListGlobalTablesInput{ExclusiveStartGlobalTableName, Limit, RegionName, } => { + Hash::hash(ExclusiveStartGlobalTableName, _state); + Hash::hash(Limit, _state); + Hash::hash(RegionName, _state) + }, + } + } + } - impl Eq - for ProjectionType {} + impl Default + for ListGlobalTablesInput { + fn default() -> ListGlobalTablesInput { + ListGlobalTablesInput::ListGlobalTablesInput { + ExclusiveStartGlobalTableName: Default::default(), + Limit: Default::default(), + RegionName: Default::default() + } + } + } - impl Hash - for ProjectionType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ProjectionType::ALL{} => { + impl AsRef + for ListGlobalTablesInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - ProjectionType::KEYS_ONLY{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(1998,3) + #[derive(PartialEq, Clone)] + pub enum ListGlobalTablesOutput { + ListGlobalTablesOutput { + GlobalTables: Arc>>>, + LastEvaluatedGlobalTableName: Arc>> + } + } - }, - ProjectionType::INCLUDE{} => { + impl ListGlobalTablesOutput { + /// Returns a borrow of the field GlobalTables + pub fn GlobalTables(&self) -> &Arc>>> { + match self { + ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => GlobalTables, + } + } + /// Returns a borrow of the field LastEvaluatedGlobalTableName + pub fn LastEvaluatedGlobalTableName(&self) -> &Arc>> { + match self { + ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => LastEvaluatedGlobalTableName, + } + } + } - }, - } - } - } + impl Debug + for ListGlobalTablesOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ProjectionType { - fn default() -> ProjectionType { - ProjectionType::ALL {} - } - } + impl DafnyPrint + for ListGlobalTablesOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListGlobalTablesOutput.ListGlobalTablesOutput(")?; + DafnyPrint::fmt_print(GlobalTables, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastEvaluatedGlobalTableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ProjectionType { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ListGlobalTablesOutput {} + + impl Hash + for ListGlobalTablesOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListGlobalTablesOutput::ListGlobalTablesOutput{GlobalTables, LastEvaluatedGlobalTableName, } => { + Hash::hash(GlobalTables, _state); + Hash::hash(LastEvaluatedGlobalTableName, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ProvisionedThroughput { - ProvisionedThroughput { - ReadCapacityUnits: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject, - WriteCapacityUnits: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject - } - } + impl Default + for ListGlobalTablesOutput { + fn default() -> ListGlobalTablesOutput { + ListGlobalTablesOutput::ListGlobalTablesOutput { + GlobalTables: Default::default(), + LastEvaluatedGlobalTableName: Default::default() + } + } + } - impl ProvisionedThroughput { - pub fn ReadCapacityUnits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject { - match self { - ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => ReadCapacityUnits, - } - } - pub fn WriteCapacityUnits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject { - match self { - ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => WriteCapacityUnits, - } - } - } + impl AsRef + for ListGlobalTablesOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ProvisionedThroughput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2002,3) + #[derive(PartialEq, Clone)] + pub enum ListImportsInput { + ListImportsInput { + TableArn: Arc>>, + PageSize: Arc>, + NextToken: Arc>> + } + } - impl DafnyPrint - for ProvisionedThroughput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughput.ProvisionedThroughput(")?; - DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ListImportsInput { + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => TableArn, + } + } + /// Returns a borrow of the field PageSize + pub fn PageSize(&self) -> &Arc> { + match self { + ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => PageSize, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => NextToken, + } + } + } - impl Eq - for ProvisionedThroughput {} + impl Debug + for ListImportsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ProvisionedThroughput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => { - Hash::hash(ReadCapacityUnits, _state); - Hash::hash(WriteCapacityUnits, _state) - }, - } - } - } - - impl Default - for ProvisionedThroughput { - fn default() -> ProvisionedThroughput { - ProvisionedThroughput::ProvisionedThroughput { - ReadCapacityUnits: Default::default(), - WriteCapacityUnits: Default::default() - } - } - } - - impl AsRef - for &ProvisionedThroughput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ProvisionedThroughputDescription { - ProvisionedThroughputDescription { - LastIncreaseDateTime: Rc>>, - LastDecreaseDateTime: Rc>>, - NumberOfDecreasesToday: Rc>, - ReadCapacityUnits: Rc>, - WriteCapacityUnits: Rc> - } - } - - impl ProvisionedThroughputDescription { - pub fn LastIncreaseDateTime(&self) -> &Rc>> { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => LastIncreaseDateTime, - } - } - pub fn LastDecreaseDateTime(&self) -> &Rc>> { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => LastDecreaseDateTime, - } - } - pub fn NumberOfDecreasesToday(&self) -> &Rc> { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => NumberOfDecreasesToday, - } - } - pub fn ReadCapacityUnits(&self) -> &Rc> { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => ReadCapacityUnits, - } - } - pub fn WriteCapacityUnits(&self) -> &Rc> { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => WriteCapacityUnits, - } - } - } - - impl Debug - for ProvisionedThroughputDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ListImportsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListImportsInput.ListImportsInput(")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PageSize, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ProvisionedThroughputDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughputDescription.ProvisionedThroughputDescription(")?; - DafnyPrint::fmt_print(LastIncreaseDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastDecreaseDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NumberOfDecreasesToday, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ListImportsInput {} + + impl Hash + for ListImportsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListImportsInput::ListImportsInput{TableArn, PageSize, NextToken, } => { + Hash::hash(TableArn, _state); + Hash::hash(PageSize, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - impl Eq - for ProvisionedThroughputDescription {} + impl Default + for ListImportsInput { + fn default() -> ListImportsInput { + ListImportsInput::ListImportsInput { + TableArn: Default::default(), + PageSize: Default::default(), + NextToken: Default::default() + } + } + } - impl Hash - for ProvisionedThroughputDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => { - Hash::hash(LastIncreaseDateTime, _state); - Hash::hash(LastDecreaseDateTime, _state); - Hash::hash(NumberOfDecreasesToday, _state); - Hash::hash(ReadCapacityUnits, _state); - Hash::hash(WriteCapacityUnits, _state) - }, - } - } - } + impl AsRef + for ListImportsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ProvisionedThroughputDescription { - fn default() -> ProvisionedThroughputDescription { - ProvisionedThroughputDescription::ProvisionedThroughputDescription { - LastIncreaseDateTime: Default::default(), - LastDecreaseDateTime: Default::default(), - NumberOfDecreasesToday: Default::default(), - ReadCapacityUnits: Default::default(), - WriteCapacityUnits: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2007,3) + pub type ListImportsMaxLimit = i32; - impl AsRef - for &ProvisionedThroughputDescription { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2011,3) + #[derive(PartialEq, Clone)] + pub enum ListImportsOutput { + ListImportsOutput { + ImportSummaryList: Arc>>>, + NextToken: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum ProvisionedThroughputOverride { - ProvisionedThroughputOverride { - ReadCapacityUnits: Rc> - } - } + impl ListImportsOutput { + /// Returns a borrow of the field ImportSummaryList + pub fn ImportSummaryList(&self) -> &Arc>>> { + match self { + ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => ImportSummaryList, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => NextToken, + } + } + } - impl ProvisionedThroughputOverride { - pub fn ReadCapacityUnits(&self) -> &Rc> { - match self { - ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => ReadCapacityUnits, - } - } - } + impl Debug + for ListImportsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for ProvisionedThroughputOverride { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ListImportsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListImportsOutput.ListImportsOutput(")?; + DafnyPrint::fmt_print(ImportSummaryList, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ProvisionedThroughputOverride { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughputOverride.ProvisionedThroughputOverride(")?; - DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ListImportsOutput {} + + impl Hash + for ListImportsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListImportsOutput::ListImportsOutput{ImportSummaryList, NextToken, } => { + Hash::hash(ImportSummaryList, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - impl Eq - for ProvisionedThroughputOverride {} + impl Default + for ListImportsOutput { + fn default() -> ListImportsOutput { + ListImportsOutput::ListImportsOutput { + ImportSummaryList: Default::default(), + NextToken: Default::default() + } + } + } - impl Hash - for ProvisionedThroughputOverride { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => { - Hash::hash(ReadCapacityUnits, _state) - }, - } - } - } - - impl Default - for ProvisionedThroughputOverride { - fn default() -> ProvisionedThroughputOverride { - ProvisionedThroughputOverride::ProvisionedThroughputOverride { - ReadCapacityUnits: Default::default() - } - } - } - - impl AsRef - for &ProvisionedThroughputOverride { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum Put { - Put { - Item: Map, Rc>, - TableName: Sequence, - ConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>>, - ReturnValuesOnConditionCheckFailure: Rc>> - } - } - - impl Put { - pub fn Item(&self) -> &Map, Rc> { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Item, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, - } - } - pub fn ConditionExpression(&self) -> &Rc>> { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, - } - } - pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Rc>> { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, - } - } - } - - impl Debug - for Put { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ListImportsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for Put { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Put.Put(")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2015,3) + #[derive(PartialEq, Clone)] + pub enum ListTablesInput { + ListTablesInput { + ExclusiveStartTableName: Arc>>, + Limit: Arc> + } + } - impl Eq - for Put {} + impl ListTablesInput { + /// Returns a borrow of the field ExclusiveStartTableName + pub fn ExclusiveStartTableName(&self) -> &Arc>> { + match self { + ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => ExclusiveStartTableName, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => Limit, + } + } + } - impl Hash - for Put { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { - Hash::hash(Item, _state); - Hash::hash(TableName, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state); - Hash::hash(ReturnValuesOnConditionCheckFailure, _state) - }, - } - } - } - - impl Default - for Put { - fn default() -> Put { - Put::Put { - Item: Default::default(), - TableName: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default(), - ReturnValuesOnConditionCheckFailure: Default::default() - } - } - } - - impl AsRef - for &Put { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum PutItemInput { - PutItemInput { - TableName: Sequence, - Item: Map, Rc>, - Expected: Rc, Rc>>>, - ReturnValues: Rc>>, - ReturnConsumedCapacity: Rc>>, - ReturnItemCollectionMetrics: Rc>>, - ConditionalOperator: Rc>>, - ConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>> - } - } - - impl PutItemInput { - pub fn TableName(&self) -> &Sequence { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, - } - } - pub fn Item(&self) -> &Map, Rc> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Item, - } - } - pub fn Expected(&self) -> &Rc, Rc>>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, - } - } - pub fn ReturnValues(&self) -> &Rc>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, - } - } - pub fn ReturnItemCollectionMetrics(&self) -> &Rc>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, - } - } - pub fn ConditionalOperator(&self) -> &Rc>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, - } - } - pub fn ConditionExpression(&self) -> &Rc>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, - } - } - } - - impl Debug - for PutItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ListTablesInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for PutItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutItemInput.PutItemInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Expected, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ListTablesInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTablesInput.ListTablesInput(")?; + DafnyPrint::fmt_print(ExclusiveStartTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for PutItemInput {} + impl Eq + for ListTablesInput {} + + impl Hash + for ListTablesInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListTablesInput::ListTablesInput{ExclusiveStartTableName, Limit, } => { + Hash::hash(ExclusiveStartTableName, _state); + Hash::hash(Limit, _state) + }, + } + } + } - impl Hash - for PutItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - Hash::hash(TableName, _state); - Hash::hash(Item, _state); - Hash::hash(Expected, _state); - Hash::hash(ReturnValues, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ReturnItemCollectionMetrics, _state); - Hash::hash(ConditionalOperator, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state) - }, - } - } - } - - impl Default - for PutItemInput { - fn default() -> PutItemInput { - PutItemInput::PutItemInput { - TableName: Default::default(), - Item: Default::default(), - Expected: Default::default(), - ReturnValues: Default::default(), - ReturnConsumedCapacity: Default::default(), - ReturnItemCollectionMetrics: Default::default(), - ConditionalOperator: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default() - } - } - } - - impl AsRef - for &PutItemInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum PutItemOutput { - PutItemOutput { - Attributes: Rc, Rc>>>, - ConsumedCapacity: Rc>>, - ItemCollectionMetrics: Rc>> - } - } - - impl PutItemOutput { - pub fn Attributes(&self) -> &Rc, Rc>>> { - match self { - PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, - } - } - pub fn ItemCollectionMetrics(&self) -> &Rc>> { - match self { - PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, - } - } - } - - impl Debug - for PutItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ListTablesInput { + fn default() -> ListTablesInput { + ListTablesInput::ListTablesInput { + ExclusiveStartTableName: Default::default(), + Limit: Default::default() + } + } + } - impl DafnyPrint - for PutItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutItemOutput.PutItemOutput(")?; - DafnyPrint::fmt_print(Attributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ListTablesInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for PutItemOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2019,3) + pub type ListTablesInputLimit = i32; - impl Hash - for PutItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - Hash::hash(Attributes, _state); - Hash::hash(ConsumedCapacity, _state); - Hash::hash(ItemCollectionMetrics, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2023,3) + #[derive(PartialEq, Clone)] + pub enum ListTablesOutput { + ListTablesOutput { + TableNames: Arc>>>, + LastEvaluatedTableName: Arc>> + } + } - impl Default - for PutItemOutput { - fn default() -> PutItemOutput { - PutItemOutput::PutItemOutput { - Attributes: Default::default(), - ConsumedCapacity: Default::default(), - ItemCollectionMetrics: Default::default() - } - } - } + impl ListTablesOutput { + /// Returns a borrow of the field TableNames + pub fn TableNames(&self) -> &Arc>>> { + match self { + ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => TableNames, + } + } + /// Returns a borrow of the field LastEvaluatedTableName + pub fn LastEvaluatedTableName(&self) -> &Arc>> { + match self { + ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => LastEvaluatedTableName, + } + } + } - impl AsRef - for &PutItemOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for ListTablesOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum PutRequest { - PutRequest { - Item: Map, Rc> - } - } + impl DafnyPrint + for ListTablesOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTablesOutput.ListTablesOutput(")?; + DafnyPrint::fmt_print(TableNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastEvaluatedTableName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl PutRequest { - pub fn Item(&self) -> &Map, Rc> { - match self { - PutRequest::PutRequest{Item, } => Item, - } - } - } + impl Eq + for ListTablesOutput {} + + impl Hash + for ListTablesOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListTablesOutput::ListTablesOutput{TableNames, LastEvaluatedTableName, } => { + Hash::hash(TableNames, _state); + Hash::hash(LastEvaluatedTableName, _state) + }, + } + } + } - impl Debug - for PutRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ListTablesOutput { + fn default() -> ListTablesOutput { + ListTablesOutput::ListTablesOutput { + TableNames: Default::default(), + LastEvaluatedTableName: Default::default() + } + } + } - impl DafnyPrint - for PutRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutRequest::PutRequest{Item, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutRequest.PutRequest(")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ListTablesOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for PutRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2027,3) + #[derive(PartialEq, Clone)] + pub enum ListTagsOfResourceInput { + ListTagsOfResourceInput { + ResourceArn: Sequence, + NextToken: Arc>> + } + } - impl Hash - for PutRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutRequest::PutRequest{Item, } => { - Hash::hash(Item, _state) - }, - } - } - } + impl ListTagsOfResourceInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => ResourceArn, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => NextToken, + } + } + } - impl Default - for PutRequest { - fn default() -> PutRequest { - PutRequest::PutRequest { - Item: Default::default() - } - } - } + impl Debug + for ListTagsOfResourceInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &PutRequest { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for ListTagsOfResourceInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTagsOfResourceInput.ListTagsOfResourceInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PutResourcePolicyInput { - PutResourcePolicyInput { - ResourceArn: Sequence, - Policy: Sequence, - ExpectedRevisionId: Rc>>, - ConfirmRemoveSelfResourceAccess: Rc> - } - } + impl Eq + for ListTagsOfResourceInput {} + + impl Hash + for ListTagsOfResourceInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListTagsOfResourceInput::ListTagsOfResourceInput{ResourceArn, NextToken, } => { + Hash::hash(ResourceArn, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - impl PutResourcePolicyInput { - pub fn ResourceArn(&self) -> &Sequence { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ResourceArn, - } - } - pub fn Policy(&self) -> &Sequence { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => Policy, - } - } - pub fn ExpectedRevisionId(&self) -> &Rc>> { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ExpectedRevisionId, - } - } - pub fn ConfirmRemoveSelfResourceAccess(&self) -> &Rc> { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ConfirmRemoveSelfResourceAccess, - } - } - } + impl Default + for ListTagsOfResourceInput { + fn default() -> ListTagsOfResourceInput { + ListTagsOfResourceInput::ListTagsOfResourceInput { + ResourceArn: Default::default(), + NextToken: Default::default() + } + } + } - impl Debug - for PutResourcePolicyInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ListTagsOfResourceInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for PutResourcePolicyInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutResourcePolicyInput.PutResourcePolicyInput(")?; - DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpectedRevisionId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConfirmRemoveSelfResourceAccess, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2031,3) + #[derive(PartialEq, Clone)] + pub enum ListTagsOfResourceOutput { + ListTagsOfResourceOutput { + Tags: Arc>>>, + NextToken: Arc>> + } + } - impl Eq - for PutResourcePolicyInput {} + impl ListTagsOfResourceOutput { + /// Returns a borrow of the field Tags + pub fn Tags(&self) -> &Arc>>> { + match self { + ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => Tags, + } + } + /// Returns a borrow of the field NextToken + pub fn NextToken(&self) -> &Arc>> { + match self { + ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => NextToken, + } + } + } - impl Hash - for PutResourcePolicyInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => { - Hash::hash(ResourceArn, _state); - Hash::hash(Policy, _state); - Hash::hash(ExpectedRevisionId, _state); - Hash::hash(ConfirmRemoveSelfResourceAccess, _state) - }, - } - } - } + impl Debug + for ListTagsOfResourceOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for PutResourcePolicyInput { - fn default() -> PutResourcePolicyInput { - PutResourcePolicyInput::PutResourcePolicyInput { - ResourceArn: Default::default(), - Policy: Default::default(), - ExpectedRevisionId: Default::default(), - ConfirmRemoveSelfResourceAccess: Default::default() - } - } - } + impl DafnyPrint + for ListTagsOfResourceOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ListTagsOfResourceOutput.ListTagsOfResourceOutput(")?; + DafnyPrint::fmt_print(Tags, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &PutResourcePolicyInput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ListTagsOfResourceOutput {} + + impl Hash + for ListTagsOfResourceOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ListTagsOfResourceOutput::ListTagsOfResourceOutput{Tags, NextToken, } => { + Hash::hash(Tags, _state); + Hash::hash(NextToken, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PutResourcePolicyOutput { - PutResourcePolicyOutput { - RevisionId: Rc>> - } - } + impl Default + for ListTagsOfResourceOutput { + fn default() -> ListTagsOfResourceOutput { + ListTagsOfResourceOutput::ListTagsOfResourceOutput { + Tags: Default::default(), + NextToken: Default::default() + } + } + } - impl PutResourcePolicyOutput { - pub fn RevisionId(&self) -> &Rc>> { - match self { - PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => RevisionId, - } - } - } + impl AsRef + for ListTagsOfResourceOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for PutResourcePolicyOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2035,3) + #[derive(PartialEq, Clone)] + pub enum LocalSecondaryIndex { + LocalSecondaryIndex { + IndexName: Sequence, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + Projection: Arc + } + } - impl DafnyPrint - for PutResourcePolicyOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutResourcePolicyOutput.PutResourcePolicyOutput(")?; - DafnyPrint::fmt_print(RevisionId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl LocalSecondaryIndex { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc { + match self { + LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => Projection, + } + } + } - impl Eq - for PutResourcePolicyOutput {} + impl Debug + for LocalSecondaryIndex { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for PutResourcePolicyOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => { - Hash::hash(RevisionId, _state) - }, - } - } - } - - impl Default - for PutResourcePolicyOutput { - fn default() -> PutResourcePolicyOutput { - PutResourcePolicyOutput::PutResourcePolicyOutput { - RevisionId: Default::default() - } - } - } - - impl AsRef - for &PutResourcePolicyOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum QueryInput { - QueryInput { - TableName: Sequence, - IndexName: Rc>>, - Select: Rc>>, - AttributesToGet: Rc>, - Limit: Rc>, - ConsistentRead: Rc>, - KeyConditions: Rc, Rc>>>, - QueryFilter: Rc, Rc>>>, - ConditionalOperator: Rc>>, - ScanIndexForward: Rc>, - ExclusiveStartKey: Rc, Rc>>>, - ReturnConsumedCapacity: Rc>>, - ProjectionExpression: Rc>>, - FilterExpression: Rc>>, - KeyConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>> - } - } - - impl QueryInput { - pub fn TableName(&self) -> &Sequence { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, - } - } - pub fn IndexName(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => IndexName, - } - } - pub fn Select(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Select, - } - } - pub fn AttributesToGet(&self) -> &Rc> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => AttributesToGet, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Limit, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConsistentRead, - } - } - pub fn KeyConditions(&self) -> &Rc, Rc>>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => KeyConditions, - } - } - pub fn QueryFilter(&self) -> &Rc, Rc>>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => QueryFilter, - } - } - pub fn ConditionalOperator(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, - } - } - pub fn ScanIndexForward(&self) -> &Rc> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ScanIndexForward, - } - } - pub fn ExclusiveStartKey(&self) -> &Rc, Rc>>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExclusiveStartKey, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, - } - } - pub fn ProjectionExpression(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ProjectionExpression, - } - } - pub fn FilterExpression(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => FilterExpression, - } - } - pub fn KeyConditionExpression(&self) -> &Rc>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => KeyConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, - } - } - } - - impl Debug - for QueryInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for LocalSecondaryIndex { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndex.LocalSecondaryIndex(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for QueryInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.QueryInput.QueryInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Select, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyConditions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(QueryFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScanIndexForward, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExclusiveStartKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FilterExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for LocalSecondaryIndex {} + + impl Hash + for LocalSecondaryIndex { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + LocalSecondaryIndex::LocalSecondaryIndex{IndexName, KeySchema, Projection, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state) + }, + } + } + } - impl Eq - for QueryInput {} + impl Default + for LocalSecondaryIndex { + fn default() -> LocalSecondaryIndex { + LocalSecondaryIndex::LocalSecondaryIndex { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default() + } + } + } - impl Hash - for QueryInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - Hash::hash(TableName, _state); - Hash::hash(IndexName, _state); - Hash::hash(Select, _state); - Hash::hash(AttributesToGet, _state); - Hash::hash(Limit, _state); - Hash::hash(ConsistentRead, _state); - Hash::hash(KeyConditions, _state); - Hash::hash(QueryFilter, _state); - Hash::hash(ConditionalOperator, _state); - Hash::hash(ScanIndexForward, _state); - Hash::hash(ExclusiveStartKey, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ProjectionExpression, _state); - Hash::hash(FilterExpression, _state); - Hash::hash(KeyConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state) - }, - } - } - } - - impl Default - for QueryInput { - fn default() -> QueryInput { - QueryInput::QueryInput { - TableName: Default::default(), - IndexName: Default::default(), - Select: Default::default(), - AttributesToGet: Default::default(), - Limit: Default::default(), - ConsistentRead: Default::default(), - KeyConditions: Default::default(), - QueryFilter: Default::default(), - ConditionalOperator: Default::default(), - ScanIndexForward: Default::default(), - ExclusiveStartKey: Default::default(), - ReturnConsumedCapacity: Default::default(), - ProjectionExpression: Default::default(), - FilterExpression: Default::default(), - KeyConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default() - } - } - } - - impl AsRef - for &QueryInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum QueryOutput { - QueryOutput { - Items: Rc, Rc>>>>, - Count: Rc>, - ScannedCount: Rc>, - LastEvaluatedKey: Rc, Rc>>>, - ConsumedCapacity: Rc>> - } - } - - impl QueryOutput { - pub fn Items(&self) -> &Rc, Rc>>>> { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Items, - } - } - pub fn Count(&self) -> &Rc> { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Count, - } - } - pub fn ScannedCount(&self) -> &Rc> { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ScannedCount, - } - } - pub fn LastEvaluatedKey(&self) -> &Rc, Rc>>> { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => LastEvaluatedKey, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ConsumedCapacity, - } - } - } - - impl Debug - for QueryOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for LocalSecondaryIndex { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for QueryOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.QueryOutput.QueryOutput(")?; - DafnyPrint::fmt_print(Items, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Count, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScannedCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2040,3) + #[derive(PartialEq, Clone)] + pub enum LocalSecondaryIndexDescription { + LocalSecondaryIndexDescription { + IndexName: Arc>>, + KeySchema: Arc>, + Projection: Arc>>, + IndexSizeBytes: Arc>, + ItemCount: Arc>, + IndexArn: Arc>> + } + } - impl Eq - for QueryOutput {} + impl LocalSecondaryIndexDescription { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &Arc> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc>> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => Projection, + } + } + /// Returns a borrow of the field IndexSizeBytes + pub fn IndexSizeBytes(&self) -> &Arc> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexSizeBytes, + } + } + /// Returns a borrow of the field ItemCount + pub fn ItemCount(&self) -> &Arc> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => ItemCount, + } + } + /// Returns a borrow of the field IndexArn + pub fn IndexArn(&self) -> &Arc>> { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => IndexArn, + } + } + } - impl Hash - for QueryOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { - Hash::hash(Items, _state); - Hash::hash(Count, _state); - Hash::hash(ScannedCount, _state); - Hash::hash(LastEvaluatedKey, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + impl Debug + for LocalSecondaryIndexDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for QueryOutput { - fn default() -> QueryOutput { - QueryOutput::QueryOutput { - Items: Default::default(), - Count: Default::default(), - ScannedCount: Default::default(), - LastEvaluatedKey: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + impl DafnyPrint + for LocalSecondaryIndexDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndexDescription.LocalSecondaryIndexDescription(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &QueryOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for LocalSecondaryIndexDescription {} + + impl Hash + for LocalSecondaryIndexDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription{IndexName, KeySchema, Projection, IndexSizeBytes, ItemCount, IndexArn, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state); + Hash::hash(IndexSizeBytes, _state); + Hash::hash(ItemCount, _state); + Hash::hash(IndexArn, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum Replica { - Replica { - RegionName: Rc>> - } - } + impl Default + for LocalSecondaryIndexDescription { + fn default() -> LocalSecondaryIndexDescription { + LocalSecondaryIndexDescription::LocalSecondaryIndexDescription { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default(), + IndexSizeBytes: Default::default(), + ItemCount: Default::default(), + IndexArn: Default::default() + } + } + } - impl Replica { - pub fn RegionName(&self) -> &Rc>> { - match self { - Replica::Replica{RegionName, } => RegionName, - } - } - } + impl AsRef + for LocalSecondaryIndexDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for Replica { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2050,3) + #[derive(PartialEq, Clone)] + pub enum LocalSecondaryIndexInfo { + LocalSecondaryIndexInfo { + IndexName: Arc>>, + KeySchema: Arc>, + Projection: Arc>> + } + } - impl DafnyPrint - for Replica { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Replica::Replica{RegionName, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Replica.Replica(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl LocalSecondaryIndexInfo { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => IndexName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &Arc> { + match self { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => KeySchema, + } + } + /// Returns a borrow of the field Projection + pub fn Projection(&self) -> &Arc>> { + match self { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => Projection, + } + } + } - impl Eq - for Replica {} + impl Debug + for LocalSecondaryIndexInfo { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for Replica { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Replica::Replica{RegionName, } => { - Hash::hash(RegionName, _state) - }, - } - } - } - - impl Default - for Replica { - fn default() -> Replica { - Replica::Replica { - RegionName: Default::default() - } - } - } - - impl AsRef - for &Replica { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaAutoScalingDescription { - ReplicaAutoScalingDescription { - RegionName: Rc>>, - GlobalSecondaryIndexes: Rc>>>, - ReplicaProvisionedReadCapacityAutoScalingSettings: Rc>>, - ReplicaProvisionedWriteCapacityAutoScalingSettings: Rc>>, - ReplicaStatus: Rc>> - } - } - - impl ReplicaAutoScalingDescription { - pub fn RegionName(&self) -> &Rc>> { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => RegionName, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc>>> { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => GlobalSecondaryIndexes, - } - } - pub fn ReplicaProvisionedReadCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaProvisionedReadCapacityAutoScalingSettings, - } - } - pub fn ReplicaProvisionedWriteCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaProvisionedWriteCapacityAutoScalingSettings, - } - } - pub fn ReplicaStatus(&self) -> &Rc>> { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaStatus, - } - } - } - - impl Debug - for ReplicaAutoScalingDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for LocalSecondaryIndexInfo { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.LocalSecondaryIndexInfo.LocalSecondaryIndexInfo(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Projection, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ReplicaAutoScalingDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaAutoScalingDescription.ReplicaAutoScalingDescription(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedWriteCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaStatus, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for LocalSecondaryIndexInfo {} + + impl Hash + for LocalSecondaryIndexInfo { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo{IndexName, KeySchema, Projection, } => { + Hash::hash(IndexName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(Projection, _state) + }, + } + } + } - impl Eq - for ReplicaAutoScalingDescription {} + impl Default + for LocalSecondaryIndexInfo { + fn default() -> LocalSecondaryIndexInfo { + LocalSecondaryIndexInfo::LocalSecondaryIndexInfo { + IndexName: Default::default(), + KeySchema: Default::default(), + Projection: Default::default() + } + } + } - impl Hash - for ReplicaAutoScalingDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => { - Hash::hash(RegionName, _state); - Hash::hash(GlobalSecondaryIndexes, _state); - Hash::hash(ReplicaProvisionedReadCapacityAutoScalingSettings, _state); - Hash::hash(ReplicaProvisionedWriteCapacityAutoScalingSettings, _state); - Hash::hash(ReplicaStatus, _state) - }, - } - } - } - - impl Default - for ReplicaAutoScalingDescription { - fn default() -> ReplicaAutoScalingDescription { - ReplicaAutoScalingDescription::ReplicaAutoScalingDescription { - RegionName: Default::default(), - GlobalSecondaryIndexes: Default::default(), - ReplicaProvisionedReadCapacityAutoScalingSettings: Default::default(), - ReplicaProvisionedWriteCapacityAutoScalingSettings: Default::default(), - ReplicaStatus: Default::default() - } - } - } - - impl AsRef - for &ReplicaAutoScalingDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaAutoScalingUpdate { - ReplicaAutoScalingUpdate { - RegionName: Sequence, - ReplicaGlobalSecondaryIndexUpdates: Rc>>>, - ReplicaProvisionedReadCapacityAutoScalingUpdate: Rc>> - } - } - - impl ReplicaAutoScalingUpdate { - pub fn RegionName(&self) -> &Sequence { - match self { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => RegionName, - } - } - pub fn ReplicaGlobalSecondaryIndexUpdates(&self) -> &Rc>>> { - match self { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => ReplicaGlobalSecondaryIndexUpdates, - } - } - pub fn ReplicaProvisionedReadCapacityAutoScalingUpdate(&self) -> &Rc>> { - match self { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => ReplicaProvisionedReadCapacityAutoScalingUpdate, - } - } - } - - impl Debug - for ReplicaAutoScalingUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for LocalSecondaryIndexInfo { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ReplicaAutoScalingUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaAutoScalingUpdate.ReplicaAutoScalingUpdate(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaGlobalSecondaryIndexUpdates, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2060,3) + pub type NonKeyAttributeName = Sequence; - impl Eq - for ReplicaAutoScalingUpdate {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2064,3) + pub type NonKeyAttributeNameList = Sequence>; - impl Hash - for ReplicaAutoScalingUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => { - Hash::hash(RegionName, _state); - Hash::hash(ReplicaGlobalSecondaryIndexUpdates, _state); - Hash::hash(ReplicaProvisionedReadCapacityAutoScalingUpdate, _state) - }, - } - } - } - - impl Default - for ReplicaAutoScalingUpdate { - fn default() -> ReplicaAutoScalingUpdate { - ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate { - RegionName: Default::default(), - ReplicaGlobalSecondaryIndexUpdates: Default::default(), - ReplicaProvisionedReadCapacityAutoScalingUpdate: Default::default() - } - } - } - - impl AsRef - for &ReplicaAutoScalingUpdate { - fn as_ref(&self) -> Self { - self - } - } - - pub type ReplicaAutoScalingUpdateList = Sequence>; - - #[derive(PartialEq, Clone)] - pub enum ReplicaDescription { - ReplicaDescription { - RegionName: Rc>>, - ReplicaStatus: Rc>>, - ReplicaStatusDescription: Rc>>, - ReplicaStatusPercentProgress: Rc>>, - KMSMasterKeyId: Rc>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>>, - GlobalSecondaryIndexes: Rc>>>, - ReplicaInaccessibleDateTime: Rc>>, - ReplicaTableClassSummary: Rc>> - } - } - - impl ReplicaDescription { - pub fn RegionName(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => RegionName, - } - } - pub fn ReplicaStatus(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatus, - } - } - pub fn ReplicaStatusDescription(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatusDescription, - } - } - pub fn ReplicaStatusPercentProgress(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatusPercentProgress, - } - } - pub fn KMSMasterKeyId(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => KMSMasterKeyId, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => OnDemandThroughputOverride, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc>>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => GlobalSecondaryIndexes, - } - } - pub fn ReplicaInaccessibleDateTime(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaInaccessibleDateTime, - } - } - pub fn ReplicaTableClassSummary(&self) -> &Rc>> { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaTableClassSummary, - } - } - } - - impl Debug - for ReplicaDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2068,3) + pub type NonNegativeLongObject = i64; - impl DafnyPrint - for ReplicaDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaDescription.ReplicaDescription(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaStatusDescription, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaStatusPercentProgress, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaInaccessibleDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaTableClassSummary, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2075,3) + #[derive(PartialEq, Clone)] + pub enum OnDemandThroughput { + OnDemandThroughput { + MaxReadRequestUnits: Arc>, + MaxWriteRequestUnits: Arc> + } + } - impl Eq - for ReplicaDescription {} + impl OnDemandThroughput { + /// Returns a borrow of the field MaxReadRequestUnits + pub fn MaxReadRequestUnits(&self) -> &Arc> { + match self { + OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => MaxReadRequestUnits, + } + } + /// Returns a borrow of the field MaxWriteRequestUnits + pub fn MaxWriteRequestUnits(&self) -> &Arc> { + match self { + OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => MaxWriteRequestUnits, + } + } + } - impl Hash - for ReplicaDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => { - Hash::hash(RegionName, _state); - Hash::hash(ReplicaStatus, _state); - Hash::hash(ReplicaStatusDescription, _state); - Hash::hash(ReplicaStatusPercentProgress, _state); - Hash::hash(KMSMasterKeyId, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state); - Hash::hash(GlobalSecondaryIndexes, _state); - Hash::hash(ReplicaInaccessibleDateTime, _state); - Hash::hash(ReplicaTableClassSummary, _state) - }, - } - } - } - - impl Default - for ReplicaDescription { - fn default() -> ReplicaDescription { - ReplicaDescription::ReplicaDescription { - RegionName: Default::default(), - ReplicaStatus: Default::default(), - ReplicaStatusDescription: Default::default(), - ReplicaStatusPercentProgress: Default::default(), - KMSMasterKeyId: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default(), - GlobalSecondaryIndexes: Default::default(), - ReplicaInaccessibleDateTime: Default::default(), - ReplicaTableClassSummary: Default::default() - } - } - } - - impl AsRef - for &ReplicaDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndex { - ReplicaGlobalSecondaryIndex { - IndexName: Sequence, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>> - } - } - - impl ReplicaGlobalSecondaryIndex { - pub fn IndexName(&self) -> &Sequence { - match self { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => IndexName, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => OnDemandThroughputOverride, - } - } - } - - impl Debug - for ReplicaGlobalSecondaryIndex { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for OnDemandThroughput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ReplicaGlobalSecondaryIndex { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndex.ReplicaGlobalSecondaryIndex(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for OnDemandThroughput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.OnDemandThroughput.OnDemandThroughput(")?; + DafnyPrint::fmt_print(MaxReadRequestUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MaxWriteRequestUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ReplicaGlobalSecondaryIndex {} + impl Eq + for OnDemandThroughput {} + + impl Hash + for OnDemandThroughput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnDemandThroughput::OnDemandThroughput{MaxReadRequestUnits, MaxWriteRequestUnits, } => { + Hash::hash(MaxReadRequestUnits, _state); + Hash::hash(MaxWriteRequestUnits, _state) + }, + } + } + } - impl Hash - for ReplicaGlobalSecondaryIndex { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state) - }, - } - } - } - - impl Default - for ReplicaGlobalSecondaryIndex { - fn default() -> ReplicaGlobalSecondaryIndex { - ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex { - IndexName: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default() - } - } - } - - impl AsRef - for &ReplicaGlobalSecondaryIndex { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndexAutoScalingDescription { - ReplicaGlobalSecondaryIndexAutoScalingDescription { - IndexName: Rc>>, - IndexStatus: Rc>>, - ProvisionedReadCapacityAutoScalingSettings: Rc>>, - ProvisionedWriteCapacityAutoScalingSettings: Rc>> - } - } - - impl ReplicaGlobalSecondaryIndexAutoScalingDescription { - pub fn IndexName(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => IndexName, - } - } - pub fn IndexStatus(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => IndexStatus, - } - } - pub fn ProvisionedReadCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedReadCapacityAutoScalingSettings, - } - } - pub fn ProvisionedWriteCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedWriteCapacityAutoScalingSettings, - } - } - } - - impl Debug - for ReplicaGlobalSecondaryIndexAutoScalingDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for OnDemandThroughput { + fn default() -> OnDemandThroughput { + OnDemandThroughput::OnDemandThroughput { + MaxReadRequestUnits: Default::default(), + MaxWriteRequestUnits: Default::default() + } + } + } - impl DafnyPrint - for ReplicaGlobalSecondaryIndexAutoScalingDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndexAutoScalingDescription.ReplicaGlobalSecondaryIndexAutoScalingDescription(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for OnDemandThroughput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ReplicaGlobalSecondaryIndexAutoScalingDescription {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2079,3) + #[derive(PartialEq, Clone)] + pub enum OnDemandThroughputOverride { + OnDemandThroughputOverride { + MaxReadRequestUnits: Arc> + } + } - impl Hash - for ReplicaGlobalSecondaryIndexAutoScalingDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription{IndexName, IndexStatus, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityAutoScalingSettings, } => { - Hash::hash(IndexName, _state); - Hash::hash(IndexStatus, _state); - Hash::hash(ProvisionedReadCapacityAutoScalingSettings, _state); - Hash::hash(ProvisionedWriteCapacityAutoScalingSettings, _state) - }, - } - } - } + impl OnDemandThroughputOverride { + /// Returns a borrow of the field MaxReadRequestUnits + pub fn MaxReadRequestUnits(&self) -> &Arc> { + match self { + OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => MaxReadRequestUnits, + } + } + } - impl Default - for ReplicaGlobalSecondaryIndexAutoScalingDescription { - fn default() -> ReplicaGlobalSecondaryIndexAutoScalingDescription { - ReplicaGlobalSecondaryIndexAutoScalingDescription::ReplicaGlobalSecondaryIndexAutoScalingDescription { - IndexName: Default::default(), - IndexStatus: Default::default(), - ProvisionedReadCapacityAutoScalingSettings: Default::default(), - ProvisionedWriteCapacityAutoScalingSettings: Default::default() - } - } - } + impl Debug + for OnDemandThroughputOverride { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ReplicaGlobalSecondaryIndexAutoScalingDescription { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for OnDemandThroughputOverride { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.OnDemandThroughputOverride.OnDemandThroughputOverride(")?; + DafnyPrint::fmt_print(MaxReadRequestUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndexAutoScalingUpdate { - ReplicaGlobalSecondaryIndexAutoScalingUpdate { - IndexName: Rc>>, - ProvisionedReadCapacityAutoScalingUpdate: Rc>> - } - } + impl Eq + for OnDemandThroughputOverride {} - impl ReplicaGlobalSecondaryIndexAutoScalingUpdate { - pub fn IndexName(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedReadCapacityAutoScalingUpdate, } => IndexName, - } - } - pub fn ProvisionedReadCapacityAutoScalingUpdate(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedReadCapacityAutoScalingUpdate, } => ProvisionedReadCapacityAutoScalingUpdate, - } - } - } + impl Hash + for OnDemandThroughputOverride { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + OnDemandThroughputOverride::OnDemandThroughputOverride{MaxReadRequestUnits, } => { + Hash::hash(MaxReadRequestUnits, _state) + }, + } + } + } - impl Debug - for ReplicaGlobalSecondaryIndexAutoScalingUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for OnDemandThroughputOverride { + fn default() -> OnDemandThroughputOverride { + OnDemandThroughputOverride::OnDemandThroughputOverride { + MaxReadRequestUnits: Default::default() + } + } + } - impl DafnyPrint - for ReplicaGlobalSecondaryIndexAutoScalingUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedReadCapacityAutoScalingUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndexAutoScalingUpdate.ReplicaGlobalSecondaryIndexAutoScalingUpdate(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityAutoScalingUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for OnDemandThroughputOverride { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ReplicaGlobalSecondaryIndexAutoScalingUpdate {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2082,3) + #[derive(PartialEq, Clone)] + pub enum ParameterizedStatement { + ParameterizedStatement { + Statement: Sequence, + Parameters: Arc> + } + } - impl Hash - for ReplicaGlobalSecondaryIndexAutoScalingUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate{IndexName, ProvisionedReadCapacityAutoScalingUpdate, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedReadCapacityAutoScalingUpdate, _state) - }, - } - } - } + impl ParameterizedStatement { + /// Returns a borrow of the field Statement + pub fn Statement(&self) -> &Sequence { + match self { + ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => Statement, + } + } + /// Returns a borrow of the field Parameters + pub fn Parameters(&self) -> &Arc> { + match self { + ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => Parameters, + } + } + } - impl Default - for ReplicaGlobalSecondaryIndexAutoScalingUpdate { - fn default() -> ReplicaGlobalSecondaryIndexAutoScalingUpdate { - ReplicaGlobalSecondaryIndexAutoScalingUpdate::ReplicaGlobalSecondaryIndexAutoScalingUpdate { - IndexName: Default::default(), - ProvisionedReadCapacityAutoScalingUpdate: Default::default() - } - } - } + impl Debug + for ParameterizedStatement { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ReplicaGlobalSecondaryIndexAutoScalingUpdate { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for ParameterizedStatement { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ParameterizedStatement.ParameterizedStatement(")?; + DafnyPrint::fmt_print(Statement, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Parameters, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndexDescription { - ReplicaGlobalSecondaryIndexDescription { - IndexName: Rc>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>> - } - } + impl Eq + for ParameterizedStatement {} + + impl Hash + for ParameterizedStatement { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ParameterizedStatement::ParameterizedStatement{Statement, Parameters, } => { + Hash::hash(Statement, _state); + Hash::hash(Parameters, _state) + }, + } + } + } - impl ReplicaGlobalSecondaryIndexDescription { - pub fn IndexName(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => IndexName, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => OnDemandThroughputOverride, - } - } - } + impl Default + for ParameterizedStatement { + fn default() -> ParameterizedStatement { + ParameterizedStatement::ParameterizedStatement { + Statement: Default::default(), + Parameters: Default::default() + } + } + } - impl Debug - for ReplicaGlobalSecondaryIndexDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ParameterizedStatement { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ReplicaGlobalSecondaryIndexDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndexDescription.ReplicaGlobalSecondaryIndexDescription(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2086,3) + pub type ParameterizedStatements = Sequence>; - impl Eq - for ReplicaGlobalSecondaryIndexDescription {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2090,3) + pub type PartiQLBatchRequest = Sequence>; - impl Hash - for ReplicaGlobalSecondaryIndexDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state) - }, - } - } - } - - impl Default - for ReplicaGlobalSecondaryIndexDescription { - fn default() -> ReplicaGlobalSecondaryIndexDescription { - ReplicaGlobalSecondaryIndexDescription::ReplicaGlobalSecondaryIndexDescription { - IndexName: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default() - } - } - } - - impl AsRef - for &ReplicaGlobalSecondaryIndexDescription { - fn as_ref(&self) -> Self { - self - } - } - - pub type ReplicaGlobalSecondaryIndexList = Sequence>; - - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndexSettingsDescription { - ReplicaGlobalSecondaryIndexSettingsDescription { - IndexName: Sequence, - IndexStatus: Rc>>, - ProvisionedReadCapacityUnits: Rc>, - ProvisionedReadCapacityAutoScalingSettings: Rc>>, - ProvisionedWriteCapacityUnits: Rc>, - ProvisionedWriteCapacityAutoScalingSettings: Rc>> - } - } - - impl ReplicaGlobalSecondaryIndexSettingsDescription { - pub fn IndexName(&self) -> &Sequence { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => IndexName, - } - } - pub fn IndexStatus(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => IndexStatus, - } - } - pub fn ProvisionedReadCapacityUnits(&self) -> &Rc> { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedReadCapacityUnits, - } - } - pub fn ProvisionedReadCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedReadCapacityAutoScalingSettings, - } - } - pub fn ProvisionedWriteCapacityUnits(&self) -> &Rc> { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedWriteCapacityUnits, - } - } - pub fn ProvisionedWriteCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => ProvisionedWriteCapacityAutoScalingSettings, - } - } - } - - impl Debug - for ReplicaGlobalSecondaryIndexSettingsDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2095,3) + pub type PartiQLNextToken = Sequence; - impl DafnyPrint - for ReplicaGlobalSecondaryIndexSettingsDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndexSettingsDescription.ReplicaGlobalSecondaryIndexSettingsDescription(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2099,3) + pub type PartiQLStatement = Sequence; - impl Eq - for ReplicaGlobalSecondaryIndexSettingsDescription {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2103,3) + #[derive(PartialEq, Clone)] + pub enum PointInTimeRecoveryDescription { + PointInTimeRecoveryDescription { + PointInTimeRecoveryStatus: Arc>>, + EarliestRestorableDateTime: Arc>>, + LatestRestorableDateTime: Arc>> + } + } - impl Hash - for ReplicaGlobalSecondaryIndexSettingsDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription{IndexName, IndexStatus, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettings, ProvisionedWriteCapacityUnits, ProvisionedWriteCapacityAutoScalingSettings, } => { - Hash::hash(IndexName, _state); - Hash::hash(IndexStatus, _state); - Hash::hash(ProvisionedReadCapacityUnits, _state); - Hash::hash(ProvisionedReadCapacityAutoScalingSettings, _state); - Hash::hash(ProvisionedWriteCapacityUnits, _state); - Hash::hash(ProvisionedWriteCapacityAutoScalingSettings, _state) - }, - } - } - } - - impl Default - for ReplicaGlobalSecondaryIndexSettingsDescription { - fn default() -> ReplicaGlobalSecondaryIndexSettingsDescription { - ReplicaGlobalSecondaryIndexSettingsDescription::ReplicaGlobalSecondaryIndexSettingsDescription { - IndexName: Default::default(), - IndexStatus: Default::default(), - ProvisionedReadCapacityUnits: Default::default(), - ProvisionedReadCapacityAutoScalingSettings: Default::default(), - ProvisionedWriteCapacityUnits: Default::default(), - ProvisionedWriteCapacityAutoScalingSettings: Default::default() - } - } - } - - impl AsRef - for &ReplicaGlobalSecondaryIndexSettingsDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaGlobalSecondaryIndexSettingsUpdate { - ReplicaGlobalSecondaryIndexSettingsUpdate { - IndexName: Sequence, - ProvisionedReadCapacityUnits: Rc>, - ProvisionedReadCapacityAutoScalingSettingsUpdate: Rc>> - } - } - - impl ReplicaGlobalSecondaryIndexSettingsUpdate { - pub fn IndexName(&self) -> &Sequence { - match self { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettingsUpdate, } => IndexName, - } - } - pub fn ProvisionedReadCapacityUnits(&self) -> &Rc> { - match self { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettingsUpdate, } => ProvisionedReadCapacityUnits, - } - } - pub fn ProvisionedReadCapacityAutoScalingSettingsUpdate(&self) -> &Rc>> { - match self { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettingsUpdate, } => ProvisionedReadCapacityAutoScalingSettingsUpdate, - } - } - } - - impl Debug - for ReplicaGlobalSecondaryIndexSettingsUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl PointInTimeRecoveryDescription { + /// Returns a borrow of the field PointInTimeRecoveryStatus + pub fn PointInTimeRecoveryStatus(&self) -> &Arc>> { + match self { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => PointInTimeRecoveryStatus, + } + } + /// Returns a borrow of the field EarliestRestorableDateTime + pub fn EarliestRestorableDateTime(&self) -> &Arc>> { + match self { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => EarliestRestorableDateTime, + } + } + /// Returns a borrow of the field LatestRestorableDateTime + pub fn LatestRestorableDateTime(&self) -> &Arc>> { + match self { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => LatestRestorableDateTime, + } + } + } - impl DafnyPrint - for ReplicaGlobalSecondaryIndexSettingsUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettingsUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaGlobalSecondaryIndexSettingsUpdate.ReplicaGlobalSecondaryIndexSettingsUpdate(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedReadCapacityAutoScalingSettingsUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for PointInTimeRecoveryDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ReplicaGlobalSecondaryIndexSettingsUpdate {} + impl DafnyPrint + for PointInTimeRecoveryDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryDescription.PointInTimeRecoveryDescription(")?; + DafnyPrint::fmt_print(PointInTimeRecoveryStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EarliestRestorableDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LatestRestorableDateTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ReplicaGlobalSecondaryIndexSettingsUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate{IndexName, ProvisionedReadCapacityUnits, ProvisionedReadCapacityAutoScalingSettingsUpdate, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedReadCapacityUnits, _state); - Hash::hash(ProvisionedReadCapacityAutoScalingSettingsUpdate, _state) - }, - } - } - } - - impl Default - for ReplicaGlobalSecondaryIndexSettingsUpdate { - fn default() -> ReplicaGlobalSecondaryIndexSettingsUpdate { - ReplicaGlobalSecondaryIndexSettingsUpdate::ReplicaGlobalSecondaryIndexSettingsUpdate { - IndexName: Default::default(), - ProvisionedReadCapacityUnits: Default::default(), - ProvisionedReadCapacityAutoScalingSettingsUpdate: Default::default() - } - } - } - - impl AsRef - for &ReplicaGlobalSecondaryIndexSettingsUpdate { - fn as_ref(&self) -> Self { - self - } - } - - pub type ReplicaGlobalSecondaryIndexSettingsUpdateList = Sequence>; - - #[derive(PartialEq, Clone)] - pub enum ReplicaSettingsDescription { - ReplicaSettingsDescription { - RegionName: Sequence, - ReplicaStatus: Rc>>, - ReplicaBillingModeSummary: Rc>>, - ReplicaProvisionedReadCapacityUnits: Rc>, - ReplicaProvisionedReadCapacityAutoScalingSettings: Rc>>, - ReplicaProvisionedWriteCapacityUnits: Rc>, - ReplicaProvisionedWriteCapacityAutoScalingSettings: Rc>>, - ReplicaGlobalSecondaryIndexSettings: Rc>>>, - ReplicaTableClassSummary: Rc>> - } - } - - impl ReplicaSettingsDescription { - pub fn RegionName(&self) -> &Sequence { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => RegionName, - } - } - pub fn ReplicaStatus(&self) -> &Rc>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaStatus, - } - } - pub fn ReplicaBillingModeSummary(&self) -> &Rc>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaBillingModeSummary, - } - } - pub fn ReplicaProvisionedReadCapacityUnits(&self) -> &Rc> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaProvisionedReadCapacityUnits, - } - } - pub fn ReplicaProvisionedReadCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaProvisionedReadCapacityAutoScalingSettings, - } - } - pub fn ReplicaProvisionedWriteCapacityUnits(&self) -> &Rc> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaProvisionedWriteCapacityUnits, - } - } - pub fn ReplicaProvisionedWriteCapacityAutoScalingSettings(&self) -> &Rc>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaProvisionedWriteCapacityAutoScalingSettings, - } - } - pub fn ReplicaGlobalSecondaryIndexSettings(&self) -> &Rc>>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaGlobalSecondaryIndexSettings, - } - } - pub fn ReplicaTableClassSummary(&self) -> &Rc>> { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => ReplicaTableClassSummary, - } - } - } - - impl Debug - for ReplicaSettingsDescription { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for PointInTimeRecoveryDescription {} + + impl Hash + for PointInTimeRecoveryDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription{PointInTimeRecoveryStatus, EarliestRestorableDateTime, LatestRestorableDateTime, } => { + Hash::hash(PointInTimeRecoveryStatus, _state); + Hash::hash(EarliestRestorableDateTime, _state); + Hash::hash(LatestRestorableDateTime, _state) + }, + } + } + } - impl DafnyPrint - for ReplicaSettingsDescription { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaSettingsDescription.ReplicaSettingsDescription(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaBillingModeSummary, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedWriteCapacityAutoScalingSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaGlobalSecondaryIndexSettings, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaTableClassSummary, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for PointInTimeRecoveryDescription { + fn default() -> PointInTimeRecoveryDescription { + PointInTimeRecoveryDescription::PointInTimeRecoveryDescription { + PointInTimeRecoveryStatus: Default::default(), + EarliestRestorableDateTime: Default::default(), + LatestRestorableDateTime: Default::default() + } + } + } - impl Eq - for ReplicaSettingsDescription {} + impl AsRef + for PointInTimeRecoveryDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ReplicaSettingsDescription { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaSettingsDescription::ReplicaSettingsDescription{RegionName, ReplicaStatus, ReplicaBillingModeSummary, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityUnits, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaGlobalSecondaryIndexSettings, ReplicaTableClassSummary, } => { - Hash::hash(RegionName, _state); - Hash::hash(ReplicaStatus, _state); - Hash::hash(ReplicaBillingModeSummary, _state); - Hash::hash(ReplicaProvisionedReadCapacityUnits, _state); - Hash::hash(ReplicaProvisionedReadCapacityAutoScalingSettings, _state); - Hash::hash(ReplicaProvisionedWriteCapacityUnits, _state); - Hash::hash(ReplicaProvisionedWriteCapacityAutoScalingSettings, _state); - Hash::hash(ReplicaGlobalSecondaryIndexSettings, _state); - Hash::hash(ReplicaTableClassSummary, _state) - }, - } - } - } - - impl Default - for ReplicaSettingsDescription { - fn default() -> ReplicaSettingsDescription { - ReplicaSettingsDescription::ReplicaSettingsDescription { - RegionName: Default::default(), - ReplicaStatus: Default::default(), - ReplicaBillingModeSummary: Default::default(), - ReplicaProvisionedReadCapacityUnits: Default::default(), - ReplicaProvisionedReadCapacityAutoScalingSettings: Default::default(), - ReplicaProvisionedWriteCapacityUnits: Default::default(), - ReplicaProvisionedWriteCapacityAutoScalingSettings: Default::default(), - ReplicaGlobalSecondaryIndexSettings: Default::default(), - ReplicaTableClassSummary: Default::default() - } - } - } - - impl AsRef - for &ReplicaSettingsDescription { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicaSettingsUpdate { - ReplicaSettingsUpdate { - RegionName: Sequence, - ReplicaProvisionedReadCapacityUnits: Rc>, - ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate: Rc>>, - ReplicaGlobalSecondaryIndexSettingsUpdate: Rc>, - ReplicaTableClass: Rc>> - } - } - - impl ReplicaSettingsUpdate { - pub fn RegionName(&self) -> &Sequence { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => RegionName, - } - } - pub fn ReplicaProvisionedReadCapacityUnits(&self) -> &Rc> { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => ReplicaProvisionedReadCapacityUnits, - } - } - pub fn ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate(&self) -> &Rc>> { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, - } - } - pub fn ReplicaGlobalSecondaryIndexSettingsUpdate(&self) -> &Rc> { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => ReplicaGlobalSecondaryIndexSettingsUpdate, - } - } - pub fn ReplicaTableClass(&self) -> &Rc>> { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => ReplicaTableClass, - } - } - } - - impl Debug - for ReplicaSettingsUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2108,3) + #[derive(PartialEq, Clone)] + pub enum PointInTimeRecoverySpecification { + PointInTimeRecoverySpecification { + PointInTimeRecoveryEnabled: bool + } + } - impl DafnyPrint - for ReplicaSettingsUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaSettingsUpdate.ReplicaSettingsUpdate(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaGlobalSecondaryIndexSettingsUpdate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaTableClass, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl PointInTimeRecoverySpecification { + /// Returns a borrow of the field PointInTimeRecoveryEnabled + pub fn PointInTimeRecoveryEnabled(&self) -> &bool { + match self { + PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => PointInTimeRecoveryEnabled, + } + } + } - impl Eq - for ReplicaSettingsUpdate {} + impl Debug + for PointInTimeRecoverySpecification { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ReplicaSettingsUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaSettingsUpdate::ReplicaSettingsUpdate{RegionName, ReplicaProvisionedReadCapacityUnits, ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, ReplicaGlobalSecondaryIndexSettingsUpdate, ReplicaTableClass, } => { - Hash::hash(RegionName, _state); - Hash::hash(ReplicaProvisionedReadCapacityUnits, _state); - Hash::hash(ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate, _state); - Hash::hash(ReplicaGlobalSecondaryIndexSettingsUpdate, _state); - Hash::hash(ReplicaTableClass, _state) - }, - } - } - } - - impl Default - for ReplicaSettingsUpdate { - fn default() -> ReplicaSettingsUpdate { - ReplicaSettingsUpdate::ReplicaSettingsUpdate { - RegionName: Default::default(), - ReplicaProvisionedReadCapacityUnits: Default::default(), - ReplicaProvisionedReadCapacityAutoScalingSettingsUpdate: Default::default(), - ReplicaGlobalSecondaryIndexSettingsUpdate: Default::default(), - ReplicaTableClass: Default::default() - } - } - } - - impl AsRef - for &ReplicaSettingsUpdate { - fn as_ref(&self) -> Self { - self - } - } - - pub type ReplicaSettingsUpdateList = Sequence>; - - #[derive(PartialEq, Clone)] - pub enum ReplicaStatus { - CREATING {}, - CREATION_FAILED {}, - UPDATING {}, - DELETING {}, - ACTIVE {}, - REGION_DISABLED {}, - INACCESSIBLE_ENCRYPTION_CREDENTIALS {} - } - - impl ReplicaStatus {} - - impl Debug - for ReplicaStatus { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for PointInTimeRecoverySpecification { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoverySpecification.PointInTimeRecoverySpecification(")?; + DafnyPrint::fmt_print(PointInTimeRecoveryEnabled, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ReplicaStatus { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaStatus::CREATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.CREATING")?; - Ok(()) - }, - ReplicaStatus::CREATION_FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.CREATION__FAILED")?; - Ok(()) - }, - ReplicaStatus::UPDATING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.UPDATING")?; - Ok(()) - }, - ReplicaStatus::DELETING{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.DELETING")?; - Ok(()) - }, - ReplicaStatus::ACTIVE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.ACTIVE")?; - Ok(()) - }, - ReplicaStatus::REGION_DISABLED{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.REGION__DISABLED")?; - Ok(()) - }, - ReplicaStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaStatus.INACCESSIBLE__ENCRYPTION__CREDENTIALS")?; - Ok(()) - }, - } - } - } + impl Eq + for PointInTimeRecoverySpecification {} - impl ReplicaStatus { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ReplicaStatus::CREATING {}), Rc::new(ReplicaStatus::CREATION_FAILED {}), Rc::new(ReplicaStatus::UPDATING {}), Rc::new(ReplicaStatus::DELETING {}), Rc::new(ReplicaStatus::ACTIVE {}), Rc::new(ReplicaStatus::REGION_DISABLED {}), Rc::new(ReplicaStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS {})].iter() - } - } + impl Hash + for PointInTimeRecoverySpecification { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PointInTimeRecoverySpecification::PointInTimeRecoverySpecification{PointInTimeRecoveryEnabled, } => { + Hash::hash(PointInTimeRecoveryEnabled, _state) + }, + } + } + } - impl Eq - for ReplicaStatus {} + impl Default + for PointInTimeRecoverySpecification { + fn default() -> PointInTimeRecoverySpecification { + PointInTimeRecoverySpecification::PointInTimeRecoverySpecification { + PointInTimeRecoveryEnabled: Default::default() + } + } + } - impl Hash - for ReplicaStatus { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaStatus::CREATING{} => { + impl AsRef + for PointInTimeRecoverySpecification { + fn as_ref(&self) -> &Self { + self + } + } - }, - ReplicaStatus::CREATION_FAILED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2111,3) + #[derive(PartialEq, Clone)] + pub enum PointInTimeRecoveryStatus { + ENABLED {}, + DISABLED {} + } - }, - ReplicaStatus::UPDATING{} => { + impl PointInTimeRecoveryStatus {} - }, - ReplicaStatus::DELETING{} => { + impl Debug + for PointInTimeRecoveryStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ReplicaStatus::ACTIVE{} => { + impl DafnyPrint + for PointInTimeRecoveryStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PointInTimeRecoveryStatus::ENABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryStatus.ENABLED")?; + Ok(()) + }, + PointInTimeRecoveryStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PointInTimeRecoveryStatus.DISABLED")?; + Ok(()) + }, + } + } + } - }, - ReplicaStatus::REGION_DISABLED{} => { + impl PointInTimeRecoveryStatus { + /// Enumerates all possible values of PointInTimeRecoveryStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(PointInTimeRecoveryStatus::ENABLED {}), Arc::new(PointInTimeRecoveryStatus::DISABLED {})].iter() + } + } - }, - ReplicaStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS{} => { + impl Eq + for PointInTimeRecoveryStatus {} - }, - } - } - } + impl Hash + for PointInTimeRecoveryStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PointInTimeRecoveryStatus::ENABLED{} => { - impl Default - for ReplicaStatus { - fn default() -> ReplicaStatus { - ReplicaStatus::CREATING {} - } - } + }, + PointInTimeRecoveryStatus::DISABLED{} => { - impl AsRef - for &ReplicaStatus { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReplicationGroupUpdate { - ReplicationGroupUpdate { - Create: Rc>>, - Update: Rc>>, - Delete: Rc>> - } - } + impl Default + for PointInTimeRecoveryStatus { + fn default() -> PointInTimeRecoveryStatus { + PointInTimeRecoveryStatus::ENABLED {} + } + } - impl ReplicationGroupUpdate { - pub fn Create(&self) -> &Rc>> { - match self { - ReplicationGroupUpdate::ReplicationGroupUpdate{Create, Update, Delete, } => Create, - } - } - pub fn Update(&self) -> &Rc>> { - match self { - ReplicationGroupUpdate::ReplicationGroupUpdate{Create, Update, Delete, } => Update, - } - } - pub fn Delete(&self) -> &Rc>> { - match self { - ReplicationGroupUpdate::ReplicationGroupUpdate{Create, Update, Delete, } => Delete, - } - } - } + impl AsRef + for PointInTimeRecoveryStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ReplicationGroupUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2114,3) + pub type PolicyRevisionId = Sequence; - impl DafnyPrint - for ReplicationGroupUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicationGroupUpdate::ReplicationGroupUpdate{Create, Update, Delete, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicationGroupUpdate.ReplicationGroupUpdate(")?; - DafnyPrint::fmt_print(Create, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Update, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Delete, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2118,3) + pub type PositiveIntegerObject = i32; - impl Eq - for ReplicationGroupUpdate {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2122,3) + pub type PositiveLongObject = i64; - impl Hash - for ReplicationGroupUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicationGroupUpdate::ReplicationGroupUpdate{Create, Update, Delete, } => { - Hash::hash(Create, _state); - Hash::hash(Update, _state); - Hash::hash(Delete, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2126,3) + pub type PreparedStatementParameters = Sequence>; - impl Default - for ReplicationGroupUpdate { - fn default() -> ReplicationGroupUpdate { - ReplicationGroupUpdate::ReplicationGroupUpdate { - Create: Default::default(), - Update: Default::default(), - Delete: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2130,3) + pub type ProcessedItemCount = i64; - impl AsRef - for &ReplicationGroupUpdate { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2134,3) + #[derive(PartialEq, Clone)] + pub enum Projection { + Projection { + ProjectionType: Arc>>, + NonKeyAttributes: Arc> + } + } - pub type ReplicationGroupUpdateList = Sequence>; + impl Projection { + /// Returns a borrow of the field ProjectionType + pub fn ProjectionType(&self) -> &Arc>> { + match self { + Projection::Projection{ProjectionType, NonKeyAttributes, } => ProjectionType, + } + } + /// Returns a borrow of the field NonKeyAttributes + pub fn NonKeyAttributes(&self) -> &Arc> { + match self { + Projection::Projection{ProjectionType, NonKeyAttributes, } => NonKeyAttributes, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReplicaUpdate { - ReplicaUpdate { - Create: Rc>>, - Delete: Rc>> - } - } + impl Debug + for Projection { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ReplicaUpdate { - pub fn Create(&self) -> &Rc>> { - match self { - ReplicaUpdate::ReplicaUpdate{Create, Delete, } => Create, - } - } - pub fn Delete(&self) -> &Rc>> { - match self { - ReplicaUpdate::ReplicaUpdate{Create, Delete, } => Delete, - } - } - } + impl DafnyPrint + for Projection { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Projection::Projection{ProjectionType, NonKeyAttributes, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Projection.Projection(")?; + DafnyPrint::fmt_print(ProjectionType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NonKeyAttributes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ReplicaUpdate { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for Projection {} + + impl Hash + for Projection { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Projection::Projection{ProjectionType, NonKeyAttributes, } => { + Hash::hash(ProjectionType, _state); + Hash::hash(NonKeyAttributes, _state) + }, + } + } + } - impl DafnyPrint - for ReplicaUpdate { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicaUpdate::ReplicaUpdate{Create, Delete, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaUpdate.ReplicaUpdate(")?; - DafnyPrint::fmt_print(Create, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Delete, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for Projection { + fn default() -> Projection { + Projection::Projection { + ProjectionType: Default::default(), + NonKeyAttributes: Default::default() + } + } + } - impl Eq - for ReplicaUpdate {} + impl AsRef + for Projection { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ReplicaUpdate { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicaUpdate::ReplicaUpdate{Create, Delete, } => { - Hash::hash(Create, _state); - Hash::hash(Delete, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2139,3) + #[derive(PartialEq, Clone)] + pub enum ProjectionType { + ALL {}, + KEYS_ONLY {}, + INCLUDE {} + } - impl Default - for ReplicaUpdate { - fn default() -> ReplicaUpdate { - ReplicaUpdate::ReplicaUpdate { - Create: Default::default(), - Delete: Default::default() - } - } - } + impl ProjectionType {} - impl AsRef - for &ReplicaUpdate { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for ProjectionType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type ResourceArnString = Sequence; + impl DafnyPrint + for ProjectionType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ProjectionType::ALL{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.ALL")?; + Ok(()) + }, + ProjectionType::KEYS_ONLY{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.KEYS__ONLY")?; + Ok(()) + }, + ProjectionType::INCLUDE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProjectionType.INCLUDE")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum RestoreSummary { - RestoreSummary { - SourceBackupArn: Rc>>, - SourceTableArn: Rc>>, - RestoreDateTime: Sequence, - RestoreInProgress: bool - } - } + impl ProjectionType { + /// Enumerates all possible values of ProjectionType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ProjectionType::ALL {}), Arc::new(ProjectionType::KEYS_ONLY {}), Arc::new(ProjectionType::INCLUDE {})].iter() + } + } - impl RestoreSummary { - pub fn SourceBackupArn(&self) -> &Rc>> { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => SourceBackupArn, - } - } - pub fn SourceTableArn(&self) -> &Rc>> { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => SourceTableArn, - } - } - pub fn RestoreDateTime(&self) -> &Sequence { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => RestoreDateTime, - } - } - pub fn RestoreInProgress(&self) -> &bool { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => RestoreInProgress, - } - } - } + impl Eq + for ProjectionType {} - impl Debug - for RestoreSummary { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for ProjectionType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ProjectionType::ALL{} => { - impl DafnyPrint - for RestoreSummary { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.RestoreSummary.RestoreSummary(")?; - DafnyPrint::fmt_print(SourceBackupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceTableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RestoreDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RestoreInProgress, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ProjectionType::KEYS_ONLY{} => { - impl Eq - for RestoreSummary {} + }, + ProjectionType::INCLUDE{} => { - impl Hash - for RestoreSummary { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RestoreSummary::RestoreSummary{SourceBackupArn, SourceTableArn, RestoreDateTime, RestoreInProgress, } => { - Hash::hash(SourceBackupArn, _state); - Hash::hash(SourceTableArn, _state); - Hash::hash(RestoreDateTime, _state); - Hash::hash(RestoreInProgress, _state) - }, - } - } - } - - impl Default - for RestoreSummary { - fn default() -> RestoreSummary { - RestoreSummary::RestoreSummary { - SourceBackupArn: Default::default(), - SourceTableArn: Default::default(), - RestoreDateTime: Default::default(), - RestoreInProgress: Default::default() - } - } - } - - impl AsRef - for &RestoreSummary { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RestoreTableFromBackupInput { - RestoreTableFromBackupInput { - TargetTableName: Sequence, - BackupArn: Sequence, - BillingModeOverride: Rc>>, - GlobalSecondaryIndexOverride: Rc>>>, - LocalSecondaryIndexOverride: Rc>>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>>, - SSESpecificationOverride: Rc>> - } - } - - impl RestoreTableFromBackupInput { - pub fn TargetTableName(&self) -> &Sequence { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => TargetTableName, - } - } - pub fn BackupArn(&self) -> &Sequence { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => BackupArn, - } - } - pub fn BillingModeOverride(&self) -> &Rc>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => BillingModeOverride, - } - } - pub fn GlobalSecondaryIndexOverride(&self) -> &Rc>>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => GlobalSecondaryIndexOverride, - } - } - pub fn LocalSecondaryIndexOverride(&self) -> &Rc>>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => LocalSecondaryIndexOverride, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => OnDemandThroughputOverride, - } - } - pub fn SSESpecificationOverride(&self) -> &Rc>> { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => SSESpecificationOverride, - } - } - } - - impl Debug - for RestoreTableFromBackupInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for RestoreTableFromBackupInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.RestoreTableFromBackupInput.RestoreTableFromBackupInput(")?; - DafnyPrint::fmt_print(TargetTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BackupArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BillingModeOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LocalSecondaryIndexOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SSESpecificationOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for ProjectionType { + fn default() -> ProjectionType { + ProjectionType::ALL {} + } + } - impl Eq - for RestoreTableFromBackupInput {} + impl AsRef + for ProjectionType { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for RestoreTableFromBackupInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RestoreTableFromBackupInput::RestoreTableFromBackupInput{TargetTableName, BackupArn, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => { - Hash::hash(TargetTableName, _state); - Hash::hash(BackupArn, _state); - Hash::hash(BillingModeOverride, _state); - Hash::hash(GlobalSecondaryIndexOverride, _state); - Hash::hash(LocalSecondaryIndexOverride, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state); - Hash::hash(SSESpecificationOverride, _state) - }, - } - } - } - - impl Default - for RestoreTableFromBackupInput { - fn default() -> RestoreTableFromBackupInput { - RestoreTableFromBackupInput::RestoreTableFromBackupInput { - TargetTableName: Default::default(), - BackupArn: Default::default(), - BillingModeOverride: Default::default(), - GlobalSecondaryIndexOverride: Default::default(), - LocalSecondaryIndexOverride: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default(), - SSESpecificationOverride: Default::default() - } - } - } - - impl AsRef - for &RestoreTableFromBackupInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RestoreTableFromBackupOutput { - RestoreTableFromBackupOutput { - TableDescription: Rc>> - } - } - - impl RestoreTableFromBackupOutput { - pub fn TableDescription(&self) -> &Rc>> { - match self { - RestoreTableFromBackupOutput::RestoreTableFromBackupOutput{TableDescription, } => TableDescription, - } - } - } - - impl Debug - for RestoreTableFromBackupOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2143,3) + #[derive(PartialEq, Clone)] + pub enum ProvisionedThroughput { + ProvisionedThroughput { + ReadCapacityUnits: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject, + WriteCapacityUnits: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject + } + } - impl DafnyPrint - for RestoreTableFromBackupOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RestoreTableFromBackupOutput::RestoreTableFromBackupOutput{TableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.RestoreTableFromBackupOutput.RestoreTableFromBackupOutput(")?; - DafnyPrint::fmt_print(TableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl ProvisionedThroughput { + /// Returns a borrow of the field ReadCapacityUnits + pub fn ReadCapacityUnits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject { + match self { + ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => ReadCapacityUnits, + } + } + /// Returns a borrow of the field WriteCapacityUnits + pub fn WriteCapacityUnits(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::PositiveLongObject { + match self { + ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => WriteCapacityUnits, + } + } + } - impl Eq - for RestoreTableFromBackupOutput {} + impl Debug + for ProvisionedThroughput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for RestoreTableFromBackupOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RestoreTableFromBackupOutput::RestoreTableFromBackupOutput{TableDescription, } => { - Hash::hash(TableDescription, _state) - }, - } - } - } - - impl Default - for RestoreTableFromBackupOutput { - fn default() -> RestoreTableFromBackupOutput { - RestoreTableFromBackupOutput::RestoreTableFromBackupOutput { - TableDescription: Default::default() - } - } - } - - impl AsRef - for &RestoreTableFromBackupOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RestoreTableToPointInTimeInput { - RestoreTableToPointInTimeInput { - SourceTableArn: Rc>>, - SourceTableName: Rc>>, - TargetTableName: Sequence, - UseLatestRestorableTime: Rc>, - RestoreDateTime: Rc>>, - BillingModeOverride: Rc>>, - GlobalSecondaryIndexOverride: Rc>>>, - LocalSecondaryIndexOverride: Rc>>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>>, - SSESpecificationOverride: Rc>> - } - } - - impl RestoreTableToPointInTimeInput { - pub fn SourceTableArn(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => SourceTableArn, - } - } - pub fn SourceTableName(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => SourceTableName, - } - } - pub fn TargetTableName(&self) -> &Sequence { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => TargetTableName, - } - } - pub fn UseLatestRestorableTime(&self) -> &Rc> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => UseLatestRestorableTime, - } - } - pub fn RestoreDateTime(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => RestoreDateTime, - } - } - pub fn BillingModeOverride(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => BillingModeOverride, - } - } - pub fn GlobalSecondaryIndexOverride(&self) -> &Rc>>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => GlobalSecondaryIndexOverride, - } - } - pub fn LocalSecondaryIndexOverride(&self) -> &Rc>>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => LocalSecondaryIndexOverride, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => OnDemandThroughputOverride, - } - } - pub fn SSESpecificationOverride(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => SSESpecificationOverride, - } - } - } - - impl Debug - for RestoreTableToPointInTimeInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ProvisionedThroughput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughput.ProvisionedThroughput(")?; + DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for RestoreTableToPointInTimeInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.RestoreTableToPointInTimeInput.RestoreTableToPointInTimeInput(")?; - DafnyPrint::fmt_print(SourceTableArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UseLatestRestorableTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RestoreDateTime, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BillingModeOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LocalSecondaryIndexOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SSESpecificationOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ProvisionedThroughput {} + + impl Hash + for ProvisionedThroughput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ProvisionedThroughput::ProvisionedThroughput{ReadCapacityUnits, WriteCapacityUnits, } => { + Hash::hash(ReadCapacityUnits, _state); + Hash::hash(WriteCapacityUnits, _state) + }, + } + } + } - impl Eq - for RestoreTableToPointInTimeInput {} + impl Default + for ProvisionedThroughput { + fn default() -> ProvisionedThroughput { + ProvisionedThroughput::ProvisionedThroughput { + ReadCapacityUnits: Default::default(), + WriteCapacityUnits: Default::default() + } + } + } - impl Hash - for RestoreTableToPointInTimeInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput{SourceTableArn, SourceTableName, TargetTableName, UseLatestRestorableTime, RestoreDateTime, BillingModeOverride, GlobalSecondaryIndexOverride, LocalSecondaryIndexOverride, ProvisionedThroughputOverride, OnDemandThroughputOverride, SSESpecificationOverride, } => { - Hash::hash(SourceTableArn, _state); - Hash::hash(SourceTableName, _state); - Hash::hash(TargetTableName, _state); - Hash::hash(UseLatestRestorableTime, _state); - Hash::hash(RestoreDateTime, _state); - Hash::hash(BillingModeOverride, _state); - Hash::hash(GlobalSecondaryIndexOverride, _state); - Hash::hash(LocalSecondaryIndexOverride, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state); - Hash::hash(SSESpecificationOverride, _state) - }, - } - } - } - - impl Default - for RestoreTableToPointInTimeInput { - fn default() -> RestoreTableToPointInTimeInput { - RestoreTableToPointInTimeInput::RestoreTableToPointInTimeInput { - SourceTableArn: Default::default(), - SourceTableName: Default::default(), - TargetTableName: Default::default(), - UseLatestRestorableTime: Default::default(), - RestoreDateTime: Default::default(), - BillingModeOverride: Default::default(), - GlobalSecondaryIndexOverride: Default::default(), - LocalSecondaryIndexOverride: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default(), - SSESpecificationOverride: Default::default() - } - } - } - - impl AsRef - for &RestoreTableToPointInTimeInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RestoreTableToPointInTimeOutput { - RestoreTableToPointInTimeOutput { - TableDescription: Rc>> - } - } - - impl RestoreTableToPointInTimeOutput { - pub fn TableDescription(&self) -> &Rc>> { - match self { - RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput{TableDescription, } => TableDescription, - } - } - } - - impl Debug - for RestoreTableToPointInTimeOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ProvisionedThroughput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for RestoreTableToPointInTimeOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput{TableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.RestoreTableToPointInTimeOutput.RestoreTableToPointInTimeOutput(")?; - DafnyPrint::fmt_print(TableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2147,3) + #[derive(PartialEq, Clone)] + pub enum ProvisionedThroughputDescription { + ProvisionedThroughputDescription { + LastIncreaseDateTime: Arc>>, + LastDecreaseDateTime: Arc>>, + NumberOfDecreasesToday: Arc>, + ReadCapacityUnits: Arc>, + WriteCapacityUnits: Arc> + } + } - impl Eq - for RestoreTableToPointInTimeOutput {} + impl ProvisionedThroughputDescription { + /// Returns a borrow of the field LastIncreaseDateTime + pub fn LastIncreaseDateTime(&self) -> &Arc>> { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => LastIncreaseDateTime, + } + } + /// Returns a borrow of the field LastDecreaseDateTime + pub fn LastDecreaseDateTime(&self) -> &Arc>> { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => LastDecreaseDateTime, + } + } + /// Returns a borrow of the field NumberOfDecreasesToday + pub fn NumberOfDecreasesToday(&self) -> &Arc> { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => NumberOfDecreasesToday, + } + } + /// Returns a borrow of the field ReadCapacityUnits + pub fn ReadCapacityUnits(&self) -> &Arc> { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => ReadCapacityUnits, + } + } + /// Returns a borrow of the field WriteCapacityUnits + pub fn WriteCapacityUnits(&self) -> &Arc> { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => WriteCapacityUnits, + } + } + } - impl Hash - for RestoreTableToPointInTimeOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput{TableDescription, } => { - Hash::hash(TableDescription, _state) - }, - } - } - } + impl Debug + for ProvisionedThroughputDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for RestoreTableToPointInTimeOutput { - fn default() -> RestoreTableToPointInTimeOutput { - RestoreTableToPointInTimeOutput::RestoreTableToPointInTimeOutput { - TableDescription: Default::default() - } - } - } + impl DafnyPrint + for ProvisionedThroughputDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughputDescription.ProvisionedThroughputDescription(")?; + DafnyPrint::fmt_print(LastIncreaseDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastDecreaseDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NumberOfDecreasesToday, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WriteCapacityUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &RestoreTableToPointInTimeOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ProvisionedThroughputDescription {} + + impl Hash + for ProvisionedThroughputDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ProvisionedThroughputDescription::ProvisionedThroughputDescription{LastIncreaseDateTime, LastDecreaseDateTime, NumberOfDecreasesToday, ReadCapacityUnits, WriteCapacityUnits, } => { + Hash::hash(LastIncreaseDateTime, _state); + Hash::hash(LastDecreaseDateTime, _state); + Hash::hash(NumberOfDecreasesToday, _state); + Hash::hash(ReadCapacityUnits, _state); + Hash::hash(WriteCapacityUnits, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReturnConsumedCapacity { - INDEXES {}, - TOTAL {}, - NONE {} - } + impl Default + for ProvisionedThroughputDescription { + fn default() -> ProvisionedThroughputDescription { + ProvisionedThroughputDescription::ProvisionedThroughputDescription { + LastIncreaseDateTime: Default::default(), + LastDecreaseDateTime: Default::default(), + NumberOfDecreasesToday: Default::default(), + ReadCapacityUnits: Default::default(), + WriteCapacityUnits: Default::default() + } + } + } - impl ReturnConsumedCapacity {} + impl AsRef + for ProvisionedThroughputDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ReturnConsumedCapacity { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2154,3) + #[derive(PartialEq, Clone)] + pub enum ProvisionedThroughputOverride { + ProvisionedThroughputOverride { + ReadCapacityUnits: Arc> + } + } - impl DafnyPrint - for ReturnConsumedCapacity { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReturnConsumedCapacity::INDEXES{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnConsumedCapacity.INDEXES")?; - Ok(()) - }, - ReturnConsumedCapacity::TOTAL{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnConsumedCapacity.TOTAL")?; - Ok(()) - }, - ReturnConsumedCapacity::NONE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnConsumedCapacity.NONE")?; - Ok(()) - }, - } - } - } + impl ProvisionedThroughputOverride { + /// Returns a borrow of the field ReadCapacityUnits + pub fn ReadCapacityUnits(&self) -> &Arc> { + match self { + ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => ReadCapacityUnits, + } + } + } - impl ReturnConsumedCapacity { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ReturnConsumedCapacity::INDEXES {}), Rc::new(ReturnConsumedCapacity::TOTAL {}), Rc::new(ReturnConsumedCapacity::NONE {})].iter() - } - } + impl Debug + for ProvisionedThroughputOverride { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ReturnConsumedCapacity {} + impl DafnyPrint + for ProvisionedThroughputOverride { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ProvisionedThroughputOverride.ProvisionedThroughputOverride(")?; + DafnyPrint::fmt_print(ReadCapacityUnits, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ReturnConsumedCapacity { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReturnConsumedCapacity::INDEXES{} => { + impl Eq + for ProvisionedThroughputOverride {} - }, - ReturnConsumedCapacity::TOTAL{} => { + impl Hash + for ProvisionedThroughputOverride { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ProvisionedThroughputOverride::ProvisionedThroughputOverride{ReadCapacityUnits, } => { + Hash::hash(ReadCapacityUnits, _state) + }, + } + } + } - }, - ReturnConsumedCapacity::NONE{} => { + impl Default + for ProvisionedThroughputOverride { + fn default() -> ProvisionedThroughputOverride { + ProvisionedThroughputOverride::ProvisionedThroughputOverride { + ReadCapacityUnits: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for ProvisionedThroughputOverride { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ReturnConsumedCapacity { - fn default() -> ReturnConsumedCapacity { - ReturnConsumedCapacity::INDEXES {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2157,3) + #[derive(PartialEq, Clone)] + pub enum Put { + Put { + Item: Map, Arc>, + TableName: Sequence, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>>, + ReturnValuesOnConditionCheckFailure: Arc>> + } + } - impl AsRef - for &ReturnConsumedCapacity { - fn as_ref(&self) -> Self { - self - } - } + impl Put { + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Map, Arc> { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Item, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, + } + } + /// Returns a borrow of the field ReturnValuesOnConditionCheckFailure + pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Arc>> { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReturnItemCollectionMetrics { - SIZE {}, - NONE {} - } + impl Debug + for Put { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ReturnItemCollectionMetrics {} + impl DafnyPrint + for Put { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Put.Put(")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ReturnItemCollectionMetrics { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for Put {} + + impl Hash + for Put { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Put::Put{Item, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + Hash::hash(Item, _state); + Hash::hash(TableName, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state); + Hash::hash(ReturnValuesOnConditionCheckFailure, _state) + }, + } + } + } - impl DafnyPrint - for ReturnItemCollectionMetrics { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReturnItemCollectionMetrics::SIZE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnItemCollectionMetrics.SIZE")?; - Ok(()) - }, - ReturnItemCollectionMetrics::NONE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnItemCollectionMetrics.NONE")?; - Ok(()) - }, - } - } - } + impl Default + for Put { + fn default() -> Put { + Put::Put { + Item: Default::default(), + TableName: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default(), + ReturnValuesOnConditionCheckFailure: Default::default() + } + } + } - impl ReturnItemCollectionMetrics { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ReturnItemCollectionMetrics::SIZE {}), Rc::new(ReturnItemCollectionMetrics::NONE {})].iter() - } - } + impl AsRef + for Put { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ReturnItemCollectionMetrics {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2165,3) + #[derive(PartialEq, Clone)] + pub enum PutItemInput { + PutItemInput { + TableName: Sequence, + Item: Map, Arc>, + Expected: Arc, Arc>>>, + ReturnValues: Arc>>, + ReturnConsumedCapacity: Arc>>, + ReturnItemCollectionMetrics: Arc>>, + ConditionalOperator: Arc>>, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>> + } + } - impl Hash - for ReturnItemCollectionMetrics { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReturnItemCollectionMetrics::SIZE{} => { + impl PutItemInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, + } + } + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Map, Arc> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Item, + } + } + /// Returns a borrow of the field Expected + pub fn Expected(&self) -> &Arc, Arc>>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, + } + } + /// Returns a borrow of the field ReturnValues + pub fn ReturnValues(&self) -> &Arc>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ReturnItemCollectionMetrics + pub fn ReturnItemCollectionMetrics(&self) -> &Arc>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, + } + } + /// Returns a borrow of the field ConditionalOperator + pub fn ConditionalOperator(&self) -> &Arc>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, + } + } + } - }, - ReturnItemCollectionMetrics::NONE{} => { + impl Debug + for PutItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for PutItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutItemInput.PutItemInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Expected, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ReturnItemCollectionMetrics { - fn default() -> ReturnItemCollectionMetrics { - ReturnItemCollectionMetrics::SIZE {} - } - } + impl Eq + for PutItemInput {} + + impl Hash + for PutItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemInput::PutItemInput{TableName, Item, Expected, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ConditionalOperator, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + Hash::hash(TableName, _state); + Hash::hash(Item, _state); + Hash::hash(Expected, _state); + Hash::hash(ReturnValues, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ReturnItemCollectionMetrics, _state); + Hash::hash(ConditionalOperator, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state) + }, + } + } + } - impl AsRef - for &ReturnItemCollectionMetrics { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for PutItemInput { + fn default() -> PutItemInput { + PutItemInput::PutItemInput { + TableName: Default::default(), + Item: Default::default(), + Expected: Default::default(), + ReturnValues: Default::default(), + ReturnConsumedCapacity: Default::default(), + ReturnItemCollectionMetrics: Default::default(), + ConditionalOperator: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReturnValue { - NONE {}, - ALL_OLD {}, - UPDATED_OLD {}, - ALL_NEW {}, - UPDATED_NEW {} - } + impl AsRef + for PutItemInput { + fn as_ref(&self) -> &Self { + self + } + } - impl ReturnValue {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2178,3) + #[derive(PartialEq, Clone)] + pub enum PutItemOutput { + PutItemOutput { + Attributes: Arc, Arc>>>, + ConsumedCapacity: Arc>>, + ItemCollectionMetrics: Arc>> + } + } - impl Debug - for ReturnValue { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl PutItemOutput { + /// Returns a borrow of the field Attributes + pub fn Attributes(&self) -> &Arc, Arc>>> { + match self { + PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field ItemCollectionMetrics + pub fn ItemCollectionMetrics(&self) -> &Arc>> { + match self { + PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, + } + } + } - impl DafnyPrint - for ReturnValue { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReturnValue::NONE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValue.NONE")?; - Ok(()) - }, - ReturnValue::ALL_OLD{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValue.ALL__OLD")?; - Ok(()) - }, - ReturnValue::UPDATED_OLD{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValue.UPDATED__OLD")?; - Ok(()) - }, - ReturnValue::ALL_NEW{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValue.ALL__NEW")?; - Ok(()) - }, - ReturnValue::UPDATED_NEW{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValue.UPDATED__NEW")?; - Ok(()) - }, - } - } - } + impl Debug + for PutItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ReturnValue { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ReturnValue::NONE {}), Rc::new(ReturnValue::ALL_OLD {}), Rc::new(ReturnValue::UPDATED_OLD {}), Rc::new(ReturnValue::ALL_NEW {}), Rc::new(ReturnValue::UPDATED_NEW {})].iter() - } - } + impl DafnyPrint + for PutItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutItemOutput.PutItemOutput(")?; + DafnyPrint::fmt_print(Attributes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ReturnValue {} + impl Eq + for PutItemOutput {} + + impl Hash + for PutItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutItemOutput::PutItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + Hash::hash(Attributes, _state); + Hash::hash(ConsumedCapacity, _state); + Hash::hash(ItemCollectionMetrics, _state) + }, + } + } + } - impl Hash - for ReturnValue { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReturnValue::NONE{} => { + impl Default + for PutItemOutput { + fn default() -> PutItemOutput { + PutItemOutput::PutItemOutput { + Attributes: Default::default(), + ConsumedCapacity: Default::default(), + ItemCollectionMetrics: Default::default() + } + } + } - }, - ReturnValue::ALL_OLD{} => { + impl AsRef + for PutItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - ReturnValue::UPDATED_OLD{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2183,3) + #[derive(PartialEq, Clone)] + pub enum PutRequest { + PutRequest { + Item: Map, Arc> + } + } - }, - ReturnValue::ALL_NEW{} => { + impl PutRequest { + /// Returns a borrow of the field Item + pub fn Item(&self) -> &Map, Arc> { + match self { + PutRequest::PutRequest{Item, } => Item, + } + } + } - }, - ReturnValue::UPDATED_NEW{} => { + impl Debug + for PutRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for PutRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutRequest::PutRequest{Item, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutRequest.PutRequest(")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ReturnValue { - fn default() -> ReturnValue { - ReturnValue::NONE {} - } - } + impl Eq + for PutRequest {} - impl AsRef - for &ReturnValue { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for PutRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutRequest::PutRequest{Item, } => { + Hash::hash(Item, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ReturnValuesOnConditionCheckFailure { - ALL_OLD {}, - NONE {} - } + impl Default + for PutRequest { + fn default() -> PutRequest { + PutRequest::PutRequest { + Item: Default::default() + } + } + } - impl ReturnValuesOnConditionCheckFailure {} + impl AsRef + for PutRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ReturnValuesOnConditionCheckFailure { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2186,3) + #[derive(PartialEq, Clone)] + pub enum PutResourcePolicyInput { + PutResourcePolicyInput { + ResourceArn: Sequence, + Policy: Sequence, + ExpectedRevisionId: Arc>>, + ConfirmRemoveSelfResourceAccess: Arc> + } + } - impl DafnyPrint - for ReturnValuesOnConditionCheckFailure { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReturnValuesOnConditionCheckFailure::ALL_OLD{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValuesOnConditionCheckFailure.ALL__OLD")?; - Ok(()) - }, - ReturnValuesOnConditionCheckFailure::NONE{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReturnValuesOnConditionCheckFailure.NONE")?; - Ok(()) - }, - } - } - } + impl PutResourcePolicyInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ResourceArn, + } + } + /// Returns a borrow of the field Policy + pub fn Policy(&self) -> &Sequence { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => Policy, + } + } + /// Returns a borrow of the field ExpectedRevisionId + pub fn ExpectedRevisionId(&self) -> &Arc>> { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ExpectedRevisionId, + } + } + /// Returns a borrow of the field ConfirmRemoveSelfResourceAccess + pub fn ConfirmRemoveSelfResourceAccess(&self) -> &Arc> { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => ConfirmRemoveSelfResourceAccess, + } + } + } - impl ReturnValuesOnConditionCheckFailure { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ReturnValuesOnConditionCheckFailure::ALL_OLD {}), Rc::new(ReturnValuesOnConditionCheckFailure::NONE {})].iter() - } - } + impl Debug + for PutResourcePolicyInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ReturnValuesOnConditionCheckFailure {} + impl DafnyPrint + for PutResourcePolicyInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutResourcePolicyInput.PutResourcePolicyInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Policy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpectedRevisionId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConfirmRemoveSelfResourceAccess, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ReturnValuesOnConditionCheckFailure { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReturnValuesOnConditionCheckFailure::ALL_OLD{} => { + impl Eq + for PutResourcePolicyInput {} + + impl Hash + for PutResourcePolicyInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutResourcePolicyInput::PutResourcePolicyInput{ResourceArn, Policy, ExpectedRevisionId, ConfirmRemoveSelfResourceAccess, } => { + Hash::hash(ResourceArn, _state); + Hash::hash(Policy, _state); + Hash::hash(ExpectedRevisionId, _state); + Hash::hash(ConfirmRemoveSelfResourceAccess, _state) + }, + } + } + } - }, - ReturnValuesOnConditionCheckFailure::NONE{} => { + impl Default + for PutResourcePolicyInput { + fn default() -> PutResourcePolicyInput { + PutResourcePolicyInput::PutResourcePolicyInput { + ResourceArn: Default::default(), + Policy: Default::default(), + ExpectedRevisionId: Default::default(), + ConfirmRemoveSelfResourceAccess: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for PutResourcePolicyInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for ReturnValuesOnConditionCheckFailure { - fn default() -> ReturnValuesOnConditionCheckFailure { - ReturnValuesOnConditionCheckFailure::ALL_OLD {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2192,3) + #[derive(PartialEq, Clone)] + pub enum PutResourcePolicyOutput { + PutResourcePolicyOutput { + RevisionId: Arc>> + } + } - impl AsRef - for &ReturnValuesOnConditionCheckFailure { - fn as_ref(&self) -> Self { - self - } - } + impl PutResourcePolicyOutput { + /// Returns a borrow of the field RevisionId + pub fn RevisionId(&self) -> &Arc>> { + match self { + PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => RevisionId, + } + } + } - pub type S3Bucket = Sequence; + impl Debug + for PutResourcePolicyOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum S3BucketSource { - S3BucketSource { - S3BucketOwner: Rc>>, - S3Bucket: Sequence, - S3KeyPrefix: Rc>> - } - } + impl DafnyPrint + for PutResourcePolicyOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.PutResourcePolicyOutput.PutResourcePolicyOutput(")?; + DafnyPrint::fmt_print(RevisionId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl S3BucketSource { - pub fn S3BucketOwner(&self) -> &Rc>> { - match self { - S3BucketSource::S3BucketSource{S3BucketOwner, S3Bucket, S3KeyPrefix, } => S3BucketOwner, - } - } - pub fn S3Bucket(&self) -> &Sequence { - match self { - S3BucketSource::S3BucketSource{S3BucketOwner, S3Bucket, S3KeyPrefix, } => S3Bucket, - } - } - pub fn S3KeyPrefix(&self) -> &Rc>> { - match self { - S3BucketSource::S3BucketSource{S3BucketOwner, S3Bucket, S3KeyPrefix, } => S3KeyPrefix, - } - } - } + impl Eq + for PutResourcePolicyOutput {} - impl Debug - for S3BucketSource { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for PutResourcePolicyOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + PutResourcePolicyOutput::PutResourcePolicyOutput{RevisionId, } => { + Hash::hash(RevisionId, _state) + }, + } + } + } - impl DafnyPrint - for S3BucketSource { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - S3BucketSource::S3BucketSource{S3BucketOwner, S3Bucket, S3KeyPrefix, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.S3BucketSource.S3BucketSource(")?; - DafnyPrint::fmt_print(S3BucketOwner, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3Bucket, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(S3KeyPrefix, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for PutResourcePolicyOutput { + fn default() -> PutResourcePolicyOutput { + PutResourcePolicyOutput::PutResourcePolicyOutput { + RevisionId: Default::default() + } + } + } - impl Eq - for S3BucketSource {} + impl AsRef + for PutResourcePolicyOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for S3BucketSource { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - S3BucketSource::S3BucketSource{S3BucketOwner, S3Bucket, S3KeyPrefix, } => { - Hash::hash(S3BucketOwner, _state); - Hash::hash(S3Bucket, _state); - Hash::hash(S3KeyPrefix, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2195,3) + #[derive(PartialEq, Clone)] + pub enum QueryInput { + QueryInput { + TableName: Sequence, + IndexName: Arc>>, + Select: Arc>>, + AttributesToGet: Arc>, + Limit: Arc>, + ConsistentRead: Arc>, + KeyConditions: Arc, Arc>>>, + QueryFilter: Arc, Arc>>>, + ConditionalOperator: Arc>>, + ScanIndexForward: Arc>, + ExclusiveStartKey: Arc, Arc>>>, + ReturnConsumedCapacity: Arc>>, + ProjectionExpression: Arc>>, + FilterExpression: Arc>>, + KeyConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>> + } + } - impl Default - for S3BucketSource { - fn default() -> S3BucketSource { - S3BucketSource::S3BucketSource { - S3BucketOwner: Default::default(), - S3Bucket: Default::default(), - S3KeyPrefix: Default::default() - } - } - } + impl QueryInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => IndexName, + } + } + /// Returns a borrow of the field Select + pub fn Select(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Select, + } + } + /// Returns a borrow of the field AttributesToGet + pub fn AttributesToGet(&self) -> &Arc> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => AttributesToGet, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Limit, + } + } + /// Returns a borrow of the field ConsistentRead + pub fn ConsistentRead(&self) -> &Arc> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConsistentRead, + } + } + /// Returns a borrow of the field KeyConditions + pub fn KeyConditions(&self) -> &Arc, Arc>>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => KeyConditions, + } + } + /// Returns a borrow of the field QueryFilter + pub fn QueryFilter(&self) -> &Arc, Arc>>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => QueryFilter, + } + } + /// Returns a borrow of the field ConditionalOperator + pub fn ConditionalOperator(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, + } + } + /// Returns a borrow of the field ScanIndexForward + pub fn ScanIndexForward(&self) -> &Arc> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ScanIndexForward, + } + } + /// Returns a borrow of the field ExclusiveStartKey + pub fn ExclusiveStartKey(&self) -> &Arc, Arc>>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExclusiveStartKey, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ProjectionExpression + pub fn ProjectionExpression(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ProjectionExpression, + } + } + /// Returns a borrow of the field FilterExpression + pub fn FilterExpression(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => FilterExpression, + } + } + /// Returns a borrow of the field KeyConditionExpression + pub fn KeyConditionExpression(&self) -> &Arc>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => KeyConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, + } + } + } - impl AsRef - for &S3BucketSource { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for QueryInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type S3Prefix = Sequence; + impl DafnyPrint + for QueryInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.QueryInput.QueryInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Select, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyConditions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(QueryFilter, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScanIndexForward, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExclusiveStartKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(FilterExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum S3SseAlgorithm { - AES256 {}, - KMS {} - } + impl Eq + for QueryInput {} + + impl Hash + for QueryInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryInput::QueryInput{TableName, IndexName, Select, AttributesToGet, Limit, ConsistentRead, KeyConditions, QueryFilter, ConditionalOperator, ScanIndexForward, ExclusiveStartKey, ReturnConsumedCapacity, ProjectionExpression, FilterExpression, KeyConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state); + Hash::hash(Select, _state); + Hash::hash(AttributesToGet, _state); + Hash::hash(Limit, _state); + Hash::hash(ConsistentRead, _state); + Hash::hash(KeyConditions, _state); + Hash::hash(QueryFilter, _state); + Hash::hash(ConditionalOperator, _state); + Hash::hash(ScanIndexForward, _state); + Hash::hash(ExclusiveStartKey, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ProjectionExpression, _state); + Hash::hash(FilterExpression, _state); + Hash::hash(KeyConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state) + }, + } + } + } - impl S3SseAlgorithm {} + impl Default + for QueryInput { + fn default() -> QueryInput { + QueryInput::QueryInput { + TableName: Default::default(), + IndexName: Default::default(), + Select: Default::default(), + AttributesToGet: Default::default(), + Limit: Default::default(), + ConsistentRead: Default::default(), + KeyConditions: Default::default(), + QueryFilter: Default::default(), + ConditionalOperator: Default::default(), + ScanIndexForward: Default::default(), + ExclusiveStartKey: Default::default(), + ReturnConsumedCapacity: Default::default(), + ProjectionExpression: Default::default(), + FilterExpression: Default::default(), + KeyConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default() + } + } + } - impl Debug - for S3SseAlgorithm { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for QueryInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for S3SseAlgorithm { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - S3SseAlgorithm::AES256{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.S3SseAlgorithm.AES256")?; - Ok(()) - }, - S3SseAlgorithm::KMS{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.S3SseAlgorithm.KMS")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2214,3) + #[derive(PartialEq, Clone)] + pub enum QueryOutput { + QueryOutput { + Items: Arc, Arc>>>>, + Count: Arc>, + ScannedCount: Arc>, + LastEvaluatedKey: Arc, Arc>>>, + ConsumedCapacity: Arc>> + } + } - impl S3SseAlgorithm { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(S3SseAlgorithm::AES256 {}), Rc::new(S3SseAlgorithm::KMS {})].iter() - } - } + impl QueryOutput { + /// Returns a borrow of the field Items + pub fn Items(&self) -> &Arc, Arc>>>> { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Items, + } + } + /// Returns a borrow of the field Count + pub fn Count(&self) -> &Arc> { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Count, + } + } + /// Returns a borrow of the field ScannedCount + pub fn ScannedCount(&self) -> &Arc> { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ScannedCount, + } + } + /// Returns a borrow of the field LastEvaluatedKey + pub fn LastEvaluatedKey(&self) -> &Arc, Arc>>> { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => LastEvaluatedKey, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ConsumedCapacity, + } + } + } - impl Eq - for S3SseAlgorithm {} + impl Debug + for QueryOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for S3SseAlgorithm { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - S3SseAlgorithm::AES256{} => { + impl DafnyPrint + for QueryOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.QueryOutput.QueryOutput(")?; + DafnyPrint::fmt_print(Items, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Count, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ScannedCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastEvaluatedKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - S3SseAlgorithm::KMS{} => { + impl Eq + for QueryOutput {} + + impl Hash + for QueryOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + QueryOutput::QueryOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { + Hash::hash(Items, _state); + Hash::hash(Count, _state); + Hash::hash(ScannedCount, _state); + Hash::hash(LastEvaluatedKey, _state); + Hash::hash(ConsumedCapacity, _state) + }, + } + } + } - }, - } - } - } + impl Default + for QueryOutput { + fn default() -> QueryOutput { + QueryOutput::QueryOutput { + Items: Default::default(), + Count: Default::default(), + ScannedCount: Default::default(), + LastEvaluatedKey: Default::default(), + ConsumedCapacity: Default::default() + } + } + } - impl Default - for S3SseAlgorithm { - fn default() -> S3SseAlgorithm { - S3SseAlgorithm::AES256 {} - } - } + impl AsRef + for QueryOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &S3SseAlgorithm { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2222,3) + #[derive(PartialEq, Clone)] + pub enum Replica { + Replica { + RegionName: Arc>> + } + } - pub type S3SseKmsKeyId = Sequence; + impl Replica { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Arc>> { + match self { + Replica::Replica{RegionName, } => RegionName, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ScalarAttributeType { - S {}, - N {}, - B {} - } + impl Debug + for Replica { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ScalarAttributeType {} + impl DafnyPrint + for Replica { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Replica::Replica{RegionName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Replica.Replica(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ScalarAttributeType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for Replica {} - impl DafnyPrint - for ScalarAttributeType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScalarAttributeType::S{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ScalarAttributeType.S")?; - Ok(()) - }, - ScalarAttributeType::N{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ScalarAttributeType.N")?; - Ok(()) - }, - ScalarAttributeType::B{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ScalarAttributeType.B")?; - Ok(()) - }, - } - } - } + impl Hash + for Replica { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Replica::Replica{RegionName, } => { + Hash::hash(RegionName, _state) + }, + } + } + } - impl ScalarAttributeType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ScalarAttributeType::S {}), Rc::new(ScalarAttributeType::N {}), Rc::new(ScalarAttributeType::B {})].iter() - } - } + impl Default + for Replica { + fn default() -> Replica { + Replica::Replica { + RegionName: Default::default() + } + } + } - impl Eq - for ScalarAttributeType {} + impl AsRef + for Replica { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ScalarAttributeType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScalarAttributeType::S{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2225,3) + #[derive(PartialEq, Clone)] + pub enum ReplicaAutoScalingDescription { + ReplicaAutoScalingDescription { + RegionName: Arc>>, + GlobalSecondaryIndexes: Arc>>>, + ReplicaProvisionedReadCapacityAutoScalingSettings: Arc>>, + ReplicaProvisionedWriteCapacityAutoScalingSettings: Arc>>, + ReplicaStatus: Arc>> + } + } - }, - ScalarAttributeType::N{} => { + impl ReplicaAutoScalingDescription { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Arc>> { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => RegionName, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field ReplicaProvisionedReadCapacityAutoScalingSettings + pub fn ReplicaProvisionedReadCapacityAutoScalingSettings(&self) -> &Arc>> { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaProvisionedReadCapacityAutoScalingSettings, + } + } + /// Returns a borrow of the field ReplicaProvisionedWriteCapacityAutoScalingSettings + pub fn ReplicaProvisionedWriteCapacityAutoScalingSettings(&self) -> &Arc>> { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaProvisionedWriteCapacityAutoScalingSettings, + } + } + /// Returns a borrow of the field ReplicaStatus + pub fn ReplicaStatus(&self) -> &Arc>> { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => ReplicaStatus, + } + } + } - }, - ScalarAttributeType::B{} => { + impl Debug + for ReplicaAutoScalingDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } - - impl Default - for ScalarAttributeType { - fn default() -> ScalarAttributeType { - ScalarAttributeType::S {} - } - } - - impl AsRef - for &ScalarAttributeType { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ScanInput { - ScanInput { - TableName: Sequence, - IndexName: Rc>>, - AttributesToGet: Rc>, - Limit: Rc>, - Select: Rc>>, - ScanFilter: Rc, Rc>>>, - ConditionalOperator: Rc>>, - ExclusiveStartKey: Rc, Rc>>>, - ReturnConsumedCapacity: Rc>>, - TotalSegments: Rc>, - Segment: Rc>, - ProjectionExpression: Rc>>, - FilterExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>>, - ConsistentRead: Rc> - } - } - - impl ScanInput { - pub fn TableName(&self) -> &Sequence { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => TableName, - } - } - pub fn IndexName(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => IndexName, - } - } - pub fn AttributesToGet(&self) -> &Rc> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => AttributesToGet, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => Limit, - } - } - pub fn Select(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => Select, - } - } - pub fn ScanFilter(&self) -> &Rc, Rc>>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ScanFilter, - } - } - pub fn ConditionalOperator(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ConditionalOperator, - } - } - pub fn ExclusiveStartKey(&self) -> &Rc, Rc>>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ExclusiveStartKey, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ReturnConsumedCapacity, - } - } - pub fn TotalSegments(&self) -> &Rc> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => TotalSegments, - } - } - pub fn Segment(&self) -> &Rc> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => Segment, - } - } - pub fn ProjectionExpression(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ProjectionExpression, - } - } - pub fn FilterExpression(&self) -> &Rc>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => FilterExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ExpressionAttributeValues, - } - } - pub fn ConsistentRead(&self) -> &Rc> { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => ConsistentRead, - } - } - } - - impl Debug - for ScanInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for ReplicaAutoScalingDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaAutoScalingDescription.ReplicaAutoScalingDescription(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingSettings, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaProvisionedWriteCapacityAutoScalingSettings, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaStatus, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ScanInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ScanInput.ScanInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributesToGet, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Select, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScanFilter, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExclusiveStartKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TotalSegments, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Segment, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProjectionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(FilterExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsistentRead, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for ReplicaAutoScalingDescription {} + + impl Hash + for ReplicaAutoScalingDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription{RegionName, GlobalSecondaryIndexes, ReplicaProvisionedReadCapacityAutoScalingSettings, ReplicaProvisionedWriteCapacityAutoScalingSettings, ReplicaStatus, } => { + Hash::hash(RegionName, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(ReplicaProvisionedReadCapacityAutoScalingSettings, _state); + Hash::hash(ReplicaProvisionedWriteCapacityAutoScalingSettings, _state); + Hash::hash(ReplicaStatus, _state) + }, + } + } + } - impl Eq - for ScanInput {} + impl Default + for ReplicaAutoScalingDescription { + fn default() -> ReplicaAutoScalingDescription { + ReplicaAutoScalingDescription::ReplicaAutoScalingDescription { + RegionName: Default::default(), + GlobalSecondaryIndexes: Default::default(), + ReplicaProvisionedReadCapacityAutoScalingSettings: Default::default(), + ReplicaProvisionedWriteCapacityAutoScalingSettings: Default::default(), + ReplicaStatus: Default::default() + } + } + } - impl Hash - for ScanInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanInput::ScanInput{TableName, IndexName, AttributesToGet, Limit, Select, ScanFilter, ConditionalOperator, ExclusiveStartKey, ReturnConsumedCapacity, TotalSegments, Segment, ProjectionExpression, FilterExpression, ExpressionAttributeNames, ExpressionAttributeValues, ConsistentRead, } => { - Hash::hash(TableName, _state); - Hash::hash(IndexName, _state); - Hash::hash(AttributesToGet, _state); - Hash::hash(Limit, _state); - Hash::hash(Select, _state); - Hash::hash(ScanFilter, _state); - Hash::hash(ConditionalOperator, _state); - Hash::hash(ExclusiveStartKey, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(TotalSegments, _state); - Hash::hash(Segment, _state); - Hash::hash(ProjectionExpression, _state); - Hash::hash(FilterExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state); - Hash::hash(ConsistentRead, _state) - }, - } - } - } - - impl Default - for ScanInput { - fn default() -> ScanInput { - ScanInput::ScanInput { - TableName: Default::default(), - IndexName: Default::default(), - AttributesToGet: Default::default(), - Limit: Default::default(), - Select: Default::default(), - ScanFilter: Default::default(), - ConditionalOperator: Default::default(), - ExclusiveStartKey: Default::default(), - ReturnConsumedCapacity: Default::default(), - TotalSegments: Default::default(), - Segment: Default::default(), - ProjectionExpression: Default::default(), - FilterExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default(), - ConsistentRead: Default::default() - } - } - } - - impl AsRef - for &ScanInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ScanOutput { - ScanOutput { - Items: Rc, Rc>>>>, - Count: Rc>, - ScannedCount: Rc>, - LastEvaluatedKey: Rc, Rc>>>, - ConsumedCapacity: Rc>> - } - } - - impl ScanOutput { - pub fn Items(&self) -> &Rc, Rc>>>> { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Items, - } - } - pub fn Count(&self) -> &Rc> { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => Count, - } - } - pub fn ScannedCount(&self) -> &Rc> { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ScannedCount, - } - } - pub fn LastEvaluatedKey(&self) -> &Rc, Rc>>> { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => LastEvaluatedKey, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => ConsumedCapacity, - } - } - } - - impl Debug - for ScanOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ReplicaAutoScalingDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ScanOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ScanOutput.ScanOutput(")?; - DafnyPrint::fmt_print(Items, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Count, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ScannedCount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastEvaluatedKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2233,3) + #[derive(PartialEq, Clone)] + pub enum ReplicaAutoScalingUpdate { + ReplicaAutoScalingUpdate { + RegionName: Sequence, + ReplicaGlobalSecondaryIndexUpdates: Arc>>>, + ReplicaProvisionedReadCapacityAutoScalingUpdate: Arc>> + } + } - impl Eq - for ScanOutput {} + impl ReplicaAutoScalingUpdate { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => RegionName, + } + } + /// Returns a borrow of the field ReplicaGlobalSecondaryIndexUpdates + pub fn ReplicaGlobalSecondaryIndexUpdates(&self) -> &Arc>>> { + match self { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => ReplicaGlobalSecondaryIndexUpdates, + } + } + /// Returns a borrow of the field ReplicaProvisionedReadCapacityAutoScalingUpdate + pub fn ReplicaProvisionedReadCapacityAutoScalingUpdate(&self) -> &Arc>> { + match self { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => ReplicaProvisionedReadCapacityAutoScalingUpdate, + } + } + } - impl Hash - for ScanOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScanOutput::ScanOutput{Items, Count, ScannedCount, LastEvaluatedKey, ConsumedCapacity, } => { - Hash::hash(Items, _state); - Hash::hash(Count, _state); - Hash::hash(ScannedCount, _state); - Hash::hash(LastEvaluatedKey, _state); - Hash::hash(ConsumedCapacity, _state) - }, - } - } - } + impl Debug + for ReplicaAutoScalingUpdate { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ScanOutput { - fn default() -> ScanOutput { - ScanOutput::ScanOutput { - Items: Default::default(), - Count: Default::default(), - ScannedCount: Default::default(), - LastEvaluatedKey: Default::default(), - ConsumedCapacity: Default::default() - } - } - } + impl DafnyPrint + for ReplicaAutoScalingUpdate { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaAutoScalingUpdate.ReplicaAutoScalingUpdate(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaGlobalSecondaryIndexUpdates, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaProvisionedReadCapacityAutoScalingUpdate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ScanOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for ReplicaAutoScalingUpdate {} + + impl Hash + for ReplicaAutoScalingUpdate { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate{RegionName, ReplicaGlobalSecondaryIndexUpdates, ReplicaProvisionedReadCapacityAutoScalingUpdate, } => { + Hash::hash(RegionName, _state); + Hash::hash(ReplicaGlobalSecondaryIndexUpdates, _state); + Hash::hash(ReplicaProvisionedReadCapacityAutoScalingUpdate, _state) + }, + } + } + } - pub type ScanSegment = i32; + impl Default + for ReplicaAutoScalingUpdate { + fn default() -> ReplicaAutoScalingUpdate { + ReplicaAutoScalingUpdate::ReplicaAutoScalingUpdate { + RegionName: Default::default(), + ReplicaGlobalSecondaryIndexUpdates: Default::default(), + ReplicaProvisionedReadCapacityAutoScalingUpdate: Default::default() + } + } + } - pub type ScanTotalSegments = i32; + impl AsRef + for ReplicaAutoScalingUpdate { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum Select { - ALL_ATTRIBUTES {}, - ALL_PROJECTED_ATTRIBUTES {}, - SPECIFIC_ATTRIBUTES {}, - COUNT {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2238,3) + pub type ReplicaAutoScalingUpdateList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2242,3) + #[derive(PartialEq, Clone)] + pub enum ReplicaDescription { + ReplicaDescription { + RegionName: Arc>>, + ReplicaStatus: Arc>>, + ReplicaStatusDescription: Arc>>, + ReplicaStatusPercentProgress: Arc>>, + KMSMasterKeyId: Arc>>, + ProvisionedThroughputOverride: Arc>>, + OnDemandThroughputOverride: Arc>>, + GlobalSecondaryIndexes: Arc>>>, + ReplicaInaccessibleDateTime: Arc>>, + ReplicaTableClassSummary: Arc>> + } + } - impl Select {} + impl ReplicaDescription { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => RegionName, + } + } + /// Returns a borrow of the field ReplicaStatus + pub fn ReplicaStatus(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatus, + } + } + /// Returns a borrow of the field ReplicaStatusDescription + pub fn ReplicaStatusDescription(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatusDescription, + } + } + /// Returns a borrow of the field ReplicaStatusPercentProgress + pub fn ReplicaStatusPercentProgress(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaStatusPercentProgress, + } + } + /// Returns a borrow of the field KMSMasterKeyId + pub fn KMSMasterKeyId(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => KMSMasterKeyId, + } + } + /// Returns a borrow of the field ProvisionedThroughputOverride + pub fn ProvisionedThroughputOverride(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ProvisionedThroughputOverride, + } + } + /// Returns a borrow of the field OnDemandThroughputOverride + pub fn OnDemandThroughputOverride(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => OnDemandThroughputOverride, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field ReplicaInaccessibleDateTime + pub fn ReplicaInaccessibleDateTime(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaInaccessibleDateTime, + } + } + /// Returns a borrow of the field ReplicaTableClassSummary + pub fn ReplicaTableClassSummary(&self) -> &Arc>> { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => ReplicaTableClassSummary, + } + } + } - impl Debug - for Select { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ReplicaDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for Select { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Select::ALL_ATTRIBUTES{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Select.ALL__ATTRIBUTES")?; - Ok(()) - }, - Select::ALL_PROJECTED_ATTRIBUTES{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Select.ALL__PROJECTED__ATTRIBUTES")?; - Ok(()) - }, - Select::SPECIFIC_ATTRIBUTES{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Select.SPECIFIC__ATTRIBUTES")?; - Ok(()) - }, - Select::COUNT{} => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Select.COUNT")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ReplicaDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.ReplicaDescription.ReplicaDescription(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaStatusDescription, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaStatusPercentProgress, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaInaccessibleDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaTableClassSummary, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Select { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(Select::ALL_ATTRIBUTES {}), Rc::new(Select::ALL_PROJECTED_ATTRIBUTES {}), Rc::new(Select::SPECIFIC_ATTRIBUTES {}), Rc::new(Select::COUNT {})].iter() - } - } + impl Eq + for ReplicaDescription {} + + impl Hash + for ReplicaDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ReplicaDescription::ReplicaDescription{RegionName, ReplicaStatus, ReplicaStatusDescription, ReplicaStatusPercentProgress, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, ReplicaInaccessibleDateTime, ReplicaTableClassSummary, } => { + Hash::hash(RegionName, _state); + Hash::hash(ReplicaStatus, _state); + Hash::hash(ReplicaStatusDescription, _state); + Hash::hash(ReplicaStatusPercentProgress, _state); + Hash::hash(KMSMasterKeyId, _state); + Hash::hash(ProvisionedThroughputOverride, _state); + Hash::hash(OnDemandThroughputOverride, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(ReplicaInaccessibleDateTime, _state); + Hash::hash(ReplicaTableClassSummary, _state) + }, + } + } + } - impl Eq - for Select {} + impl Default + for ReplicaDescription { + fn default() -> ReplicaDescription { + ReplicaDescription::ReplicaDescription { + RegionName: Default::default(), + ReplicaStatus: Default::default(), + ReplicaStatusDescription: Default::default(), + ReplicaStatusPercentProgress: Default::default(), + KMSMasterKeyId: Default::default(), + ProvisionedThroughputOverride: Default::default(), + OnDemandThroughputOverride: Default::default(), + GlobalSecondaryIndexes: Default::default(), + ReplicaInaccessibleDateTime: Default::default(), + ReplicaTableClassSummary: Default::default() + } + } + } - impl Hash - for Select { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Select::ALL_ATTRIBUTES{} => { + impl AsRef + for ReplicaDescription { + fn as_ref(&self) -> &Self { + self + } + } - }, - Select::ALL_PROJECTED_ATTRIBUTES{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2255,3) + #[derive(PartialEq, Clone)] + pub enum ReplicaGlobalSecondaryIndex { + ReplicaGlobalSecondaryIndex { + IndexName: Sequence, + ProvisionedThroughputOverride: Arc>>, + OnDemandThroughputOverride: Arc>> + } + } - }, - Select::SPECIFIC_ATTRIBUTES{} => { + impl ReplicaGlobalSecondaryIndex { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => IndexName, + } + } + /// Returns a borrow of the field ProvisionedThroughputOverride + pub fn ProvisionedThroughputOverride(&self) -> &Arc>> { + match self { + ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => ProvisionedThroughputOverride, + } + } + /// Returns a borrow of the field OnDemandThroughputOverride + pub fn OnDemandThroughputOverride(&self) -> &Arc>> { + match self { + ReplicaGlobalSecondaryIndex::ReplicaGlobalSecondaryIndex{IndexName, ProvisionedThroughputOverride, OnDemandThroughputOverride, } => OnDemandThroughputOverride, + } + } + } - }, - Select::COUNT{} => { + impl Debug + for ReplicaGlobalSecondaryIndex { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } - - impl Default - for Select { - fn default() -> Select { - Select::ALL_ATTRIBUTES {} - } - } - - impl AsRef + for Select { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &UpdateContributorInsightsOutput { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2469,3) + #[derive(PartialEq, Clone)] + pub enum SourceTableDetails { + SourceTableDetails { + TableName: Sequence, + TableId: Sequence, + TableArn: Arc>>, + TableSizeBytes: Arc>, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + TableCreationDateTime: Sequence, + ProvisionedThroughput: Arc, + OnDemandThroughput: Arc>>, + ItemCount: Arc>, + BillingMode: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateGlobalSecondaryIndexAction { - UpdateGlobalSecondaryIndexAction { - IndexName: Sequence, - ProvisionedThroughput: Rc>>, - OnDemandThroughput: Rc>> - } - } + impl SourceTableDetails { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => TableName, + } + } + /// Returns a borrow of the field TableId + pub fn TableId(&self) -> &Sequence { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => TableId, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => TableArn, + } + } + /// Returns a borrow of the field TableSizeBytes + pub fn TableSizeBytes(&self) -> &Arc> { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => TableSizeBytes, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => KeySchema, + } + } + /// Returns a borrow of the field TableCreationDateTime + pub fn TableCreationDateTime(&self) -> &Sequence { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => TableCreationDateTime, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => OnDemandThroughput, + } + } + /// Returns a borrow of the field ItemCount + pub fn ItemCount(&self) -> &Arc> { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => ItemCount, + } + } + /// Returns a borrow of the field BillingMode + pub fn BillingMode(&self) -> &Arc>> { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => BillingMode, + } + } + } - impl UpdateGlobalSecondaryIndexAction { - pub fn IndexName(&self) -> &Sequence { - match self { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => IndexName, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, - } - } - } + impl Debug + for SourceTableDetails { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for UpdateGlobalSecondaryIndexAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for SourceTableDetails { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SourceTableDetails.SourceTableDetails(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableCreationDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BillingMode, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for UpdateGlobalSecondaryIndexAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalSecondaryIndexAction.UpdateGlobalSecondaryIndexAction(")?; - DafnyPrint::fmt_print(IndexName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for SourceTableDetails {} + + impl Hash + for SourceTableDetails { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SourceTableDetails::SourceTableDetails{TableName, TableId, TableArn, TableSizeBytes, KeySchema, TableCreationDateTime, ProvisionedThroughput, OnDemandThroughput, ItemCount, BillingMode, } => { + Hash::hash(TableName, _state); + Hash::hash(TableId, _state); + Hash::hash(TableArn, _state); + Hash::hash(TableSizeBytes, _state); + Hash::hash(KeySchema, _state); + Hash::hash(TableCreationDateTime, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state); + Hash::hash(ItemCount, _state); + Hash::hash(BillingMode, _state) + }, + } + } + } - impl Eq - for UpdateGlobalSecondaryIndexAction {} + impl Default + for SourceTableDetails { + fn default() -> SourceTableDetails { + SourceTableDetails::SourceTableDetails { + TableName: Default::default(), + TableId: Default::default(), + TableArn: Default::default(), + TableSizeBytes: Default::default(), + KeySchema: Default::default(), + TableCreationDateTime: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default(), + ItemCount: Default::default(), + BillingMode: Default::default() + } + } + } - impl Hash - for UpdateGlobalSecondaryIndexAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => { - Hash::hash(IndexName, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } + impl AsRef + for SourceTableDetails { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for UpdateGlobalSecondaryIndexAction { - fn default() -> UpdateGlobalSecondaryIndexAction { - UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction { - IndexName: Default::default(), - ProvisionedThroughput: Default::default(), - OnDemandThroughput: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2481,3) + #[derive(PartialEq, Clone)] + pub enum SourceTableFeatureDetails { + SourceTableFeatureDetails { + LocalSecondaryIndexes: Arc>>>, + GlobalSecondaryIndexes: Arc>>>, + StreamDescription: Arc>>, + TimeToLiveDescription: Arc>>, + SSEDescription: Arc>> + } + } - impl AsRef - for &UpdateGlobalSecondaryIndexAction { - fn as_ref(&self) -> Self { - self - } - } + impl SourceTableFeatureDetails { + /// Returns a borrow of the field LocalSecondaryIndexes + pub fn LocalSecondaryIndexes(&self) -> &Arc>>> { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => LocalSecondaryIndexes, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field StreamDescription + pub fn StreamDescription(&self) -> &Arc>> { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => StreamDescription, + } + } + /// Returns a borrow of the field TimeToLiveDescription + pub fn TimeToLiveDescription(&self) -> &Arc>> { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => TimeToLiveDescription, + } + } + /// Returns a borrow of the field SSEDescription + pub fn SSEDescription(&self) -> &Arc>> { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => SSEDescription, + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateGlobalTableInput { - UpdateGlobalTableInput { - GlobalTableName: Sequence, - ReplicaUpdates: Sequence> - } - } + impl Debug + for SourceTableFeatureDetails { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl UpdateGlobalTableInput { - pub fn GlobalTableName(&self) -> &Sequence { - match self { - UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => GlobalTableName, - } - } - pub fn ReplicaUpdates(&self) -> &Sequence> { - match self { - UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => ReplicaUpdates, - } - } - } + impl DafnyPrint + for SourceTableFeatureDetails { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SourceTableFeatureDetails.SourceTableFeatureDetails(")?; + DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamDescription, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TimeToLiveDescription, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSEDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for UpdateGlobalTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for SourceTableFeatureDetails {} + + impl Hash + for SourceTableFeatureDetails { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SourceTableFeatureDetails::SourceTableFeatureDetails{LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamDescription, TimeToLiveDescription, SSEDescription, } => { + Hash::hash(LocalSecondaryIndexes, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(StreamDescription, _state); + Hash::hash(TimeToLiveDescription, _state); + Hash::hash(SSEDescription, _state) + }, + } + } + } - impl DafnyPrint - for UpdateGlobalTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableInput.UpdateGlobalTableInput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for SourceTableFeatureDetails { + fn default() -> SourceTableFeatureDetails { + SourceTableFeatureDetails::SourceTableFeatureDetails { + LocalSecondaryIndexes: Default::default(), + GlobalSecondaryIndexes: Default::default(), + StreamDescription: Default::default(), + TimeToLiveDescription: Default::default(), + SSEDescription: Default::default() + } + } + } - impl Eq - for UpdateGlobalTableInput {} + impl AsRef + for SourceTableFeatureDetails { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for UpdateGlobalTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(ReplicaUpdates, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2488,3) + #[derive(PartialEq, Clone)] + pub enum SSEDescription { + SSEDescription { + Status: Arc>>, + SSEType: Arc>>, + KMSMasterKeyArn: Arc>>, + InaccessibleEncryptionDateTime: Arc>> + } + } - impl Default - for UpdateGlobalTableInput { - fn default() -> UpdateGlobalTableInput { - UpdateGlobalTableInput::UpdateGlobalTableInput { - GlobalTableName: Default::default(), - ReplicaUpdates: Default::default() - } - } - } + impl SSEDescription { + /// Returns a borrow of the field Status + pub fn Status(&self) -> &Arc>> { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => Status, + } + } + /// Returns a borrow of the field SSEType + pub fn SSEType(&self) -> &Arc>> { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => SSEType, + } + } + /// Returns a borrow of the field KMSMasterKeyArn + pub fn KMSMasterKeyArn(&self) -> &Arc>> { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => KMSMasterKeyArn, + } + } + /// Returns a borrow of the field InaccessibleEncryptionDateTime + pub fn InaccessibleEncryptionDateTime(&self) -> &Arc>> { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => InaccessibleEncryptionDateTime, + } + } + } - impl AsRef - for &UpdateGlobalTableInput { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for SSEDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateGlobalTableOutput { - UpdateGlobalTableOutput { - GlobalTableDescription: Rc>> - } - } + impl DafnyPrint + for SSEDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEDescription.SSEDescription(")?; + DafnyPrint::fmt_print(Status, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSEType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KMSMasterKeyArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(InaccessibleEncryptionDateTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl UpdateGlobalTableOutput { - pub fn GlobalTableDescription(&self) -> &Rc>> { - match self { - UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, - } - } - } + impl Eq + for SSEDescription {} + + impl Hash + for SSEDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SSEDescription::SSEDescription{Status, SSEType, KMSMasterKeyArn, InaccessibleEncryptionDateTime, } => { + Hash::hash(Status, _state); + Hash::hash(SSEType, _state); + Hash::hash(KMSMasterKeyArn, _state); + Hash::hash(InaccessibleEncryptionDateTime, _state) + }, + } + } + } - impl Debug - for UpdateGlobalTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for SSEDescription { + fn default() -> SSEDescription { + SSEDescription::SSEDescription { + Status: Default::default(), + SSEType: Default::default(), + KMSMasterKeyArn: Default::default(), + InaccessibleEncryptionDateTime: Default::default() + } + } + } - impl DafnyPrint - for UpdateGlobalTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableOutput.UpdateGlobalTableOutput(")?; - DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for SSEDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for UpdateGlobalTableOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2495,3) + #[derive(PartialEq, Clone)] + pub enum SSESpecification { + SSESpecification { + Enabled: Arc>, + SSEType: Arc>>, + KMSMasterKeyId: Arc>> + } + } - impl Hash - for UpdateGlobalTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => { - Hash::hash(GlobalTableDescription, _state) - }, - } - } - } - - impl Default - for UpdateGlobalTableOutput { - fn default() -> UpdateGlobalTableOutput { - UpdateGlobalTableOutput::UpdateGlobalTableOutput { - GlobalTableDescription: Default::default() - } - } - } - - impl AsRef - for &UpdateGlobalTableOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateGlobalTableSettingsInput { - UpdateGlobalTableSettingsInput { - GlobalTableName: Sequence, - GlobalTableBillingMode: Rc>>, - GlobalTableProvisionedWriteCapacityUnits: Rc>, - GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: Rc>>, - GlobalTableGlobalSecondaryIndexSettingsUpdate: Rc>, - ReplicaSettingsUpdate: Rc> - } - } - - impl UpdateGlobalTableSettingsInput { - pub fn GlobalTableName(&self) -> &Sequence { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableName, - } - } - pub fn GlobalTableBillingMode(&self) -> &Rc>> { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableBillingMode, - } - } - pub fn GlobalTableProvisionedWriteCapacityUnits(&self) -> &Rc> { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableProvisionedWriteCapacityUnits, - } - } - pub fn GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate(&self) -> &Rc>> { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, - } - } - pub fn GlobalTableGlobalSecondaryIndexSettingsUpdate(&self) -> &Rc> { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableGlobalSecondaryIndexSettingsUpdate, - } - } - pub fn ReplicaSettingsUpdate(&self) -> &Rc> { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => ReplicaSettingsUpdate, - } - } - } - - impl Debug - for UpdateGlobalTableSettingsInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl SSESpecification { + /// Returns a borrow of the field Enabled + pub fn Enabled(&self) -> &Arc> { + match self { + SSESpecification::SSESpecification{Enabled, SSEType, KMSMasterKeyId, } => Enabled, + } + } + /// Returns a borrow of the field SSEType + pub fn SSEType(&self) -> &Arc>> { + match self { + SSESpecification::SSESpecification{Enabled, SSEType, KMSMasterKeyId, } => SSEType, + } + } + /// Returns a borrow of the field KMSMasterKeyId + pub fn KMSMasterKeyId(&self) -> &Arc>> { + match self { + SSESpecification::SSESpecification{Enabled, SSEType, KMSMasterKeyId, } => KMSMasterKeyId, + } + } + } - impl DafnyPrint - for UpdateGlobalTableSettingsInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableSettingsInput.UpdateGlobalTableSettingsInput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableBillingMode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableProvisionedWriteCapacityUnits, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalTableGlobalSecondaryIndexSettingsUpdate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaSettingsUpdate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for SSESpecification { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for UpdateGlobalTableSettingsInput {} + impl DafnyPrint + for SSESpecification { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SSESpecification::SSESpecification{Enabled, SSEType, KMSMasterKeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSESpecification.SSESpecification(")?; + DafnyPrint::fmt_print(Enabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSEType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for UpdateGlobalTableSettingsInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(GlobalTableBillingMode, _state); - Hash::hash(GlobalTableProvisionedWriteCapacityUnits, _state); - Hash::hash(GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, _state); - Hash::hash(GlobalTableGlobalSecondaryIndexSettingsUpdate, _state); - Hash::hash(ReplicaSettingsUpdate, _state) - }, - } - } - } - - impl Default - for UpdateGlobalTableSettingsInput { - fn default() -> UpdateGlobalTableSettingsInput { - UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput { - GlobalTableName: Default::default(), - GlobalTableBillingMode: Default::default(), - GlobalTableProvisionedWriteCapacityUnits: Default::default(), - GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: Default::default(), - GlobalTableGlobalSecondaryIndexSettingsUpdate: Default::default(), - ReplicaSettingsUpdate: Default::default() - } - } - } - - impl AsRef - for &UpdateGlobalTableSettingsInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateGlobalTableSettingsOutput { - UpdateGlobalTableSettingsOutput { - GlobalTableName: Rc>>, - ReplicaSettings: Rc>>> - } - } - - impl UpdateGlobalTableSettingsOutput { - pub fn GlobalTableName(&self) -> &Rc>> { - match self { - UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => GlobalTableName, - } - } - pub fn ReplicaSettings(&self) -> &Rc>>> { - match self { - UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => ReplicaSettings, - } - } - } - - impl Debug - for UpdateGlobalTableSettingsOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for SSESpecification {} + + impl Hash + for SSESpecification { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SSESpecification::SSESpecification{Enabled, SSEType, KMSMasterKeyId, } => { + Hash::hash(Enabled, _state); + Hash::hash(SSEType, _state); + Hash::hash(KMSMasterKeyId, _state) + }, + } + } + } - impl DafnyPrint - for UpdateGlobalTableSettingsOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableSettingsOutput.UpdateGlobalTableSettingsOutput(")?; - DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaSettings, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for SSESpecification { + fn default() -> SSESpecification { + SSESpecification::SSESpecification { + Enabled: Default::default(), + SSEType: Default::default(), + KMSMasterKeyId: Default::default() + } + } + } - impl Eq - for UpdateGlobalTableSettingsOutput {} + impl AsRef + for SSESpecification { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for UpdateGlobalTableSettingsOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { - Hash::hash(GlobalTableName, _state); - Hash::hash(ReplicaSettings, _state) - }, - } - } - } - - impl Default - for UpdateGlobalTableSettingsOutput { - fn default() -> UpdateGlobalTableSettingsOutput { - UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput { - GlobalTableName: Default::default(), - ReplicaSettings: Default::default() - } - } - } - - impl AsRef - for &UpdateGlobalTableSettingsOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateItemInput { - UpdateItemInput { - TableName: Sequence, - Key: Map, Rc>, - AttributeUpdates: Rc, Rc>>>, - Expected: Rc, Rc>>>, - ConditionalOperator: Rc>>, - ReturnValues: Rc>>, - ReturnConsumedCapacity: Rc>>, - ReturnItemCollectionMetrics: Rc>>, - UpdateExpression: Rc>>, - ConditionExpression: Rc>>, - ExpressionAttributeNames: Rc, Sequence>>>, - ExpressionAttributeValues: Rc, Rc>>> - } - } - - impl UpdateItemInput { - pub fn TableName(&self) -> &Sequence { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, - } - } - pub fn Key(&self) -> &Map, Rc> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Key, - } - } - pub fn AttributeUpdates(&self) -> &Rc, Rc>>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => AttributeUpdates, - } - } - pub fn Expected(&self) -> &Rc, Rc>>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, - } - } - pub fn ConditionalOperator(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, - } - } - pub fn ReturnValues(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, - } - } - pub fn ReturnConsumedCapacity(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, - } - } - pub fn ReturnItemCollectionMetrics(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, - } - } - pub fn UpdateExpression(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => UpdateExpression, - } - } - pub fn ConditionExpression(&self) -> &Rc>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, - } - } - pub fn ExpressionAttributeNames(&self) -> &Rc, Sequence>>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, - } - } - pub fn ExpressionAttributeValues(&self) -> &Rc, Rc>>> { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, - } - } - } - - impl Debug - for UpdateItemInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2500,3) + #[derive(PartialEq, Clone)] + pub enum SSEStatus { + ENABLING {}, + ENABLED {}, + DISABLING {}, + DISABLED {}, + UPDATING {} + } - impl DafnyPrint - for UpdateItemInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateItemInput.UpdateItemInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Key, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttributeUpdates, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Expected, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UpdateExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl SSEStatus {} - impl Eq - for UpdateItemInput {} + impl Debug + for SSEStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for UpdateItemInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { - Hash::hash(TableName, _state); - Hash::hash(Key, _state); - Hash::hash(AttributeUpdates, _state); - Hash::hash(Expected, _state); - Hash::hash(ConditionalOperator, _state); - Hash::hash(ReturnValues, _state); - Hash::hash(ReturnConsumedCapacity, _state); - Hash::hash(ReturnItemCollectionMetrics, _state); - Hash::hash(UpdateExpression, _state); - Hash::hash(ConditionExpression, _state); - Hash::hash(ExpressionAttributeNames, _state); - Hash::hash(ExpressionAttributeValues, _state) - }, - } - } - } - - impl Default - for UpdateItemInput { - fn default() -> UpdateItemInput { - UpdateItemInput::UpdateItemInput { - TableName: Default::default(), - Key: Default::default(), - AttributeUpdates: Default::default(), - Expected: Default::default(), - ConditionalOperator: Default::default(), - ReturnValues: Default::default(), - ReturnConsumedCapacity: Default::default(), - ReturnItemCollectionMetrics: Default::default(), - UpdateExpression: Default::default(), - ConditionExpression: Default::default(), - ExpressionAttributeNames: Default::default(), - ExpressionAttributeValues: Default::default() - } - } - } - - impl AsRef - for &UpdateItemInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateItemOutput { - UpdateItemOutput { - Attributes: Rc, Rc>>>, - ConsumedCapacity: Rc>>, - ItemCollectionMetrics: Rc>> - } - } - - impl UpdateItemOutput { - pub fn Attributes(&self) -> &Rc, Rc>>> { - match self { - UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, - } - } - pub fn ConsumedCapacity(&self) -> &Rc>> { - match self { - UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, - } - } - pub fn ItemCollectionMetrics(&self) -> &Rc>> { - match self { - UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, - } - } - } - - impl Debug - for UpdateItemOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for SSEStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SSEStatus::ENABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEStatus.ENABLING")?; + Ok(()) + }, + SSEStatus::ENABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEStatus.ENABLED")?; + Ok(()) + }, + SSEStatus::DISABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEStatus.DISABLING")?; + Ok(()) + }, + SSEStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEStatus.DISABLED")?; + Ok(()) + }, + SSEStatus::UPDATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEStatus.UPDATING")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for UpdateItemOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateItemOutput.UpdateItemOutput(")?; - DafnyPrint::fmt_print(Attributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl SSEStatus { + /// Enumerates all possible values of SSEStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(SSEStatus::ENABLING {}), Arc::new(SSEStatus::ENABLED {}), Arc::new(SSEStatus::DISABLING {}), Arc::new(SSEStatus::DISABLED {}), Arc::new(SSEStatus::UPDATING {})].iter() + } + } - impl Eq - for UpdateItemOutput {} + impl Eq + for SSEStatus {} - impl Hash - for UpdateItemOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { - Hash::hash(Attributes, _state); - Hash::hash(ConsumedCapacity, _state); - Hash::hash(ItemCollectionMetrics, _state) - }, - } - } - } + impl Hash + for SSEStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SSEStatus::ENABLING{} => { - impl Default - for UpdateItemOutput { - fn default() -> UpdateItemOutput { - UpdateItemOutput::UpdateItemOutput { - Attributes: Default::default(), - ConsumedCapacity: Default::default(), - ItemCollectionMetrics: Default::default() - } - } - } + }, + SSEStatus::ENABLED{} => { - impl AsRef - for &UpdateItemOutput { - fn as_ref(&self) -> Self { - self - } - } + }, + SSEStatus::DISABLING{} => { - #[derive(PartialEq, Clone)] - pub enum UpdateKinesisStreamingConfiguration { - UpdateKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: Rc>> - } - } + }, + SSEStatus::DISABLED{} => { - impl UpdateKinesisStreamingConfiguration { - pub fn ApproximateCreationDateTimePrecision(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, - } - } - } + }, + SSEStatus::UPDATING{} => { - impl Debug - for UpdateKinesisStreamingConfiguration { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for UpdateKinesisStreamingConfiguration { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingConfiguration.UpdateKinesisStreamingConfiguration(")?; - DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for SSEStatus { + fn default() -> SSEStatus { + SSEStatus::ENABLING {} + } + } - impl Eq - for UpdateKinesisStreamingConfiguration {} + impl AsRef + for SSEStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for UpdateKinesisStreamingConfiguration { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { - Hash::hash(ApproximateCreationDateTimePrecision, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2506,3) + #[derive(PartialEq, Clone)] + pub enum SSEType { + AES256 {}, + KMS {} + } - impl Default - for UpdateKinesisStreamingConfiguration { - fn default() -> UpdateKinesisStreamingConfiguration { - UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration { - ApproximateCreationDateTimePrecision: Default::default() - } - } - } + impl SSEType {} - impl AsRef - for &UpdateKinesisStreamingConfiguration { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for SSEType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateKinesisStreamingDestinationInput { - UpdateKinesisStreamingDestinationInput { - TableName: Sequence, - StreamArn: Sequence, - UpdateKinesisStreamingConfiguration: Rc>> - } - } + impl DafnyPrint + for SSEType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + SSEType::AES256{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEType.AES256")?; + Ok(()) + }, + SSEType::KMS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.SSEType.KMS")?; + Ok(()) + }, + } + } + } - impl UpdateKinesisStreamingDestinationInput { - pub fn TableName(&self) -> &Sequence { - match self { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Sequence { - match self { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn UpdateKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => UpdateKinesisStreamingConfiguration, - } - } - } + impl SSEType { + /// Enumerates all possible values of SSEType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(SSEType::AES256 {}), Arc::new(SSEType::KMS {})].iter() + } + } - impl Debug - for UpdateKinesisStreamingDestinationInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for SSEType {} - impl DafnyPrint - for UpdateKinesisStreamingDestinationInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingDestinationInput.UpdateKinesisStreamingDestinationInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UpdateKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for SSEType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + SSEType::AES256{} => { - impl Eq - for UpdateKinesisStreamingDestinationInput {} + }, + SSEType::KMS{} => { - impl Hash - for UpdateKinesisStreamingDestinationInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(UpdateKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for UpdateKinesisStreamingDestinationInput { - fn default() -> UpdateKinesisStreamingDestinationInput { - UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput { - TableName: Default::default(), - StreamArn: Default::default(), - UpdateKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &UpdateKinesisStreamingDestinationInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateKinesisStreamingDestinationOutput { - UpdateKinesisStreamingDestinationOutput { - TableName: Rc>>, - StreamArn: Rc>>, - DestinationStatus: Rc>>, - UpdateKinesisStreamingConfiguration: Rc>> - } - } - - impl UpdateKinesisStreamingDestinationOutput { - pub fn TableName(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => TableName, - } - } - pub fn StreamArn(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => StreamArn, - } - } - pub fn DestinationStatus(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => DestinationStatus, - } - } - pub fn UpdateKinesisStreamingConfiguration(&self) -> &Rc>> { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => UpdateKinesisStreamingConfiguration, - } - } - } - - impl Debug - for UpdateKinesisStreamingDestinationOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + } + } + } - impl DafnyPrint - for UpdateKinesisStreamingDestinationOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingDestinationOutput.UpdateKinesisStreamingDestinationOutput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UpdateKinesisStreamingConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for SSEType { + fn default() -> SSEType { + SSEType::AES256 {} + } + } - impl Eq - for UpdateKinesisStreamingDestinationOutput {} + impl AsRef + for SSEType { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for UpdateKinesisStreamingDestinationOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => { - Hash::hash(TableName, _state); - Hash::hash(StreamArn, _state); - Hash::hash(DestinationStatus, _state); - Hash::hash(UpdateKinesisStreamingConfiguration, _state) - }, - } - } - } - - impl Default - for UpdateKinesisStreamingDestinationOutput { - fn default() -> UpdateKinesisStreamingDestinationOutput { - UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput { - TableName: Default::default(), - StreamArn: Default::default(), - DestinationStatus: Default::default(), - UpdateKinesisStreamingConfiguration: Default::default() - } - } - } - - impl AsRef - for &UpdateKinesisStreamingDestinationOutput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateReplicationGroupMemberAction { - UpdateReplicationGroupMemberAction { - RegionName: Sequence, - KMSMasterKeyId: Rc>>, - ProvisionedThroughputOverride: Rc>>, - OnDemandThroughputOverride: Rc>>, - GlobalSecondaryIndexes: Rc>, - TableClassOverride: Rc>> - } - } - - impl UpdateReplicationGroupMemberAction { - pub fn RegionName(&self) -> &Sequence { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => RegionName, - } - } - pub fn KMSMasterKeyId(&self) -> &Rc>> { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => KMSMasterKeyId, - } - } - pub fn ProvisionedThroughputOverride(&self) -> &Rc>> { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => ProvisionedThroughputOverride, - } - } - pub fn OnDemandThroughputOverride(&self) -> &Rc>> { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => OnDemandThroughputOverride, - } - } - pub fn GlobalSecondaryIndexes(&self) -> &Rc> { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => GlobalSecondaryIndexes, - } - } - pub fn TableClassOverride(&self) -> &Rc>> { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => TableClassOverride, - } - } - } - - impl Debug - for UpdateReplicationGroupMemberAction { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2509,3) + pub type StreamArn = Sequence; - impl DafnyPrint - for UpdateReplicationGroupMemberAction { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateReplicationGroupMemberAction.UpdateReplicationGroupMemberAction(")?; - DafnyPrint::fmt_print(RegionName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableClassOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2514,3) + #[derive(PartialEq, Clone)] + pub enum StreamSpecification { + StreamSpecification { + StreamEnabled: bool, + StreamViewType: Arc>> + } + } - impl Eq - for UpdateReplicationGroupMemberAction {} + impl StreamSpecification { + /// Returns a borrow of the field StreamEnabled + pub fn StreamEnabled(&self) -> &bool { + match self { + StreamSpecification::StreamSpecification{StreamEnabled, StreamViewType, } => StreamEnabled, + } + } + /// Returns a borrow of the field StreamViewType + pub fn StreamViewType(&self) -> &Arc>> { + match self { + StreamSpecification::StreamSpecification{StreamEnabled, StreamViewType, } => StreamViewType, + } + } + } - impl Hash - for UpdateReplicationGroupMemberAction { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { - Hash::hash(RegionName, _state); - Hash::hash(KMSMasterKeyId, _state); - Hash::hash(ProvisionedThroughputOverride, _state); - Hash::hash(OnDemandThroughputOverride, _state); - Hash::hash(GlobalSecondaryIndexes, _state); - Hash::hash(TableClassOverride, _state) - }, - } - } - } - - impl Default - for UpdateReplicationGroupMemberAction { - fn default() -> UpdateReplicationGroupMemberAction { - UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction { - RegionName: Default::default(), - KMSMasterKeyId: Default::default(), - ProvisionedThroughputOverride: Default::default(), - OnDemandThroughputOverride: Default::default(), - GlobalSecondaryIndexes: Default::default(), - TableClassOverride: Default::default() - } - } - } - - impl AsRef - for &UpdateReplicationGroupMemberAction { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateTableInput { - UpdateTableInput { - AttributeDefinitions: Rc>>>, - TableName: Sequence, - BillingMode: Rc>>, - ProvisionedThroughput: Rc>>, - GlobalSecondaryIndexUpdates: Rc>>>, - StreamSpecification: Rc>>, - SSESpecification: Rc>>, - ReplicaUpdates: Rc>, - TableClass: Rc>>, - DeletionProtectionEnabled: Rc>, - OnDemandThroughput: Rc>> - } - } - - impl UpdateTableInput { - pub fn AttributeDefinitions(&self) -> &Rc>>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => AttributeDefinitions, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => TableName, - } - } - pub fn BillingMode(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => BillingMode, - } - } - pub fn ProvisionedThroughput(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => ProvisionedThroughput, - } - } - pub fn GlobalSecondaryIndexUpdates(&self) -> &Rc>>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => GlobalSecondaryIndexUpdates, - } - } - pub fn StreamSpecification(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => StreamSpecification, - } - } - pub fn SSESpecification(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => SSESpecification, - } - } - pub fn ReplicaUpdates(&self) -> &Rc> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => ReplicaUpdates, - } - } - pub fn TableClass(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => TableClass, - } - } - pub fn DeletionProtectionEnabled(&self) -> &Rc> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => DeletionProtectionEnabled, - } - } - pub fn OnDemandThroughput(&self) -> &Rc>> { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => OnDemandThroughput, - } - } - } - - impl Debug - for UpdateTableInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for StreamSpecification { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for UpdateTableInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableInput.UpdateTableInput(")?; - DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BillingMode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexUpdates, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(StreamSpecification, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SSESpecification, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableClass, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DeletionProtectionEnabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for StreamSpecification { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StreamSpecification::StreamSpecification{StreamEnabled, StreamViewType, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.StreamSpecification.StreamSpecification(")?; + DafnyPrint::fmt_print(StreamEnabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamViewType, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for UpdateTableInput {} + impl Eq + for StreamSpecification {} + + impl Hash + for StreamSpecification { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StreamSpecification::StreamSpecification{StreamEnabled, StreamViewType, } => { + Hash::hash(StreamEnabled, _state); + Hash::hash(StreamViewType, _state) + }, + } + } + } - impl Hash - for UpdateTableInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => { - Hash::hash(AttributeDefinitions, _state); - Hash::hash(TableName, _state); - Hash::hash(BillingMode, _state); - Hash::hash(ProvisionedThroughput, _state); - Hash::hash(GlobalSecondaryIndexUpdates, _state); - Hash::hash(StreamSpecification, _state); - Hash::hash(SSESpecification, _state); - Hash::hash(ReplicaUpdates, _state); - Hash::hash(TableClass, _state); - Hash::hash(DeletionProtectionEnabled, _state); - Hash::hash(OnDemandThroughput, _state) - }, - } - } - } - - impl Default - for UpdateTableInput { - fn default() -> UpdateTableInput { - UpdateTableInput::UpdateTableInput { - AttributeDefinitions: Default::default(), - TableName: Default::default(), - BillingMode: Default::default(), - ProvisionedThroughput: Default::default(), - GlobalSecondaryIndexUpdates: Default::default(), - StreamSpecification: Default::default(), - SSESpecification: Default::default(), - ReplicaUpdates: Default::default(), - TableClass: Default::default(), - DeletionProtectionEnabled: Default::default(), - OnDemandThroughput: Default::default() - } - } - } - - impl AsRef - for &UpdateTableInput { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateTableOutput { - UpdateTableOutput { - TableDescription: Rc>> - } - } - - impl UpdateTableOutput { - pub fn TableDescription(&self) -> &Rc>> { - match self { - UpdateTableOutput::UpdateTableOutput{TableDescription, } => TableDescription, - } - } - } - - impl Debug - for UpdateTableOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for StreamSpecification { + fn default() -> StreamSpecification { + StreamSpecification::StreamSpecification { + StreamEnabled: Default::default(), + StreamViewType: Default::default() + } + } + } - impl DafnyPrint - for UpdateTableOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTableOutput::UpdateTableOutput{TableDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableOutput.UpdateTableOutput(")?; - DafnyPrint::fmt_print(TableDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for StreamSpecification { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for UpdateTableOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2518,3) + #[derive(PartialEq, Clone)] + pub enum StreamViewType { + NEW_IMAGE {}, + OLD_IMAGE {}, + NEW_AND_OLD_IMAGES {}, + KEYS_ONLY {} + } - impl Hash - for UpdateTableOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTableOutput::UpdateTableOutput{TableDescription, } => { - Hash::hash(TableDescription, _state) - }, - } - } - } + impl StreamViewType {} - impl Default - for UpdateTableOutput { - fn default() -> UpdateTableOutput { - UpdateTableOutput::UpdateTableOutput { - TableDescription: Default::default() - } - } - } + impl Debug + for StreamViewType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &UpdateTableOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for StreamViewType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + StreamViewType::NEW_IMAGE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.StreamViewType.NEW__IMAGE")?; + Ok(()) + }, + StreamViewType::OLD_IMAGE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.StreamViewType.OLD__IMAGE")?; + Ok(()) + }, + StreamViewType::NEW_AND_OLD_IMAGES{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.StreamViewType.NEW__AND__OLD__IMAGES")?; + Ok(()) + }, + StreamViewType::KEYS_ONLY{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.StreamViewType.KEYS__ONLY")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateTableReplicaAutoScalingInput { - UpdateTableReplicaAutoScalingInput { - GlobalSecondaryIndexUpdates: Rc>, - TableName: Sequence, - ProvisionedWriteCapacityAutoScalingUpdate: Rc>>, - ReplicaUpdates: Rc> - } - } + impl StreamViewType { + /// Enumerates all possible values of StreamViewType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(StreamViewType::NEW_IMAGE {}), Arc::new(StreamViewType::OLD_IMAGE {}), Arc::new(StreamViewType::NEW_AND_OLD_IMAGES {}), Arc::new(StreamViewType::KEYS_ONLY {})].iter() + } + } - impl UpdateTableReplicaAutoScalingInput { - pub fn GlobalSecondaryIndexUpdates(&self) -> &Rc> { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => GlobalSecondaryIndexUpdates, - } - } - pub fn TableName(&self) -> &Sequence { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => TableName, - } - } - pub fn ProvisionedWriteCapacityAutoScalingUpdate(&self) -> &Rc>> { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => ProvisionedWriteCapacityAutoScalingUpdate, - } - } - pub fn ReplicaUpdates(&self) -> &Rc> { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => ReplicaUpdates, - } - } - } + impl Eq + for StreamViewType {} - impl Debug - for UpdateTableReplicaAutoScalingInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for StreamViewType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + StreamViewType::NEW_IMAGE{} => { - impl DafnyPrint - for UpdateTableReplicaAutoScalingInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableReplicaAutoScalingInput.UpdateTableReplicaAutoScalingInput(")?; - DafnyPrint::fmt_print(GlobalSecondaryIndexUpdates, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingUpdate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + StreamViewType::OLD_IMAGE{} => { - impl Eq - for UpdateTableReplicaAutoScalingInput {} + }, + StreamViewType::NEW_AND_OLD_IMAGES{} => { - impl Hash - for UpdateTableReplicaAutoScalingInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => { - Hash::hash(GlobalSecondaryIndexUpdates, _state); - Hash::hash(TableName, _state); - Hash::hash(ProvisionedWriteCapacityAutoScalingUpdate, _state); - Hash::hash(ReplicaUpdates, _state) - }, - } - } - } + }, + StreamViewType::KEYS_ONLY{} => { - impl Default - for UpdateTableReplicaAutoScalingInput { - fn default() -> UpdateTableReplicaAutoScalingInput { - UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput { - GlobalSecondaryIndexUpdates: Default::default(), - TableName: Default::default(), - ProvisionedWriteCapacityAutoScalingUpdate: Default::default(), - ReplicaUpdates: Default::default() - } - } - } + }, + } + } + } - impl AsRef - for &UpdateTableReplicaAutoScalingInput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for StreamViewType { + fn default() -> StreamViewType { + StreamViewType::NEW_IMAGE {} + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateTableReplicaAutoScalingOutput { - UpdateTableReplicaAutoScalingOutput { - TableAutoScalingDescription: Rc>> - } - } + impl AsRef + for StreamViewType { + fn as_ref(&self) -> &Self { + self + } + } - impl UpdateTableReplicaAutoScalingOutput { - pub fn TableAutoScalingDescription(&self) -> &Rc>> { - match self { - UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => TableAutoScalingDescription, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2526,3) + pub type TableArn = Sequence; - impl Debug - for UpdateTableReplicaAutoScalingOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2530,3) + #[derive(PartialEq, Clone)] + pub enum TableAutoScalingDescription { + TableAutoScalingDescription { + TableName: Arc>>, + TableStatus: Arc>>, + Replicas: Arc>>> + } + } - impl DafnyPrint - for UpdateTableReplicaAutoScalingOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableReplicaAutoScalingOutput.UpdateTableReplicaAutoScalingOutput(")?; - DafnyPrint::fmt_print(TableAutoScalingDescription, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl TableAutoScalingDescription { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + TableAutoScalingDescription::TableAutoScalingDescription{TableName, TableStatus, Replicas, } => TableName, + } + } + /// Returns a borrow of the field TableStatus + pub fn TableStatus(&self) -> &Arc>> { + match self { + TableAutoScalingDescription::TableAutoScalingDescription{TableName, TableStatus, Replicas, } => TableStatus, + } + } + /// Returns a borrow of the field Replicas + pub fn Replicas(&self) -> &Arc>>> { + match self { + TableAutoScalingDescription::TableAutoScalingDescription{TableName, TableStatus, Replicas, } => Replicas, + } + } + } - impl Eq - for UpdateTableReplicaAutoScalingOutput {} + impl Debug + for TableAutoScalingDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for UpdateTableReplicaAutoScalingOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { - Hash::hash(TableAutoScalingDescription, _state) - }, - } - } - } + impl DafnyPrint + for TableAutoScalingDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableAutoScalingDescription::TableAutoScalingDescription{TableName, TableStatus, Replicas, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableAutoScalingDescription.TableAutoScalingDescription(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Replicas, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for UpdateTableReplicaAutoScalingOutput { - fn default() -> UpdateTableReplicaAutoScalingOutput { - UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput { - TableAutoScalingDescription: Default::default() - } - } - } + impl Eq + for TableAutoScalingDescription {} + + impl Hash + for TableAutoScalingDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableAutoScalingDescription::TableAutoScalingDescription{TableName, TableStatus, Replicas, } => { + Hash::hash(TableName, _state); + Hash::hash(TableStatus, _state); + Hash::hash(Replicas, _state) + }, + } + } + } - impl AsRef - for &UpdateTableReplicaAutoScalingOutput { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for TableAutoScalingDescription { + fn default() -> TableAutoScalingDescription { + TableAutoScalingDescription::TableAutoScalingDescription { + TableName: Default::default(), + TableStatus: Default::default(), + Replicas: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateTimeToLiveInput { - UpdateTimeToLiveInput { - TableName: Sequence, - TimeToLiveSpecification: Rc - } - } + impl AsRef + for TableAutoScalingDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl UpdateTimeToLiveInput { - pub fn TableName(&self) -> &Sequence { - match self { - UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => TableName, - } - } - pub fn TimeToLiveSpecification(&self) -> &Rc { - match self { - UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => TimeToLiveSpecification, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2535,3) + #[derive(PartialEq, Clone)] + pub enum TableClass { + STANDARD {}, + STANDARD_INFREQUENT_ACCESS {} + } - impl Debug - for UpdateTimeToLiveInput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl TableClass {} - impl DafnyPrint - for UpdateTimeToLiveInput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTimeToLiveInput.UpdateTimeToLiveInput(")?; - DafnyPrint::fmt_print(TableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TimeToLiveSpecification, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for TableClass { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for UpdateTimeToLiveInput {} + impl DafnyPrint + for TableClass { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableClass::STANDARD{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableClass.STANDARD")?; + Ok(()) + }, + TableClass::STANDARD_INFREQUENT_ACCESS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableClass.STANDARD__INFREQUENT__ACCESS")?; + Ok(()) + }, + } + } + } - impl Hash - for UpdateTimeToLiveInput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => { - Hash::hash(TableName, _state); - Hash::hash(TimeToLiveSpecification, _state) - }, - } - } - } + impl TableClass { + /// Enumerates all possible values of TableClass + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(TableClass::STANDARD {}), Arc::new(TableClass::STANDARD_INFREQUENT_ACCESS {})].iter() + } + } - impl Default - for UpdateTimeToLiveInput { - fn default() -> UpdateTimeToLiveInput { - UpdateTimeToLiveInput::UpdateTimeToLiveInput { - TableName: Default::default(), - TimeToLiveSpecification: Default::default() - } - } - } + impl Eq + for TableClass {} - impl AsRef - for &UpdateTimeToLiveInput { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for TableClass { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableClass::STANDARD{} => { - #[derive(PartialEq, Clone)] - pub enum UpdateTimeToLiveOutput { - UpdateTimeToLiveOutput { - TimeToLiveSpecification: Rc>> - } - } + }, + TableClass::STANDARD_INFREQUENT_ACCESS{} => { - impl UpdateTimeToLiveOutput { - pub fn TimeToLiveSpecification(&self) -> &Rc>> { - match self { - UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => TimeToLiveSpecification, - } - } - } + }, + } + } + } - impl Debug - for UpdateTimeToLiveOutput { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for TableClass { + fn default() -> TableClass { + TableClass::STANDARD {} + } + } - impl DafnyPrint - for UpdateTimeToLiveOutput { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTimeToLiveOutput.UpdateTimeToLiveOutput(")?; - DafnyPrint::fmt_print(TimeToLiveSpecification, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for TableClass { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for UpdateTimeToLiveOutput {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2538,3) + #[derive(PartialEq, Clone)] + pub enum TableClassSummary { + TableClassSummary { + TableClass: Arc>>, + LastUpdateDateTime: Arc>> + } + } - impl Hash - for UpdateTimeToLiveOutput { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => { - Hash::hash(TimeToLiveSpecification, _state) - }, - } - } - } + impl TableClassSummary { + /// Returns a borrow of the field TableClass + pub fn TableClass(&self) -> &Arc>> { + match self { + TableClassSummary::TableClassSummary{TableClass, LastUpdateDateTime, } => TableClass, + } + } + /// Returns a borrow of the field LastUpdateDateTime + pub fn LastUpdateDateTime(&self) -> &Arc>> { + match self { + TableClassSummary::TableClassSummary{TableClass, LastUpdateDateTime, } => LastUpdateDateTime, + } + } + } - impl Default - for UpdateTimeToLiveOutput { - fn default() -> UpdateTimeToLiveOutput { - UpdateTimeToLiveOutput::UpdateTimeToLiveOutput { - TimeToLiveSpecification: Default::default() - } - } - } + impl Debug + for TableClassSummary { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &UpdateTimeToLiveOutput { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for TableClassSummary { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableClassSummary::TableClassSummary{TableClass, LastUpdateDateTime, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableClassSummary.TableClassSummary(")?; + DafnyPrint::fmt_print(TableClass, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastUpdateDateTime, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum WriteRequest { - WriteRequest { - PutRequest: Rc>>, - DeleteRequest: Rc>> - } - } + impl Eq + for TableClassSummary {} + + impl Hash + for TableClassSummary { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableClassSummary::TableClassSummary{TableClass, LastUpdateDateTime, } => { + Hash::hash(TableClass, _state); + Hash::hash(LastUpdateDateTime, _state) + }, + } + } + } - impl WriteRequest { - pub fn PutRequest(&self) -> &Rc>> { - match self { - WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => PutRequest, - } - } - pub fn DeleteRequest(&self) -> &Rc>> { - match self { - WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => DeleteRequest, - } - } - } + impl Default + for TableClassSummary { + fn default() -> TableClassSummary { + TableClassSummary::TableClassSummary { + TableClass: Default::default(), + LastUpdateDateTime: Default::default() + } + } + } - impl Debug - for WriteRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for TableClassSummary { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for WriteRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.WriteRequest.WriteRequest(")?; - DafnyPrint::fmt_print(PutRequest, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DeleteRequest, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2542,3) + #[derive(PartialEq, Clone)] + pub enum TableCreationParameters { + TableCreationParameters { + TableName: Sequence, + AttributeDefinitions: Sequence>, + KeySchema: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema, + BillingMode: Arc>>, + ProvisionedThroughput: Arc>>, + OnDemandThroughput: Arc>>, + SSESpecification: Arc>>, + GlobalSecondaryIndexes: Arc>>> + } + } - impl Eq - for WriteRequest {} + impl TableCreationParameters { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => TableName, + } + } + /// Returns a borrow of the field AttributeDefinitions + pub fn AttributeDefinitions(&self) -> &Sequence> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => AttributeDefinitions, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::KeySchema { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => KeySchema, + } + } + /// Returns a borrow of the field BillingMode + pub fn BillingMode(&self) -> &Arc>> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => BillingMode, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => OnDemandThroughput, + } + } + /// Returns a borrow of the field SSESpecification + pub fn SSESpecification(&self) -> &Arc>> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => SSESpecification, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => GlobalSecondaryIndexes, + } + } + } - impl Hash - for WriteRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => { - Hash::hash(PutRequest, _state); - Hash::hash(DeleteRequest, _state) - }, - } - } - } + impl Debug + for TableCreationParameters { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for WriteRequest { - fn default() -> WriteRequest { - WriteRequest::WriteRequest { - PutRequest: Default::default(), - DeleteRequest: Default::default() - } - } - } + impl DafnyPrint + for TableCreationParameters { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableCreationParameters.TableCreationParameters(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BillingMode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSESpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &WriteRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for TableCreationParameters {} + + impl Hash + for TableCreationParameters { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableCreationParameters::TableCreationParameters{TableName, AttributeDefinitions, KeySchema, BillingMode, ProvisionedThroughput, OnDemandThroughput, SSESpecification, GlobalSecondaryIndexes, } => { + Hash::hash(TableName, _state); + Hash::hash(AttributeDefinitions, _state); + Hash::hash(KeySchema, _state); + Hash::hash(BillingMode, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state); + Hash::hash(SSESpecification, _state); + Hash::hash(GlobalSecondaryIndexes, _state) + }, + } + } + } - pub type WriteRequests = Sequence>; + impl Default + for TableCreationParameters { + fn default() -> TableCreationParameters { + TableCreationParameters::TableCreationParameters { + TableName: Default::default(), + AttributeDefinitions: Default::default(), + KeySchema: Default::default(), + BillingMode: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default(), + SSESpecification: Default::default(), + GlobalSecondaryIndexes: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - BackupInUseException { - message: Rc>> - }, - BackupNotFoundException { - message: Rc>> - }, - ConditionalCheckFailedException { - message: Rc>>, - Item: Rc, Rc>>> - }, - ContinuousBackupsUnavailableException { - message: Rc>> - }, - DuplicateItemException { - message: Rc>> - }, - ExportConflictException { - message: Rc>> - }, - ExportNotFoundException { - message: Rc>> - }, - GlobalTableAlreadyExistsException { - message: Rc>> - }, - GlobalTableNotFoundException { - message: Rc>> - }, - IdempotentParameterMismatchException { - Message: Rc>> - }, - ImportConflictException { - message: Rc>> - }, - ImportNotFoundException { - message: Rc>> - }, - IndexNotFoundException { - message: Rc>> - }, - InternalServerError { - message: Rc>> - }, - InvalidEndpointException { - Message: Rc>> - }, - InvalidExportTimeException { - message: Rc>> - }, - InvalidRestoreTimeException { - message: Rc>> - }, - ItemCollectionSizeLimitExceededException { - message: Rc>> - }, - LimitExceededException { - message: Rc>> - }, - PointInTimeRecoveryUnavailableException { - message: Rc>> - }, - PolicyNotFoundException { - message: Rc>> - }, - ProvisionedThroughputExceededException { - message: Rc>> - }, - ReplicaAlreadyExistsException { - message: Rc>> - }, - ReplicaNotFoundException { - message: Rc>> - }, - RequestLimitExceeded { - message: Rc>> - }, - ResourceInUseException { - message: Rc>> - }, - ResourceNotFoundException { - message: Rc>> - }, - TableAlreadyExistsException { - message: Rc>> - }, - TableInUseException { - message: Rc>> - }, - TableNotFoundException { - message: Rc>> - }, - TransactionCanceledException { - Message: Rc>>, - CancellationReasons: Rc> - }, - TransactionConflictException { - message: Rc>> - }, - TransactionInProgressException { - Message: Rc>> - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Rc>> { - match self { - Error::BackupInUseException{message, } => message, - Error::BackupNotFoundException{message, } => message, - Error::ConditionalCheckFailedException{message, Item, } => message, - Error::ContinuousBackupsUnavailableException{message, } => message, - Error::DuplicateItemException{message, } => message, - Error::ExportConflictException{message, } => message, - Error::ExportNotFoundException{message, } => message, - Error::GlobalTableAlreadyExistsException{message, } => message, - Error::GlobalTableNotFoundException{message, } => message, - Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), - Error::ImportConflictException{message, } => message, - Error::ImportNotFoundException{message, } => message, - Error::IndexNotFoundException{message, } => message, - Error::InternalServerError{message, } => message, - Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), - Error::InvalidExportTimeException{message, } => message, - Error::InvalidRestoreTimeException{message, } => message, - Error::ItemCollectionSizeLimitExceededException{message, } => message, - Error::LimitExceededException{message, } => message, - Error::PointInTimeRecoveryUnavailableException{message, } => message, - Error::PolicyNotFoundException{message, } => message, - Error::ProvisionedThroughputExceededException{message, } => message, - Error::ReplicaAlreadyExistsException{message, } => message, - Error::ReplicaNotFoundException{message, } => message, - Error::RequestLimitExceeded{message, } => message, - Error::ResourceInUseException{message, } => message, - Error::ResourceNotFoundException{message, } => message, - Error::TableAlreadyExistsException{message, } => message, - Error::TableInUseException{message, } => message, - Error::TableNotFoundException{message, } => message, - Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), - Error::TransactionConflictException{message, } => message, - Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn Item(&self) -> &Rc, Rc>>> { - match self { - Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), - Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ConditionalCheckFailedException{message, Item, } => Item, - Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), - Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), - Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::InternalServerError{message, } => panic!("field does not exist on this variant"), - Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), - Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), - Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), - Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), - Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), - Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::TableInUseException{message, } => panic!("field does not exist on this variant"), - Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), - Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), - Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn Message(&self) -> &Rc>> { - match self { - Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), - Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), - Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), - Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IdempotentParameterMismatchException{Message, } => Message, - Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::InternalServerError{message, } => panic!("field does not exist on this variant"), - Error::InvalidEndpointException{Message, } => Message, - Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), - Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), - Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), - Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), - Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::TableInUseException{message, } => panic!("field does not exist on this variant"), - Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TransactionCanceledException{Message, CancellationReasons, } => Message, - Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), - Error::TransactionInProgressException{Message, } => Message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn CancellationReasons(&self) -> &Rc> { - match self { - Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), - Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), - Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), - Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), - Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::InternalServerError{message, } => panic!("field does not exist on this variant"), - Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), - Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), - Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), - Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), - Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), - Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::TableInUseException{message, } => panic!("field does not exist on this variant"), - Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TransactionCanceledException{Message, CancellationReasons, } => CancellationReasons, - Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), - Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), - Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), - Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), - Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), - Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::InternalServerError{message, } => panic!("field does not exist on this variant"), - Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), - Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), - Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), - Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), - Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), - Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::TableInUseException{message, } => panic!("field does not exist on this variant"), - Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), - Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), - Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), - Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), - Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), - Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), - Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), - Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::InternalServerError{message, } => panic!("field does not exist on this variant"), - Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), - Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), - Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), - Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), - Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), - Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::TableInUseException{message, } => panic!("field does not exist on this variant"), - Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), - Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), - Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } - - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for TableCreationParameters { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::BackupInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.BackupInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::BackupNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.BackupNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ConditionalCheckFailedException{message, Item, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ConditionalCheckFailedException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Item, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ContinuousBackupsUnavailableException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ContinuousBackupsUnavailableException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::DuplicateItemException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.DuplicateItemException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ExportConflictException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ExportConflictException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ExportNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ExportNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::GlobalTableAlreadyExistsException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.GlobalTableAlreadyExistsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::GlobalTableNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.GlobalTableNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::IdempotentParameterMismatchException{Message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.IdempotentParameterMismatchException(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ImportConflictException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ImportConflictException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ImportNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ImportNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::IndexNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.IndexNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InternalServerError{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InternalServerError(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidEndpointException{Message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidEndpointException(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidExportTimeException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidExportTimeException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidRestoreTimeException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidRestoreTimeException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ItemCollectionSizeLimitExceededException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ItemCollectionSizeLimitExceededException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::LimitExceededException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.LimitExceededException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::PointInTimeRecoveryUnavailableException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.PointInTimeRecoveryUnavailableException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::PolicyNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.PolicyNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ProvisionedThroughputExceededException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ProvisionedThroughputExceededException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ReplicaAlreadyExistsException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ReplicaAlreadyExistsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ReplicaNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ReplicaNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::RequestLimitExceeded{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.RequestLimitExceeded(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ResourceInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ResourceInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ResourceNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ResourceNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TableAlreadyExistsException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableAlreadyExistsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TableInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TableNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TransactionCanceledException{Message, CancellationReasons, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionCanceledException(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CancellationReasons, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TransactionConflictException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionConflictException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TransactionInProgressException{Message, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionInProgressException(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2552,3) + #[derive(PartialEq, Clone)] + pub enum TableDescription { + TableDescription { + AttributeDefinitions: Arc>>>, + TableName: Arc>>, + KeySchema: Arc>, + TableStatus: Arc>>, + CreationDateTime: Arc>>, + ProvisionedThroughput: Arc>>, + TableSizeBytes: Arc>, + ItemCount: Arc>, + TableArn: Arc>>, + TableId: Arc>>, + BillingModeSummary: Arc>>, + LocalSecondaryIndexes: Arc>>>, + GlobalSecondaryIndexes: Arc>>>, + StreamSpecification: Arc>>, + LatestStreamLabel: Arc>>, + LatestStreamArn: Arc>>, + GlobalTableVersion: Arc>>, + Replicas: Arc>>>, + RestoreSummary: Arc>>, + SSEDescription: Arc>>, + ArchivalSummary: Arc>>, + TableClassSummary: Arc>>, + DeletionProtectionEnabled: Arc>, + OnDemandThroughput: Arc>> + } + } - impl Eq - for Error {} + impl TableDescription { + /// Returns a borrow of the field AttributeDefinitions + pub fn AttributeDefinitions(&self) -> &Arc>>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => AttributeDefinitions, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableName, + } + } + /// Returns a borrow of the field KeySchema + pub fn KeySchema(&self) -> &Arc> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => KeySchema, + } + } + /// Returns a borrow of the field TableStatus + pub fn TableStatus(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableStatus, + } + } + /// Returns a borrow of the field CreationDateTime + pub fn CreationDateTime(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => CreationDateTime, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field TableSizeBytes + pub fn TableSizeBytes(&self) -> &Arc> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableSizeBytes, + } + } + /// Returns a borrow of the field ItemCount + pub fn ItemCount(&self) -> &Arc> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => ItemCount, + } + } + /// Returns a borrow of the field TableArn + pub fn TableArn(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableArn, + } + } + /// Returns a borrow of the field TableId + pub fn TableId(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableId, + } + } + /// Returns a borrow of the field BillingModeSummary + pub fn BillingModeSummary(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => BillingModeSummary, + } + } + /// Returns a borrow of the field LocalSecondaryIndexes + pub fn LocalSecondaryIndexes(&self) -> &Arc>>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => LocalSecondaryIndexes, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc>>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field StreamSpecification + pub fn StreamSpecification(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => StreamSpecification, + } + } + /// Returns a borrow of the field LatestStreamLabel + pub fn LatestStreamLabel(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => LatestStreamLabel, + } + } + /// Returns a borrow of the field LatestStreamArn + pub fn LatestStreamArn(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => LatestStreamArn, + } + } + /// Returns a borrow of the field GlobalTableVersion + pub fn GlobalTableVersion(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => GlobalTableVersion, + } + } + /// Returns a borrow of the field Replicas + pub fn Replicas(&self) -> &Arc>>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => Replicas, + } + } + /// Returns a borrow of the field RestoreSummary + pub fn RestoreSummary(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => RestoreSummary, + } + } + /// Returns a borrow of the field SSEDescription + pub fn SSEDescription(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => SSEDescription, + } + } + /// Returns a borrow of the field ArchivalSummary + pub fn ArchivalSummary(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => ArchivalSummary, + } + } + /// Returns a borrow of the field TableClassSummary + pub fn TableClassSummary(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => TableClassSummary, + } + } + /// Returns a borrow of the field DeletionProtectionEnabled + pub fn DeletionProtectionEnabled(&self) -> &Arc> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => DeletionProtectionEnabled, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::BackupInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::BackupNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::ConditionalCheckFailedException{message, Item, } => { - Hash::hash(message, _state); - Hash::hash(Item, _state) - }, - Error::ContinuousBackupsUnavailableException{message, } => { - Hash::hash(message, _state) - }, - Error::DuplicateItemException{message, } => { - Hash::hash(message, _state) - }, - Error::ExportConflictException{message, } => { - Hash::hash(message, _state) - }, - Error::ExportNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::GlobalTableAlreadyExistsException{message, } => { - Hash::hash(message, _state) - }, - Error::GlobalTableNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::IdempotentParameterMismatchException{Message, } => { - Hash::hash(Message, _state) - }, - Error::ImportConflictException{message, } => { - Hash::hash(message, _state) - }, - Error::ImportNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::IndexNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::InternalServerError{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidEndpointException{Message, } => { - Hash::hash(Message, _state) - }, - Error::InvalidExportTimeException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidRestoreTimeException{message, } => { - Hash::hash(message, _state) - }, - Error::ItemCollectionSizeLimitExceededException{message, } => { - Hash::hash(message, _state) - }, - Error::LimitExceededException{message, } => { - Hash::hash(message, _state) - }, - Error::PointInTimeRecoveryUnavailableException{message, } => { - Hash::hash(message, _state) - }, - Error::PolicyNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::ProvisionedThroughputExceededException{message, } => { - Hash::hash(message, _state) - }, - Error::ReplicaAlreadyExistsException{message, } => { - Hash::hash(message, _state) - }, - Error::ReplicaNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::RequestLimitExceeded{message, } => { - Hash::hash(message, _state) - }, - Error::ResourceInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::ResourceNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::TableAlreadyExistsException{message, } => { - Hash::hash(message, _state) - }, - Error::TableInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::TableNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::TransactionCanceledException{Message, CancellationReasons, } => { - Hash::hash(Message, _state); - Hash::hash(CancellationReasons, _state) - }, - Error::TransactionConflictException{message, } => { - Hash::hash(message, _state) - }, - Error::TransactionInProgressException{Message, } => { - Hash::hash(Message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl Debug + for TableDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for Error { - fn default() -> Error { - Error::BackupInUseException { - message: Default::default() - } - } - } + impl DafnyPrint + for TableDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableDescription.TableDescription(")?; + DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySchema, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDateTime, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableSizeBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BillingModeSummary, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LocalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamSpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LatestStreamLabel, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LatestStreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableVersion, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Replicas, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RestoreSummary, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSEDescription, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ArchivalSummary, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableClassSummary, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DeletionProtectionEnabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for TableDescription {} + + impl Hash + for TableDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableDescription::TableDescription{AttributeDefinitions, TableName, KeySchema, TableStatus, CreationDateTime, ProvisionedThroughput, TableSizeBytes, ItemCount, TableArn, TableId, BillingModeSummary, LocalSecondaryIndexes, GlobalSecondaryIndexes, StreamSpecification, LatestStreamLabel, LatestStreamArn, GlobalTableVersion, Replicas, RestoreSummary, SSEDescription, ArchivalSummary, TableClassSummary, DeletionProtectionEnabled, OnDemandThroughput, } => { + Hash::hash(AttributeDefinitions, _state); + Hash::hash(TableName, _state); + Hash::hash(KeySchema, _state); + Hash::hash(TableStatus, _state); + Hash::hash(CreationDateTime, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(TableSizeBytes, _state); + Hash::hash(ItemCount, _state); + Hash::hash(TableArn, _state); + Hash::hash(TableId, _state); + Hash::hash(BillingModeSummary, _state); + Hash::hash(LocalSecondaryIndexes, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(StreamSpecification, _state); + Hash::hash(LatestStreamLabel, _state); + Hash::hash(LatestStreamArn, _state); + Hash::hash(GlobalTableVersion, _state); + Hash::hash(Replicas, _state); + Hash::hash(RestoreSummary, _state); + Hash::hash(SSEDescription, _state); + Hash::hash(ArchivalSummary, _state); + Hash::hash(TableClassSummary, _state); + Hash::hash(DeletionProtectionEnabled, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - pub type OpaqueError = Rc; + impl Default + for TableDescription { + fn default() -> TableDescription { + TableDescription::TableDescription { + AttributeDefinitions: Default::default(), + TableName: Default::default(), + KeySchema: Default::default(), + TableStatus: Default::default(), + CreationDateTime: Default::default(), + ProvisionedThroughput: Default::default(), + TableSizeBytes: Default::default(), + ItemCount: Default::default(), + TableArn: Default::default(), + TableId: Default::default(), + BillingModeSummary: Default::default(), + LocalSecondaryIndexes: Default::default(), + GlobalSecondaryIndexes: Default::default(), + StreamSpecification: Default::default(), + LatestStreamLabel: Default::default(), + LatestStreamArn: Default::default(), + GlobalTableVersion: Default::default(), + Replicas: Default::default(), + RestoreSummary: Default::default(), + SSEDescription: Default::default(), + ArchivalSummary: Default::default(), + TableClassSummary: Default::default(), + DeletionProtectionEnabled: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - pub type DummySubsetType = DafnyInt; + impl AsRef + for TableDescription { + fn as_ref(&self) -> &Self { + self + } + } - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2579,3) + pub type TableName = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2584,3) + #[derive(PartialEq, Clone)] + pub enum TableStatus { + CREATING {}, + UPDATING {}, + DELETING {}, + ACTIVE {}, + INACCESSIBLE_ENCRYPTION_CREDENTIALS {}, + ARCHIVING {}, + ARCHIVED {} + } - pub mod kms { - pub mod internaldafny { - pub use ::std::rc::Rc; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::string_utf16_of; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::Error; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::dafny_runtime::SequenceIter; - pub use ::dafny_runtime::seq; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; + impl TableStatus {} - pub struct _default {} + impl Debug + for TableStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl _default { - pub fn DefaultKMSClientConfigType() -> Rc { - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::KMSClientConfigType::KMSClientConfigType {}) - } - pub fn DafnyUserAgentSuffix(runtime: &Sequence) -> Sequence { - let mut version: Sequence = string_utf16_of("1.0.1"); - string_utf16_of("AwsCryptographicMPL/").concat(runtime).concat(&string_utf16_of("/")).concat(&version) - } - pub fn CreateSuccessOfClient(client: &Object) -> Rc, Rc>> { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: client.clone() - }) - } - pub fn CreateFailureOfError(error: &Rc) -> Rc, Rc>> { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: error.clone() - }) - } - } + impl DafnyPrint + for TableStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TableStatus::CREATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.CREATING")?; + Ok(()) + }, + TableStatus::UPDATING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.UPDATING")?; + Ok(()) + }, + TableStatus::DELETING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.DELETING")?; + Ok(()) + }, + TableStatus::ACTIVE{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.ACTIVE")?; + Ok(()) + }, + TableStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.INACCESSIBLE__ENCRYPTION__CREDENTIALS")?; + Ok(()) + }, + TableStatus::ARCHIVING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.ARCHIVING")?; + Ok(()) + }, + TableStatus::ARCHIVED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TableStatus.ARCHIVED")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum KMSClientConfigType { - KMSClientConfigType {} - } + impl TableStatus { + /// Enumerates all possible values of TableStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(TableStatus::CREATING {}), Arc::new(TableStatus::UPDATING {}), Arc::new(TableStatus::DELETING {}), Arc::new(TableStatus::ACTIVE {}), Arc::new(TableStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS {}), Arc::new(TableStatus::ARCHIVING {}), Arc::new(TableStatus::ARCHIVED {})].iter() + } + } - impl KMSClientConfigType {} + impl Eq + for TableStatus {} - impl Debug - for KMSClientConfigType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for TableStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TableStatus::CREATING{} => { - impl DafnyPrint - for KMSClientConfigType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KMSClientConfigType::KMSClientConfigType{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.KMSClientConfigType.KMSClientConfigType")?; - Ok(()) - }, - } - } - } - - impl KMSClientConfigType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KMSClientConfigType::KMSClientConfigType {})].iter() - } - } + }, + TableStatus::UPDATING{} => { - impl Eq - for KMSClientConfigType {} + }, + TableStatus::DELETING{} => { - impl Hash - for KMSClientConfigType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KMSClientConfigType::KMSClientConfigType{} => { + }, + TableStatus::ACTIVE{} => { - }, - } - } - } + }, + TableStatus::INACCESSIBLE_ENCRYPTION_CREDENTIALS{} => { - impl Default - for KMSClientConfigType { - fn default() -> KMSClientConfigType { - KMSClientConfigType::KMSClientConfigType {} - } - } + }, + TableStatus::ARCHIVING{} => { - impl AsRef - for &KMSClientConfigType { - fn as_ref(&self) -> Self { - self - } - } + }, + TableStatus::ARCHIVED{} => { - pub mod types { - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::int; - pub use ::dafny_runtime::truncate; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::DafnyType; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use ::dafny_runtime::SequenceIter; - pub use ::std::rc::Rc; - pub use ::dafny_runtime::seq; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use ::dafny_runtime::Map; - pub use ::dafny_runtime::Object; - pub use ::dafny_runtime::allocate_object; - pub use ::dafny_runtime::UpcastObject; - pub use ::std::any::Any; - pub use ::dafny_runtime::UpcastObjectFn; + }, + } + } + } - pub struct _default {} + impl Default + for TableStatus { + fn default() -> TableStatus { + TableStatus::CREATING {} + } + } - impl _default { - pub fn IsValid_AliasNameType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_ArnType(x: &Sequence) -> bool { - !(x.cardinality() < int!(20)) && !(int!(2048) < x.cardinality()) - } - pub fn IsValid_AttestationDocumentType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(b"262144") < x.cardinality()) - } - pub fn IsValid_CiphertextType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(6144) < x.cardinality()) - } - pub fn IsValid_CloudHsmClusterIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(19)) && !(int!(24) < x.cardinality()) - } - pub fn IsValid_CustomKeyStoreIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(64) < x.cardinality()) - } - pub fn IsValid_CustomKeyStoreNameType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_DescriptionType(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(8192) < x.cardinality()) - } - pub fn IsValid_GrantIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_GrantNameType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_GrantTokenList(x: &Sequence>) -> bool { - !(x.cardinality() < int!(0)) && !(int!(10) < x.cardinality()) - } - pub fn IsValid_GrantTokenType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) - } - pub fn IsValid_KeyIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(2048) < x.cardinality()) - } - pub fn IsValid_KeyStorePasswordType(x: &Sequence) -> bool { - !(x.cardinality() < int!(7)) && !(int!(32) < x.cardinality()) - } - pub fn IsValid_LimitType(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(1000), i32) < x) - } - pub fn IsValid_MarkerType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) - } - pub fn IsValid_NumberOfBytesType(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(1024), i32) < x) - } - pub fn IsValid_PendingWindowInDaysType(x: i32) -> bool { - !(x < truncate!(int!(1), i32)) && !(truncate!(int!(365), i32) < x) - } - pub fn IsValid_PlaintextType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(4096) < x.cardinality()) - } - pub fn IsValid_PolicyNameType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_PolicyType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(b"131072") < x.cardinality()) - } - pub fn IsValid_PrincipalIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_PublicKeyType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) - } - pub fn IsValid_RegionType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(32) < x.cardinality()) - } - pub fn IsValid_RotationPeriodInDaysType(x: i32) -> bool { - !(x < truncate!(int!(90), i32)) && !(truncate!(int!(2560), i32) < x) - } - pub fn IsValid_TagKeyType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_TagValueType(x: &Sequence) -> bool { - !(x.cardinality() < int!(0)) && !(int!(256) < x.cardinality()) - } - pub fn IsValid_TrustAnchorCertificateType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(5000) < x.cardinality()) - } - pub fn IsValid_XksKeyIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_XksProxyAuthenticationAccessKeyIdType(x: &Sequence) -> bool { - !(x.cardinality() < int!(20)) && !(int!(30) < x.cardinality()) - } - pub fn IsValid_XksProxyAuthenticationRawSecretAccessKeyType(x: &Sequence) -> bool { - !(x.cardinality() < int!(43)) && !(int!(64) < x.cardinality()) - } - pub fn IsValid_XksProxyUriEndpointType(x: &Sequence) -> bool { - !(x.cardinality() < int!(10)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_XksProxyUriPathType(x: &Sequence) -> bool { - !(x.cardinality() < int!(10)) && !(int!(128) < x.cardinality()) - } - pub fn IsValid_XksProxyVpcEndpointServiceNameType(x: &Sequence) -> bool { - !(x.cardinality() < int!(20)) && !(int!(64) < x.cardinality()) - } - pub fn IsDummySubsetType(x: &DafnyInt) -> bool { - int!(0) < x.clone() - } - } + impl AsRef + for TableStatus { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum DafnyCallEvent { - DafnyCallEvent { - input: I, - output: O - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2592,3) + #[derive(PartialEq, Clone)] + pub enum Tag { + Tag { + Key: Sequence, + Value: Sequence + } + } - impl DafnyCallEvent { - pub fn input(&self) -> &I { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => input, - } - } - pub fn output(&self) -> &O { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => output, - } - } - } + impl Tag { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Sequence { + match self { + Tag::Tag{Key, Value, } => Key, + } + } + /// Returns a borrow of the field Value + pub fn Value(&self) -> &Sequence { + match self { + Tag::Tag{Key, Value, } => Value, + } + } + } - impl Debug - for DafnyCallEvent { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for Tag { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DafnyCallEvent { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; - DafnyPrint::fmt_print(input, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(output, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for Tag { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Tag::Tag{Key, Value, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Tag.Tag(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Value, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DafnyCallEvent {} + impl Eq + for Tag {} + + impl Hash + for Tag { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Tag::Tag{Key, Value, } => { + Hash::hash(Key, _state); + Hash::hash(Value, _state) + }, + } + } + } - impl Hash - for DafnyCallEvent { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DafnyCallEvent::DafnyCallEvent{input, output, } => { - Hash::hash(input, _state); - Hash::hash(output, _state) - }, - } - } - } + impl Default + for Tag { + fn default() -> Tag { + Tag::Tag { + Key: Default::default(), + Value: Default::default() + } + } + } - impl Default - for DafnyCallEvent { - fn default() -> DafnyCallEvent { - DafnyCallEvent::DafnyCallEvent { - input: Default::default(), - output: Default::default() - } - } - } + impl AsRef + for Tag { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef> - for &DafnyCallEvent { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2597,3) + pub type TagKeyString = Sequence; - #[derive(PartialEq, Clone)] - pub enum AlgorithmSpec { - RSAES_PKCS1_V1_5 {}, - RSAES_OAEP_SHA_1 {}, - RSAES_OAEP_SHA_256 {}, - RSA_AES_KEY_WRAP_SHA_1 {}, - RSA_AES_KEY_WRAP_SHA_256 {}, - SM2PKE {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2602,3) + #[derive(PartialEq, Clone)] + pub enum TagResourceInput { + TagResourceInput { + ResourceArn: Sequence, + Tags: Sequence> + } + } - impl AlgorithmSpec {} + impl TagResourceInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + TagResourceInput::TagResourceInput{ResourceArn, Tags, } => ResourceArn, + } + } + /// Returns a borrow of the field Tags + pub fn Tags(&self) -> &Sequence> { + match self { + TagResourceInput::TagResourceInput{ResourceArn, Tags, } => Tags, + } + } + } - impl Debug - for AlgorithmSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for TagResourceInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for AlgorithmSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AlgorithmSpec::RSAES_PKCS1_V1_5{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__PKCS1__V1__5")?; - Ok(()) - }, - AlgorithmSpec::RSAES_OAEP_SHA_1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__OAEP__SHA__1")?; - Ok(()) - }, - AlgorithmSpec::RSAES_OAEP_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__OAEP__SHA__256")?; - Ok(()) - }, - AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSA__AES__KEY__WRAP__SHA__1")?; - Ok(()) - }, - AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSA__AES__KEY__WRAP__SHA__256")?; - Ok(()) - }, - AlgorithmSpec::SM2PKE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.SM2PKE")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for TagResourceInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TagResourceInput::TagResourceInput{ResourceArn, Tags, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TagResourceInput.TagResourceInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Tags, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AlgorithmSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(AlgorithmSpec::RSAES_PKCS1_V1_5 {}), Rc::new(AlgorithmSpec::RSAES_OAEP_SHA_1 {}), Rc::new(AlgorithmSpec::RSAES_OAEP_SHA_256 {}), Rc::new(AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1 {}), Rc::new(AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256 {}), Rc::new(AlgorithmSpec::SM2PKE {})].iter() - } - } + impl Eq + for TagResourceInput {} + + impl Hash + for TagResourceInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TagResourceInput::TagResourceInput{ResourceArn, Tags, } => { + Hash::hash(ResourceArn, _state); + Hash::hash(Tags, _state) + }, + } + } + } - impl Eq - for AlgorithmSpec {} + impl Default + for TagResourceInput { + fn default() -> TagResourceInput { + TagResourceInput::TagResourceInput { + ResourceArn: Default::default(), + Tags: Default::default() + } + } + } - impl Hash - for AlgorithmSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AlgorithmSpec::RSAES_PKCS1_V1_5{} => { + impl AsRef + for TagResourceInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - AlgorithmSpec::RSAES_OAEP_SHA_1{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2606,3) + pub type TagValueString = Sequence; - }, - AlgorithmSpec::RSAES_OAEP_SHA_256{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2610,3) + pub type TimeToLiveAttributeName = Sequence; - }, - AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2614,3) + #[derive(PartialEq, Clone)] + pub enum TimeToLiveDescription { + TimeToLiveDescription { + TimeToLiveStatus: Arc>>, + AttributeName: Arc>> + } + } - }, - AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256{} => { + impl TimeToLiveDescription { + /// Returns a borrow of the field TimeToLiveStatus + pub fn TimeToLiveStatus(&self) -> &Arc>> { + match self { + TimeToLiveDescription::TimeToLiveDescription{TimeToLiveStatus, AttributeName, } => TimeToLiveStatus, + } + } + /// Returns a borrow of the field AttributeName + pub fn AttributeName(&self) -> &Arc>> { + match self { + TimeToLiveDescription::TimeToLiveDescription{TimeToLiveStatus, AttributeName, } => AttributeName, + } + } + } - }, - AlgorithmSpec::SM2PKE{} => { + impl Debug + for TimeToLiveDescription { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for TimeToLiveDescription { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TimeToLiveDescription::TimeToLiveDescription{TimeToLiveStatus, AttributeName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveDescription.TimeToLiveDescription(")?; + DafnyPrint::fmt_print(TimeToLiveStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for AlgorithmSpec { - fn default() -> AlgorithmSpec { - AlgorithmSpec::RSAES_PKCS1_V1_5 {} - } - } + impl Eq + for TimeToLiveDescription {} + + impl Hash + for TimeToLiveDescription { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TimeToLiveDescription::TimeToLiveDescription{TimeToLiveStatus, AttributeName, } => { + Hash::hash(TimeToLiveStatus, _state); + Hash::hash(AttributeName, _state) + }, + } + } + } - impl AsRef - for &AlgorithmSpec { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for TimeToLiveDescription { + fn default() -> TimeToLiveDescription { + TimeToLiveDescription::TimeToLiveDescription { + TimeToLiveStatus: Default::default(), + AttributeName: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum AliasListEntry { - AliasListEntry { - AliasName: Rc>>, - AliasArn: Rc>>, - TargetKeyId: Rc>>, - CreationDate: Rc>>, - LastUpdatedDate: Rc>> - } - } + impl AsRef + for TimeToLiveDescription { + fn as_ref(&self) -> &Self { + self + } + } - impl AliasListEntry { - pub fn AliasName(&self) -> &Rc>> { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => AliasName, - } - } - pub fn AliasArn(&self) -> &Rc>> { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => AliasArn, - } - } - pub fn TargetKeyId(&self) -> &Rc>> { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => TargetKeyId, - } - } - pub fn CreationDate(&self) -> &Rc>> { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => CreationDate, - } - } - pub fn LastUpdatedDate(&self) -> &Rc>> { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => LastUpdatedDate, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2619,3) + #[derive(PartialEq, Clone)] + pub enum TimeToLiveSpecification { + TimeToLiveSpecification { + Enabled: bool, + AttributeName: Sequence + } + } - impl Debug - for AliasListEntry { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl TimeToLiveSpecification { + /// Returns a borrow of the field Enabled + pub fn Enabled(&self) -> &bool { + match self { + TimeToLiveSpecification::TimeToLiveSpecification{Enabled, AttributeName, } => Enabled, + } + } + /// Returns a borrow of the field AttributeName + pub fn AttributeName(&self) -> &Sequence { + match self { + TimeToLiveSpecification::TimeToLiveSpecification{Enabled, AttributeName, } => AttributeName, + } + } + } - impl DafnyPrint - for AliasListEntry { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AliasListEntry.AliasListEntry(")?; - DafnyPrint::fmt_print(AliasName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AliasArn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CreationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(LastUpdatedDate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for TimeToLiveSpecification { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for AliasListEntry {} + impl DafnyPrint + for TimeToLiveSpecification { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TimeToLiveSpecification::TimeToLiveSpecification{Enabled, AttributeName, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveSpecification.TimeToLiveSpecification(")?; + DafnyPrint::fmt_print(Enabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for AliasListEntry { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => { - Hash::hash(AliasName, _state); - Hash::hash(AliasArn, _state); - Hash::hash(TargetKeyId, _state); - Hash::hash(CreationDate, _state); - Hash::hash(LastUpdatedDate, _state) - }, - } - } - } + impl Eq + for TimeToLiveSpecification {} + + impl Hash + for TimeToLiveSpecification { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TimeToLiveSpecification::TimeToLiveSpecification{Enabled, AttributeName, } => { + Hash::hash(Enabled, _state); + Hash::hash(AttributeName, _state) + }, + } + } + } - impl Default - for AliasListEntry { - fn default() -> AliasListEntry { - AliasListEntry::AliasListEntry { - AliasName: Default::default(), - AliasArn: Default::default(), - TargetKeyId: Default::default(), - CreationDate: Default::default(), - LastUpdatedDate: Default::default() - } - } - } + impl Default + for TimeToLiveSpecification { + fn default() -> TimeToLiveSpecification { + TimeToLiveSpecification::TimeToLiveSpecification { + Enabled: Default::default(), + AttributeName: Default::default() + } + } + } - impl AsRef - for &AliasListEntry { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for TimeToLiveSpecification { + fn as_ref(&self) -> &Self { + self + } + } - pub type AliasNameType = Sequence; + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2623,3) + #[derive(PartialEq, Clone)] + pub enum TimeToLiveStatus { + ENABLING {}, + DISABLING {}, + ENABLED {}, + DISABLED {} + } - pub type ArnType = Sequence; + impl TimeToLiveStatus {} - pub type AttestationDocumentType = Sequence; + impl Debug + for TimeToLiveStatus { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum CancelKeyDeletionRequest { - CancelKeyDeletionRequest { - KeyId: Sequence - } - } + impl DafnyPrint + for TimeToLiveStatus { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TimeToLiveStatus::ENABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveStatus.ENABLING")?; + Ok(()) + }, + TimeToLiveStatus::DISABLING{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveStatus.DISABLING")?; + Ok(()) + }, + TimeToLiveStatus::ENABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveStatus.ENABLED")?; + Ok(()) + }, + TimeToLiveStatus::DISABLED{} => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TimeToLiveStatus.DISABLED")?; + Ok(()) + }, + } + } + } - impl CancelKeyDeletionRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => KeyId, - } - } - } + impl TimeToLiveStatus { + /// Enumerates all possible values of TimeToLiveStatus + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(TimeToLiveStatus::ENABLING {}), Arc::new(TimeToLiveStatus::DISABLING {}), Arc::new(TimeToLiveStatus::ENABLED {}), Arc::new(TimeToLiveStatus::DISABLED {})].iter() + } + } - impl Debug - for CancelKeyDeletionRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for TimeToLiveStatus {} - impl DafnyPrint - for CancelKeyDeletionRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CancelKeyDeletionRequest.CancelKeyDeletionRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for TimeToLiveStatus { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TimeToLiveStatus::ENABLING{} => { - impl Eq - for CancelKeyDeletionRequest {} + }, + TimeToLiveStatus::DISABLING{} => { - impl Hash - for CancelKeyDeletionRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + }, + TimeToLiveStatus::ENABLED{} => { - impl Default - for CancelKeyDeletionRequest { - fn default() -> CancelKeyDeletionRequest { - CancelKeyDeletionRequest::CancelKeyDeletionRequest { - KeyId: Default::default() - } - } - } + }, + TimeToLiveStatus::DISABLED{} => { - impl AsRef - for &CancelKeyDeletionRequest { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CancelKeyDeletionResponse { - CancelKeyDeletionResponse { - KeyId: Rc>> - } - } + impl Default + for TimeToLiveStatus { + fn default() -> TimeToLiveStatus { + TimeToLiveStatus::ENABLING {} + } + } - impl CancelKeyDeletionResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => KeyId, - } - } - } + impl AsRef + for TimeToLiveStatus { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for CancelKeyDeletionResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2628,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItem { + TransactGetItem { + Get: Arc + } + } - impl DafnyPrint - for CancelKeyDeletionResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CancelKeyDeletionResponse.CancelKeyDeletionResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl TransactGetItem { + /// Returns a borrow of the field Get + pub fn Get(&self) -> &Arc { + match self { + TransactGetItem::TransactGetItem{Get, } => Get, + } + } + } - impl Eq - for CancelKeyDeletionResponse {} + impl Debug + for TransactGetItem { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for CancelKeyDeletionResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + impl DafnyPrint + for TransactGetItem { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItem::TransactGetItem{Get, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactGetItem.TransactGetItem(")?; + DafnyPrint::fmt_print(Get, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for CancelKeyDeletionResponse { - fn default() -> CancelKeyDeletionResponse { - CancelKeyDeletionResponse::CancelKeyDeletionResponse { - KeyId: Default::default() - } - } - } + impl Eq + for TransactGetItem {} - impl AsRef - for &CancelKeyDeletionResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for TransactGetItem { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItem::TransactGetItem{Get, } => { + Hash::hash(Get, _state) + }, + } + } + } - pub type CiphertextType = Sequence; + impl Default + for TransactGetItem { + fn default() -> TransactGetItem { + TransactGetItem::TransactGetItem { + Get: Default::default() + } + } + } - pub type CloudHsmClusterIdType = Sequence; + impl AsRef + for TransactGetItem { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ConnectCustomKeyStoreRequest { - ConnectCustomKeyStoreRequest { - CustomKeyStoreId: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2631,3) + pub type TransactGetItemList = Sequence>; - impl ConnectCustomKeyStoreRequest { - pub fn CustomKeyStoreId(&self) -> &Sequence { - match self { - ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2635,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsInput { + TransactGetItemsInput { + TransactItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemList, + ReturnConsumedCapacity: Arc>> + } + } - impl Debug - for ConnectCustomKeyStoreRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl TransactGetItemsInput { + /// Returns a borrow of the field TransactItems + pub fn TransactItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactGetItemList { + match self { + TransactGetItemsInput::TransactGetItemsInput{TransactItems, ReturnConsumedCapacity, } => TransactItems, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + TransactGetItemsInput::TransactGetItemsInput{TransactItems, ReturnConsumedCapacity, } => ReturnConsumedCapacity, + } + } + } - impl DafnyPrint - for ConnectCustomKeyStoreRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectCustomKeyStoreRequest.ConnectCustomKeyStoreRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for TransactGetItemsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ConnectCustomKeyStoreRequest {} + impl DafnyPrint + for TransactGetItemsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsInput::TransactGetItemsInput{TransactItems, ReturnConsumedCapacity, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactGetItemsInput.TransactGetItemsInput(")?; + DafnyPrint::fmt_print(TransactItems, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ConnectCustomKeyStoreRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => { - Hash::hash(CustomKeyStoreId, _state) - }, - } - } - } + impl Eq + for TransactGetItemsInput {} + + impl Hash + for TransactGetItemsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsInput::TransactGetItemsInput{TransactItems, ReturnConsumedCapacity, } => { + Hash::hash(TransactItems, _state); + Hash::hash(ReturnConsumedCapacity, _state) + }, + } + } + } - impl Default - for ConnectCustomKeyStoreRequest { - fn default() -> ConnectCustomKeyStoreRequest { - ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest { - CustomKeyStoreId: Default::default() - } - } - } + impl Default + for TransactGetItemsInput { + fn default() -> TransactGetItemsInput { + TransactGetItemsInput::TransactGetItemsInput { + TransactItems: Default::default(), + ReturnConsumedCapacity: Default::default() + } + } + } - impl AsRef - for &ConnectCustomKeyStoreRequest { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for TransactGetItemsInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ConnectCustomKeyStoreResponse { - ConnectCustomKeyStoreResponse {} - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2639,3) + #[derive(PartialEq, Clone)] + pub enum TransactGetItemsOutput { + TransactGetItemsOutput { + ConsumedCapacity: Arc>>>, + Responses: Arc> + } + } - impl ConnectCustomKeyStoreResponse {} + impl TransactGetItemsOutput { + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + TransactGetItemsOutput::TransactGetItemsOutput{ConsumedCapacity, Responses, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field Responses + pub fn Responses(&self) -> &Arc> { + match self { + TransactGetItemsOutput::TransactGetItemsOutput{ConsumedCapacity, Responses, } => Responses, + } + } + } - impl Debug - for ConnectCustomKeyStoreResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for TransactGetItemsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ConnectCustomKeyStoreResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectCustomKeyStoreResponse.ConnectCustomKeyStoreResponse")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for TransactGetItemsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactGetItemsOutput::TransactGetItemsOutput{ConsumedCapacity, Responses, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactGetItemsOutput.TransactGetItemsOutput(")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Responses, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl ConnectCustomKeyStoreResponse { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse {})].iter() - } - } + impl Eq + for TransactGetItemsOutput {} + + impl Hash + for TransactGetItemsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactGetItemsOutput::TransactGetItemsOutput{ConsumedCapacity, Responses, } => { + Hash::hash(ConsumedCapacity, _state); + Hash::hash(Responses, _state) + }, + } + } + } - impl Eq - for ConnectCustomKeyStoreResponse {} + impl Default + for TransactGetItemsOutput { + fn default() -> TransactGetItemsOutput { + TransactGetItemsOutput::TransactGetItemsOutput { + ConsumedCapacity: Default::default(), + Responses: Default::default() + } + } + } - impl Hash - for ConnectCustomKeyStoreResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse{} => { + impl AsRef + for TransactGetItemsOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } - - impl Default - for ConnectCustomKeyStoreResponse { - fn default() -> ConnectCustomKeyStoreResponse { - ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse {} - } - } - - impl AsRef - for &ConnectCustomKeyStoreResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ConnectionErrorCodeType { - INVALID_CREDENTIALS {}, - CLUSTER_NOT_FOUND {}, - NETWORK_ERRORS {}, - INTERNAL_ERROR {}, - INSUFFICIENT_CLOUDHSM_HSMS {}, - USER_LOCKED_OUT {}, - USER_NOT_FOUND {}, - USER_LOGGED_IN {}, - SUBNET_NOT_FOUND {}, - INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET {}, - XKS_PROXY_ACCESS_DENIED {}, - XKS_PROXY_NOT_REACHABLE {}, - XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND {}, - XKS_PROXY_INVALID_RESPONSE {}, - XKS_PROXY_INVALID_CONFIGURATION {}, - XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION {}, - XKS_PROXY_TIMED_OUT {}, - XKS_PROXY_INVALID_TLS_CONFIGURATION {} - } - - impl ConnectionErrorCodeType {} - - impl Debug - for ConnectionErrorCodeType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2643,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItem { + TransactWriteItem { + ConditionCheck: Arc>>, + Put: Arc>>, + Delete: Arc>>, + Update: Arc>> + } + } - impl DafnyPrint - for ConnectionErrorCodeType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConnectionErrorCodeType::INVALID_CREDENTIALS{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INVALID__CREDENTIALS")?; - Ok(()) - }, - ConnectionErrorCodeType::CLUSTER_NOT_FOUND{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.CLUSTER__NOT__FOUND")?; - Ok(()) - }, - ConnectionErrorCodeType::NETWORK_ERRORS{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.NETWORK__ERRORS")?; - Ok(()) - }, - ConnectionErrorCodeType::INTERNAL_ERROR{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INTERNAL__ERROR")?; - Ok(()) - }, - ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INSUFFICIENT__CLOUDHSM__HSMS")?; - Ok(()) - }, - ConnectionErrorCodeType::USER_LOCKED_OUT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__LOCKED__OUT")?; - Ok(()) - }, - ConnectionErrorCodeType::USER_NOT_FOUND{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__NOT__FOUND")?; - Ok(()) - }, - ConnectionErrorCodeType::USER_LOGGED_IN{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__LOGGED__IN")?; - Ok(()) - }, - ConnectionErrorCodeType::SUBNET_NOT_FOUND{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.SUBNET__NOT__FOUND")?; - Ok(()) - }, - ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INSUFFICIENT__FREE__ADDRESSES__IN__SUBNET")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__ACCESS__DENIED")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__NOT__REACHABLE")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__VPC__ENDPOINT__SERVICE__NOT__FOUND")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__RESPONSE")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__CONFIGURATION")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__VPC__ENDPOINT__SERVICE__INVALID__CONFIGURATION")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__TIMED__OUT")?; - Ok(()) - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__TLS__CONFIGURATION")?; - Ok(()) - }, - } - } - } + impl TransactWriteItem { + /// Returns a borrow of the field ConditionCheck + pub fn ConditionCheck(&self) -> &Arc>> { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => ConditionCheck, + } + } + /// Returns a borrow of the field Put + pub fn Put(&self) -> &Arc>> { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => Put, + } + } + /// Returns a borrow of the field Delete + pub fn Delete(&self) -> &Arc>> { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => Delete, + } + } + /// Returns a borrow of the field Update + pub fn Update(&self) -> &Arc>> { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => Update, + } + } + } - impl ConnectionErrorCodeType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ConnectionErrorCodeType::INVALID_CREDENTIALS {}), Rc::new(ConnectionErrorCodeType::CLUSTER_NOT_FOUND {}), Rc::new(ConnectionErrorCodeType::NETWORK_ERRORS {}), Rc::new(ConnectionErrorCodeType::INTERNAL_ERROR {}), Rc::new(ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS {}), Rc::new(ConnectionErrorCodeType::USER_LOCKED_OUT {}), Rc::new(ConnectionErrorCodeType::USER_NOT_FOUND {}), Rc::new(ConnectionErrorCodeType::USER_LOGGED_IN {}), Rc::new(ConnectionErrorCodeType::SUBNET_NOT_FOUND {}), Rc::new(ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE {}), Rc::new(ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION {}), Rc::new(ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT {}), Rc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION {})].iter() - } - } + impl Debug + for TransactWriteItem { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ConnectionErrorCodeType {} + impl DafnyPrint + for TransactWriteItem { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactWriteItem.TransactWriteItem(")?; + DafnyPrint::fmt_print(ConditionCheck, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Put, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Delete, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Update, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ConnectionErrorCodeType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConnectionErrorCodeType::INVALID_CREDENTIALS{} => { + impl Eq + for TransactWriteItem {} + + impl Hash + for TransactWriteItem { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItem::TransactWriteItem{ConditionCheck, Put, Delete, Update, } => { + Hash::hash(ConditionCheck, _state); + Hash::hash(Put, _state); + Hash::hash(Delete, _state); + Hash::hash(Update, _state) + }, + } + } + } - }, - ConnectionErrorCodeType::CLUSTER_NOT_FOUND{} => { + impl Default + for TransactWriteItem { + fn default() -> TransactWriteItem { + TransactWriteItem::TransactWriteItem { + ConditionCheck: Default::default(), + Put: Default::default(), + Delete: Default::default(), + Update: Default::default() + } + } + } - }, - ConnectionErrorCodeType::NETWORK_ERRORS{} => { + impl AsRef + for TransactWriteItem { + fn as_ref(&self) -> &Self { + self + } + } - }, - ConnectionErrorCodeType::INTERNAL_ERROR{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2649,3) + pub type TransactWriteItemList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2653,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsInput { + TransactWriteItemsInput { + TransactItems: crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemList, + ReturnConsumedCapacity: Arc>>, + ReturnItemCollectionMetrics: Arc>>, + ClientRequestToken: Arc>> + } + } - }, - ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS{} => { + impl TransactWriteItemsInput { + /// Returns a borrow of the field TransactItems + pub fn TransactItems(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::TransactWriteItemList { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => TransactItems, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ReturnItemCollectionMetrics + pub fn ReturnItemCollectionMetrics(&self) -> &Arc>> { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => ReturnItemCollectionMetrics, + } + } + /// Returns a borrow of the field ClientRequestToken + pub fn ClientRequestToken(&self) -> &Arc>> { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => ClientRequestToken, + } + } + } - }, - ConnectionErrorCodeType::USER_LOCKED_OUT{} => { + impl Debug + for TransactWriteItemsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ConnectionErrorCodeType::USER_NOT_FOUND{} => { + impl DafnyPrint + for TransactWriteItemsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactWriteItemsInput.TransactWriteItemsInput(")?; + DafnyPrint::fmt_print(TransactItems, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ClientRequestToken, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ConnectionErrorCodeType::USER_LOGGED_IN{} => { + impl Eq + for TransactWriteItemsInput {} + + impl Hash + for TransactWriteItemsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsInput::TransactWriteItemsInput{TransactItems, ReturnConsumedCapacity, ReturnItemCollectionMetrics, ClientRequestToken, } => { + Hash::hash(TransactItems, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ReturnItemCollectionMetrics, _state); + Hash::hash(ClientRequestToken, _state) + }, + } + } + } - }, - ConnectionErrorCodeType::SUBNET_NOT_FOUND{} => { + impl Default + for TransactWriteItemsInput { + fn default() -> TransactWriteItemsInput { + TransactWriteItemsInput::TransactWriteItemsInput { + TransactItems: Default::default(), + ReturnConsumedCapacity: Default::default(), + ReturnItemCollectionMetrics: Default::default(), + ClientRequestToken: Default::default() + } + } + } - }, - ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET{} => { + impl AsRef + for TransactWriteItemsInput { + fn as_ref(&self) -> &Self { + self + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2659,3) + #[derive(PartialEq, Clone)] + pub enum TransactWriteItemsOutput { + TransactWriteItemsOutput { + ConsumedCapacity: Arc>>>, + ItemCollectionMetrics: Arc, Sequence>>>> + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE{} => { + impl TransactWriteItemsOutput { + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>>> { + match self { + TransactWriteItemsOutput::TransactWriteItemsOutput{ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field ItemCollectionMetrics + pub fn ItemCollectionMetrics(&self) -> &Arc, Sequence>>>> { + match self { + TransactWriteItemsOutput::TransactWriteItemsOutput{ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, + } + } + } - }, - ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND{} => { + impl Debug + for TransactWriteItemsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE{} => { + impl DafnyPrint + for TransactWriteItemsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + TransactWriteItemsOutput::TransactWriteItemsOutput{ConsumedCapacity, ItemCollectionMetrics, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.TransactWriteItemsOutput.TransactWriteItemsOutput(")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION{} => { + impl Eq + for TransactWriteItemsOutput {} + + impl Hash + for TransactWriteItemsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + TransactWriteItemsOutput::TransactWriteItemsOutput{ConsumedCapacity, ItemCollectionMetrics, } => { + Hash::hash(ConsumedCapacity, _state); + Hash::hash(ItemCollectionMetrics, _state) + }, + } + } + } - }, - ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION{} => { + impl Default + for TransactWriteItemsOutput { + fn default() -> TransactWriteItemsOutput { + TransactWriteItemsOutput::TransactWriteItemsOutput { + ConsumedCapacity: Default::default(), + ItemCollectionMetrics: Default::default() + } + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT{} => { + impl AsRef + for TransactWriteItemsOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2663,3) + #[derive(PartialEq, Clone)] + pub enum UntagResourceInput { + UntagResourceInput { + ResourceArn: Sequence, + TagKeys: Sequence> + } + } - }, - } - } - } + impl UntagResourceInput { + /// Returns a borrow of the field ResourceArn + pub fn ResourceArn(&self) -> &Sequence { + match self { + UntagResourceInput::UntagResourceInput{ResourceArn, TagKeys, } => ResourceArn, + } + } + /// Returns a borrow of the field TagKeys + pub fn TagKeys(&self) -> &Sequence> { + match self { + UntagResourceInput::UntagResourceInput{ResourceArn, TagKeys, } => TagKeys, + } + } + } - impl Default - for ConnectionErrorCodeType { - fn default() -> ConnectionErrorCodeType { - ConnectionErrorCodeType::INVALID_CREDENTIALS {} - } - } + impl Debug + for UntagResourceInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ConnectionErrorCodeType { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for UntagResourceInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UntagResourceInput::UntagResourceInput{ResourceArn, TagKeys, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UntagResourceInput.UntagResourceInput(")?; + DafnyPrint::fmt_print(ResourceArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TagKeys, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ConnectionStateType { - CONNECTED {}, - CONNECTING {}, - FAILED {}, - DISCONNECTED {}, - DISCONNECTING {} - } + impl Eq + for UntagResourceInput {} + + impl Hash + for UntagResourceInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UntagResourceInput::UntagResourceInput{ResourceArn, TagKeys, } => { + Hash::hash(ResourceArn, _state); + Hash::hash(TagKeys, _state) + }, + } + } + } - impl ConnectionStateType {} + impl Default + for UntagResourceInput { + fn default() -> UntagResourceInput { + UntagResourceInput::UntagResourceInput { + ResourceArn: Default::default(), + TagKeys: Default::default() + } + } + } - impl Debug - for ConnectionStateType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UntagResourceInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ConnectionStateType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ConnectionStateType::CONNECTED{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.CONNECTED")?; - Ok(()) - }, - ConnectionStateType::CONNECTING{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.CONNECTING")?; - Ok(()) - }, - ConnectionStateType::FAILED{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.FAILED")?; - Ok(()) - }, - ConnectionStateType::DISCONNECTED{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.DISCONNECTED")?; - Ok(()) - }, - ConnectionStateType::DISCONNECTING{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.DISCONNECTING")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2667,3) + #[derive(PartialEq, Clone)] + pub enum Update { + Update { + Key: Map, Arc>, + UpdateExpression: Sequence, + TableName: Sequence, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>>, + ReturnValuesOnConditionCheckFailure: Arc>> + } + } - impl ConnectionStateType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ConnectionStateType::CONNECTED {}), Rc::new(ConnectionStateType::CONNECTING {}), Rc::new(ConnectionStateType::FAILED {}), Rc::new(ConnectionStateType::DISCONNECTED {}), Rc::new(ConnectionStateType::DISCONNECTING {})].iter() - } - } + impl Update { + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => Key, + } + } + /// Returns a borrow of the field UpdateExpression + pub fn UpdateExpression(&self) -> &Sequence { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => UpdateExpression, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => TableName, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ExpressionAttributeValues, + } + } + /// Returns a borrow of the field ReturnValuesOnConditionCheckFailure + pub fn ReturnValuesOnConditionCheckFailure(&self) -> &Arc>> { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => ReturnValuesOnConditionCheckFailure, + } + } + } - impl Eq - for ConnectionStateType {} + impl Debug + for Update { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ConnectionStateType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ConnectionStateType::CONNECTED{} => { + impl DafnyPrint + for Update { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Update.Update(")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(UpdateExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValuesOnConditionCheckFailure, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - ConnectionStateType::CONNECTING{} => { + impl Eq + for Update {} + + impl Hash + for Update { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Update::Update{Key, UpdateExpression, TableName, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, ReturnValuesOnConditionCheckFailure, } => { + Hash::hash(Key, _state); + Hash::hash(UpdateExpression, _state); + Hash::hash(TableName, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state); + Hash::hash(ReturnValuesOnConditionCheckFailure, _state) + }, + } + } + } - }, - ConnectionStateType::FAILED{} => { + impl Default + for Update { + fn default() -> Update { + Update::Update { + Key: Default::default(), + UpdateExpression: Default::default(), + TableName: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default(), + ReturnValuesOnConditionCheckFailure: Default::default() + } + } + } - }, - ConnectionStateType::DISCONNECTED{} => { + impl AsRef + for Update { + fn as_ref(&self) -> &Self { + self + } + } - }, - ConnectionStateType::DISCONNECTING{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2676,3) + #[derive(PartialEq, Clone)] + pub enum UpdateContinuousBackupsInput { + UpdateContinuousBackupsInput { + TableName: Sequence, + PointInTimeRecoverySpecification: Arc + } + } - }, - } - } - } + impl UpdateContinuousBackupsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateContinuousBackupsInput::UpdateContinuousBackupsInput{TableName, PointInTimeRecoverySpecification, } => TableName, + } + } + /// Returns a borrow of the field PointInTimeRecoverySpecification + pub fn PointInTimeRecoverySpecification(&self) -> &Arc { + match self { + UpdateContinuousBackupsInput::UpdateContinuousBackupsInput{TableName, PointInTimeRecoverySpecification, } => PointInTimeRecoverySpecification, + } + } + } - impl Default - for ConnectionStateType { - fn default() -> ConnectionStateType { - ConnectionStateType::CONNECTED {} - } - } + impl Debug + for UpdateContinuousBackupsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &ConnectionStateType { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for UpdateContinuousBackupsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateContinuousBackupsInput::UpdateContinuousBackupsInput{TableName, PointInTimeRecoverySpecification, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateContinuousBackupsInput.UpdateContinuousBackupsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PointInTimeRecoverySpecification, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum CreateAliasRequest { - CreateAliasRequest { - AliasName: Sequence, - TargetKeyId: Sequence - } - } + impl Eq + for UpdateContinuousBackupsInput {} + + impl Hash + for UpdateContinuousBackupsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateContinuousBackupsInput::UpdateContinuousBackupsInput{TableName, PointInTimeRecoverySpecification, } => { + Hash::hash(TableName, _state); + Hash::hash(PointInTimeRecoverySpecification, _state) + }, + } + } + } - impl CreateAliasRequest { - pub fn AliasName(&self) -> &Sequence { - match self { - CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => AliasName, - } - } - pub fn TargetKeyId(&self) -> &Sequence { - match self { - CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => TargetKeyId, - } - } - } + impl Default + for UpdateContinuousBackupsInput { + fn default() -> UpdateContinuousBackupsInput { + UpdateContinuousBackupsInput::UpdateContinuousBackupsInput { + TableName: Default::default(), + PointInTimeRecoverySpecification: Default::default() + } + } + } - impl Debug - for CreateAliasRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UpdateContinuousBackupsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateAliasRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateAliasRequest.CreateAliasRequest(")?; - DafnyPrint::fmt_print(AliasName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetKeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for CreateAliasRequest {} - - impl Hash - for CreateAliasRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => { - Hash::hash(AliasName, _state); - Hash::hash(TargetKeyId, _state) - }, - } - } - } - - impl Default - for CreateAliasRequest { - fn default() -> CreateAliasRequest { - CreateAliasRequest::CreateAliasRequest { - AliasName: Default::default(), - TargetKeyId: Default::default() - } - } - } - - impl AsRef - for &CreateAliasRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateCustomKeyStoreRequest { - CreateCustomKeyStoreRequest { - CustomKeyStoreName: Sequence, - CloudHsmClusterId: Rc>>, - TrustAnchorCertificate: Rc>>, - KeyStorePassword: Rc>>, - CustomKeyStoreType: Rc>>, - XksProxyUriEndpoint: Rc>>, - XksProxyUriPath: Rc>>, - XksProxyVpcEndpointServiceName: Rc>>, - XksProxyAuthenticationCredential: Rc>>, - XksProxyConnectivity: Rc>> - } - } - - impl CreateCustomKeyStoreRequest { - pub fn CustomKeyStoreName(&self) -> &Sequence { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CustomKeyStoreName, - } - } - pub fn CloudHsmClusterId(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CloudHsmClusterId, - } - } - pub fn TrustAnchorCertificate(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => TrustAnchorCertificate, - } - } - pub fn KeyStorePassword(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => KeyStorePassword, - } - } - pub fn CustomKeyStoreType(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CustomKeyStoreType, - } - } - pub fn XksProxyUriEndpoint(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriEndpoint, - } - } - pub fn XksProxyUriPath(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriPath, - } - } - pub fn XksProxyVpcEndpointServiceName(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyVpcEndpointServiceName, - } - } - pub fn XksProxyAuthenticationCredential(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyAuthenticationCredential, - } - } - pub fn XksProxyConnectivity(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyConnectivity, - } - } - } - - impl Debug - for CreateCustomKeyStoreRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for CreateCustomKeyStoreRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateCustomKeyStoreRequest.CreateCustomKeyStoreRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TrustAnchorCertificate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyStorePassword, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyUriEndpoint, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyUriPath, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyVpcEndpointServiceName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyAuthenticationCredential, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyConnectivity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for CreateCustomKeyStoreRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2680,3) + #[derive(PartialEq, Clone)] + pub enum UpdateContinuousBackupsOutput { + UpdateContinuousBackupsOutput { + ContinuousBackupsDescription: Arc>> + } + } - impl Hash - for CreateCustomKeyStoreRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { - Hash::hash(CustomKeyStoreName, _state); - Hash::hash(CloudHsmClusterId, _state); - Hash::hash(TrustAnchorCertificate, _state); - Hash::hash(KeyStorePassword, _state); - Hash::hash(CustomKeyStoreType, _state); - Hash::hash(XksProxyUriEndpoint, _state); - Hash::hash(XksProxyUriPath, _state); - Hash::hash(XksProxyVpcEndpointServiceName, _state); - Hash::hash(XksProxyAuthenticationCredential, _state); - Hash::hash(XksProxyConnectivity, _state) - }, - } - } - } - - impl Default - for CreateCustomKeyStoreRequest { - fn default() -> CreateCustomKeyStoreRequest { - CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest { - CustomKeyStoreName: Default::default(), - CloudHsmClusterId: Default::default(), - TrustAnchorCertificate: Default::default(), - KeyStorePassword: Default::default(), - CustomKeyStoreType: Default::default(), - XksProxyUriEndpoint: Default::default(), - XksProxyUriPath: Default::default(), - XksProxyVpcEndpointServiceName: Default::default(), - XksProxyAuthenticationCredential: Default::default(), - XksProxyConnectivity: Default::default() - } - } - } - - impl AsRef - for &CreateCustomKeyStoreRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateCustomKeyStoreResponse { - CreateCustomKeyStoreResponse { - CustomKeyStoreId: Rc>> - } - } - - impl CreateCustomKeyStoreResponse { - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => CustomKeyStoreId, - } - } - } - - impl Debug - for CreateCustomKeyStoreResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateContinuousBackupsOutput { + /// Returns a borrow of the field ContinuousBackupsDescription + pub fn ContinuousBackupsDescription(&self) -> &Arc>> { + match self { + UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput{ContinuousBackupsDescription, } => ContinuousBackupsDescription, + } + } + } - impl DafnyPrint - for CreateCustomKeyStoreResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateCustomKeyStoreResponse.CreateCustomKeyStoreResponse(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateContinuousBackupsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CreateCustomKeyStoreResponse {} + impl DafnyPrint + for UpdateContinuousBackupsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput{ContinuousBackupsDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateContinuousBackupsOutput.UpdateContinuousBackupsOutput(")?; + DafnyPrint::fmt_print(ContinuousBackupsDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CreateCustomKeyStoreResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => { - Hash::hash(CustomKeyStoreId, _state) - }, - } - } - } - - impl Default - for CreateCustomKeyStoreResponse { - fn default() -> CreateCustomKeyStoreResponse { - CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse { - CustomKeyStoreId: Default::default() - } - } - } - - impl AsRef - for &CreateCustomKeyStoreResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateGrantRequest { - CreateGrantRequest { - KeyId: Sequence, - GranteePrincipal: Sequence, - RetiringPrincipal: Rc>>, - Operations: Sequence>, - Constraints: Rc>>, - GrantTokens: Rc>, - Name: Rc>>, - DryRun: Rc> - } - } - - impl CreateGrantRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => KeyId, - } - } - pub fn GranteePrincipal(&self) -> &Sequence { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => GranteePrincipal, - } - } - pub fn RetiringPrincipal(&self) -> &Rc>> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => RetiringPrincipal, - } - } - pub fn Operations(&self) -> &Sequence> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Operations, - } - } - pub fn Constraints(&self) -> &Rc>> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Constraints, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => GrantTokens, - } - } - pub fn Name(&self) -> &Rc>> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Name, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => DryRun, - } - } - } - - impl Debug - for CreateGrantRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for UpdateContinuousBackupsOutput {} - impl DafnyPrint - for CreateGrantRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateGrantRequest.CreateGrantRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GranteePrincipal, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RetiringPrincipal, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Operations, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Constraints, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for UpdateContinuousBackupsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput{ContinuousBackupsDescription, } => { + Hash::hash(ContinuousBackupsDescription, _state) + }, + } + } + } - impl Eq - for CreateGrantRequest {} + impl Default + for UpdateContinuousBackupsOutput { + fn default() -> UpdateContinuousBackupsOutput { + UpdateContinuousBackupsOutput::UpdateContinuousBackupsOutput { + ContinuousBackupsDescription: Default::default() + } + } + } - impl Hash - for CreateGrantRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(GranteePrincipal, _state); - Hash::hash(RetiringPrincipal, _state); - Hash::hash(Operations, _state); - Hash::hash(Constraints, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(Name, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for CreateGrantRequest { - fn default() -> CreateGrantRequest { - CreateGrantRequest::CreateGrantRequest { - KeyId: Default::default(), - GranteePrincipal: Default::default(), - RetiringPrincipal: Default::default(), - Operations: Default::default(), - Constraints: Default::default(), - GrantTokens: Default::default(), - Name: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &CreateGrantRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateGrantResponse { - CreateGrantResponse { - GrantToken: Rc>>, - GrantId: Rc>> - } - } - - impl CreateGrantResponse { - pub fn GrantToken(&self) -> &Rc>> { - match self { - CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => GrantToken, - } - } - pub fn GrantId(&self) -> &Rc>> { - match self { - CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => GrantId, - } - } - } - - impl Debug - for CreateGrantResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UpdateContinuousBackupsOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for CreateGrantResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateGrantResponse.CreateGrantResponse(")?; - DafnyPrint::fmt_print(GrantToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2683,3) + #[derive(PartialEq, Clone)] + pub enum UpdateContributorInsightsInput { + UpdateContributorInsightsInput { + TableName: Sequence, + IndexName: Arc>>, + ContributorInsightsAction: Arc + } + } - impl Eq - for CreateGrantResponse {} + impl UpdateContributorInsightsInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateContributorInsightsInput::UpdateContributorInsightsInput{TableName, IndexName, ContributorInsightsAction, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + UpdateContributorInsightsInput::UpdateContributorInsightsInput{TableName, IndexName, ContributorInsightsAction, } => IndexName, + } + } + /// Returns a borrow of the field ContributorInsightsAction + pub fn ContributorInsightsAction(&self) -> &Arc { + match self { + UpdateContributorInsightsInput::UpdateContributorInsightsInput{TableName, IndexName, ContributorInsightsAction, } => ContributorInsightsAction, + } + } + } - impl Hash - for CreateGrantResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => { - Hash::hash(GrantToken, _state); - Hash::hash(GrantId, _state) - }, - } - } - } - - impl Default - for CreateGrantResponse { - fn default() -> CreateGrantResponse { - CreateGrantResponse::CreateGrantResponse { - GrantToken: Default::default(), - GrantId: Default::default() - } - } - } - - impl AsRef - for &CreateGrantResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateKeyRequest { - CreateKeyRequest { - Policy: Rc>>, - Description: Rc>>, - KeyUsage: Rc>>, - CustomerMasterKeySpec: Rc>>, - KeySpec: Rc>>, - Origin: Rc>>, - CustomKeyStoreId: Rc>>, - BypassPolicyLockoutSafetyCheck: Rc>, - Tags: Rc>>>, - MultiRegion: Rc>, - XksKeyId: Rc>> - } - } - - impl CreateKeyRequest { - pub fn Policy(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Policy, - } - } - pub fn Description(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Description, - } - } - pub fn KeyUsage(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => KeyUsage, - } - } - pub fn CustomerMasterKeySpec(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => CustomerMasterKeySpec, - } - } - pub fn KeySpec(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => KeySpec, - } - } - pub fn Origin(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Origin, - } - } - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => CustomKeyStoreId, - } - } - pub fn BypassPolicyLockoutSafetyCheck(&self) -> &Rc> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => BypassPolicyLockoutSafetyCheck, - } - } - pub fn Tags(&self) -> &Rc>>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Tags, - } - } - pub fn MultiRegion(&self) -> &Rc> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => MultiRegion, - } - } - pub fn XksKeyId(&self) -> &Rc>> { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => XksKeyId, - } - } - } - - impl Debug - for CreateKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for UpdateContributorInsightsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for CreateKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateKeyRequest.CreateKeyRequest(")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Description, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Origin, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BypassPolicyLockoutSafetyCheck, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MultiRegion, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksKeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for UpdateContributorInsightsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateContributorInsightsInput::UpdateContributorInsightsInput{TableName, IndexName, ContributorInsightsAction, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateContributorInsightsInput.UpdateContributorInsightsInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ContributorInsightsAction, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CreateKeyRequest {} + impl Eq + for UpdateContributorInsightsInput {} + + impl Hash + for UpdateContributorInsightsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateContributorInsightsInput::UpdateContributorInsightsInput{TableName, IndexName, ContributorInsightsAction, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state); + Hash::hash(ContributorInsightsAction, _state) + }, + } + } + } - impl Hash - for CreateKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => { - Hash::hash(Policy, _state); - Hash::hash(Description, _state); - Hash::hash(KeyUsage, _state); - Hash::hash(CustomerMasterKeySpec, _state); - Hash::hash(KeySpec, _state); - Hash::hash(Origin, _state); - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(BypassPolicyLockoutSafetyCheck, _state); - Hash::hash(Tags, _state); - Hash::hash(MultiRegion, _state); - Hash::hash(XksKeyId, _state) - }, - } - } - } - - impl Default - for CreateKeyRequest { - fn default() -> CreateKeyRequest { - CreateKeyRequest::CreateKeyRequest { - Policy: Default::default(), - Description: Default::default(), - KeyUsage: Default::default(), - CustomerMasterKeySpec: Default::default(), - KeySpec: Default::default(), - Origin: Default::default(), - CustomKeyStoreId: Default::default(), - BypassPolicyLockoutSafetyCheck: Default::default(), - Tags: Default::default(), - MultiRegion: Default::default(), - XksKeyId: Default::default() - } - } - } - - impl AsRef - for &CreateKeyRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CreateKeyResponse { - CreateKeyResponse { - KeyMetadata: Rc>> - } - } - - impl CreateKeyResponse { - pub fn KeyMetadata(&self) -> &Rc>> { - match self { - CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => KeyMetadata, - } - } - } - - impl Debug - for CreateKeyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for UpdateContributorInsightsInput { + fn default() -> UpdateContributorInsightsInput { + UpdateContributorInsightsInput::UpdateContributorInsightsInput { + TableName: Default::default(), + IndexName: Default::default(), + ContributorInsightsAction: Default::default() + } + } + } - impl DafnyPrint - for CreateKeyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateKeyResponse.CreateKeyResponse(")?; - DafnyPrint::fmt_print(KeyMetadata, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for UpdateContributorInsightsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for CreateKeyResponse {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2688,3) + #[derive(PartialEq, Clone)] + pub enum UpdateContributorInsightsOutput { + UpdateContributorInsightsOutput { + TableName: Arc>>, + IndexName: Arc>>, + ContributorInsightsStatus: Arc>> + } + } - impl Hash - for CreateKeyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => { - Hash::hash(KeyMetadata, _state) - }, - } - } - } - - impl Default - for CreateKeyResponse { - fn default() -> CreateKeyResponse { - CreateKeyResponse::CreateKeyResponse { - KeyMetadata: Default::default() - } - } - } - - impl AsRef - for &CreateKeyResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CustomerMasterKeySpec { - RSA_2048 {}, - RSA_3072 {}, - RSA_4096 {}, - ECC_NIST_P256 {}, - ECC_NIST_P384 {}, - ECC_NIST_P521 {}, - ECC_SECG_P256K1 {}, - SYMMETRIC_DEFAULT {}, - HMAC_224 {}, - HMAC_256 {}, - HMAC_384 {}, - HMAC_512 {}, - SM2 {} - } - - impl CustomerMasterKeySpec {} - - impl Debug - for CustomerMasterKeySpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateContributorInsightsOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput{TableName, IndexName, ContributorInsightsStatus, } => TableName, + } + } + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Arc>> { + match self { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput{TableName, IndexName, ContributorInsightsStatus, } => IndexName, + } + } + /// Returns a borrow of the field ContributorInsightsStatus + pub fn ContributorInsightsStatus(&self) -> &Arc>> { + match self { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput{TableName, IndexName, ContributorInsightsStatus, } => ContributorInsightsStatus, + } + } + } - impl DafnyPrint - for CustomerMasterKeySpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CustomerMasterKeySpec::RSA_2048{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__2048")?; - Ok(()) - }, - CustomerMasterKeySpec::RSA_3072{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__3072")?; - Ok(()) - }, - CustomerMasterKeySpec::RSA_4096{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__4096")?; - Ok(()) - }, - CustomerMasterKeySpec::ECC_NIST_P256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P256")?; - Ok(()) - }, - CustomerMasterKeySpec::ECC_NIST_P384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P384")?; - Ok(()) - }, - CustomerMasterKeySpec::ECC_NIST_P521{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P521")?; - Ok(()) - }, - CustomerMasterKeySpec::ECC_SECG_P256K1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__SECG__P256K1")?; - Ok(()) - }, - CustomerMasterKeySpec::SYMMETRIC_DEFAULT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.SYMMETRIC__DEFAULT")?; - Ok(()) - }, - CustomerMasterKeySpec::HMAC_224{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__224")?; - Ok(()) - }, - CustomerMasterKeySpec::HMAC_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__256")?; - Ok(()) - }, - CustomerMasterKeySpec::HMAC_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__384")?; - Ok(()) - }, - CustomerMasterKeySpec::HMAC_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__512")?; - Ok(()) - }, - CustomerMasterKeySpec::SM2{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.SM2")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateContributorInsightsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl CustomerMasterKeySpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CustomerMasterKeySpec::RSA_2048 {}), Rc::new(CustomerMasterKeySpec::RSA_3072 {}), Rc::new(CustomerMasterKeySpec::RSA_4096 {}), Rc::new(CustomerMasterKeySpec::ECC_NIST_P256 {}), Rc::new(CustomerMasterKeySpec::ECC_NIST_P384 {}), Rc::new(CustomerMasterKeySpec::ECC_NIST_P521 {}), Rc::new(CustomerMasterKeySpec::ECC_SECG_P256K1 {}), Rc::new(CustomerMasterKeySpec::SYMMETRIC_DEFAULT {}), Rc::new(CustomerMasterKeySpec::HMAC_224 {}), Rc::new(CustomerMasterKeySpec::HMAC_256 {}), Rc::new(CustomerMasterKeySpec::HMAC_384 {}), Rc::new(CustomerMasterKeySpec::HMAC_512 {}), Rc::new(CustomerMasterKeySpec::SM2 {})].iter() - } - } + impl DafnyPrint + for UpdateContributorInsightsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput{TableName, IndexName, ContributorInsightsStatus, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateContributorInsightsOutput.UpdateContributorInsightsOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ContributorInsightsStatus, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for CustomerMasterKeySpec {} + impl Eq + for UpdateContributorInsightsOutput {} + + impl Hash + for UpdateContributorInsightsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput{TableName, IndexName, ContributorInsightsStatus, } => { + Hash::hash(TableName, _state); + Hash::hash(IndexName, _state); + Hash::hash(ContributorInsightsStatus, _state) + }, + } + } + } - impl Hash - for CustomerMasterKeySpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CustomerMasterKeySpec::RSA_2048{} => { + impl Default + for UpdateContributorInsightsOutput { + fn default() -> UpdateContributorInsightsOutput { + UpdateContributorInsightsOutput::UpdateContributorInsightsOutput { + TableName: Default::default(), + IndexName: Default::default(), + ContributorInsightsStatus: Default::default() + } + } + } - }, - CustomerMasterKeySpec::RSA_3072{} => { + impl AsRef + for UpdateContributorInsightsOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - CustomerMasterKeySpec::RSA_4096{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2694,3) + #[derive(PartialEq, Clone)] + pub enum UpdateGlobalSecondaryIndexAction { + UpdateGlobalSecondaryIndexAction { + IndexName: Sequence, + ProvisionedThroughput: Arc>>, + OnDemandThroughput: Arc>> + } + } - }, - CustomerMasterKeySpec::ECC_NIST_P256{} => { + impl UpdateGlobalSecondaryIndexAction { + /// Returns a borrow of the field IndexName + pub fn IndexName(&self) -> &Sequence { + match self { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => IndexName, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - }, - CustomerMasterKeySpec::ECC_NIST_P384{} => { + impl Debug + for UpdateGlobalSecondaryIndexAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - CustomerMasterKeySpec::ECC_NIST_P521{} => { + impl DafnyPrint + for UpdateGlobalSecondaryIndexAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalSecondaryIndexAction.UpdateGlobalSecondaryIndexAction(")?; + DafnyPrint::fmt_print(IndexName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - CustomerMasterKeySpec::ECC_SECG_P256K1{} => { + impl Eq + for UpdateGlobalSecondaryIndexAction {} + + impl Hash + for UpdateGlobalSecondaryIndexAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction{IndexName, ProvisionedThroughput, OnDemandThroughput, } => { + Hash::hash(IndexName, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - }, - CustomerMasterKeySpec::SYMMETRIC_DEFAULT{} => { + impl Default + for UpdateGlobalSecondaryIndexAction { + fn default() -> UpdateGlobalSecondaryIndexAction { + UpdateGlobalSecondaryIndexAction::UpdateGlobalSecondaryIndexAction { + IndexName: Default::default(), + ProvisionedThroughput: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - }, - CustomerMasterKeySpec::HMAC_224{} => { + impl AsRef + for UpdateGlobalSecondaryIndexAction { + fn as_ref(&self) -> &Self { + self + } + } - }, - CustomerMasterKeySpec::HMAC_256{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2699,3) + #[derive(PartialEq, Clone)] + pub enum UpdateGlobalTableInput { + UpdateGlobalTableInput { + GlobalTableName: Sequence, + ReplicaUpdates: Sequence> + } + } - }, - CustomerMasterKeySpec::HMAC_384{} => { + impl UpdateGlobalTableInput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Sequence { + match self { + UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => GlobalTableName, + } + } + /// Returns a borrow of the field ReplicaUpdates + pub fn ReplicaUpdates(&self) -> &Sequence> { + match self { + UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => ReplicaUpdates, + } + } + } - }, - CustomerMasterKeySpec::HMAC_512{} => { + impl Debug + for UpdateGlobalTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - CustomerMasterKeySpec::SM2{} => { + impl DafnyPrint + for UpdateGlobalTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableInput.UpdateGlobalTableInput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } - - impl Default - for CustomerMasterKeySpec { - fn default() -> CustomerMasterKeySpec { - CustomerMasterKeySpec::RSA_2048 {} - } - } - - impl AsRef - for &CustomerMasterKeySpec { - fn as_ref(&self) -> Self { - self - } - } - - pub type CustomKeyStoreIdType = Sequence; - - pub type CustomKeyStoreNameType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum CustomKeyStoresListEntry { - CustomKeyStoresListEntry { - CustomKeyStoreId: Rc>>, - CustomKeyStoreName: Rc>>, - CloudHsmClusterId: Rc>>, - TrustAnchorCertificate: Rc>>, - ConnectionState: Rc>>, - ConnectionErrorCode: Rc>>, - CreationDate: Rc>>, - CustomKeyStoreType: Rc>>, - XksProxyConfiguration: Rc>> - } - } - - impl CustomKeyStoresListEntry { - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreId, - } - } - pub fn CustomKeyStoreName(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreName, - } - } - pub fn CloudHsmClusterId(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CloudHsmClusterId, - } - } - pub fn TrustAnchorCertificate(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => TrustAnchorCertificate, - } - } - pub fn ConnectionState(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => ConnectionState, - } - } - pub fn ConnectionErrorCode(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => ConnectionErrorCode, - } - } - pub fn CreationDate(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CreationDate, - } - } - pub fn CustomKeyStoreType(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreType, - } - } - pub fn XksProxyConfiguration(&self) -> &Rc>> { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => XksProxyConfiguration, - } - } - } - - impl Debug - for CustomKeyStoresListEntry { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for UpdateGlobalTableInput {} + + impl Hash + for UpdateGlobalTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateGlobalTableInput::UpdateGlobalTableInput{GlobalTableName, ReplicaUpdates, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(ReplicaUpdates, _state) + }, + } + } + } - impl DafnyPrint - for CustomKeyStoresListEntry { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoresListEntry.CustomKeyStoresListEntry(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TrustAnchorCertificate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConnectionState, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ConnectionErrorCode, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CreationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for UpdateGlobalTableInput { + fn default() -> UpdateGlobalTableInput { + UpdateGlobalTableInput::UpdateGlobalTableInput { + GlobalTableName: Default::default(), + ReplicaUpdates: Default::default() + } + } + } - impl Eq - for CustomKeyStoresListEntry {} + impl AsRef + for UpdateGlobalTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for CustomKeyStoresListEntry { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => { - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(CustomKeyStoreName, _state); - Hash::hash(CloudHsmClusterId, _state); - Hash::hash(TrustAnchorCertificate, _state); - Hash::hash(ConnectionState, _state); - Hash::hash(ConnectionErrorCode, _state); - Hash::hash(CreationDate, _state); - Hash::hash(CustomKeyStoreType, _state); - Hash::hash(XksProxyConfiguration, _state) - }, - } - } - } - - impl Default - for CustomKeyStoresListEntry { - fn default() -> CustomKeyStoresListEntry { - CustomKeyStoresListEntry::CustomKeyStoresListEntry { - CustomKeyStoreId: Default::default(), - CustomKeyStoreName: Default::default(), - CloudHsmClusterId: Default::default(), - TrustAnchorCertificate: Default::default(), - ConnectionState: Default::default(), - ConnectionErrorCode: Default::default(), - CreationDate: Default::default(), - CustomKeyStoreType: Default::default(), - XksProxyConfiguration: Default::default() - } - } - } - - impl AsRef - for &CustomKeyStoresListEntry { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum CustomKeyStoreType { - AWS_CLOUDHSM {}, - EXTERNAL_KEY_STORE {} - } - - impl CustomKeyStoreType {} - - impl Debug - for CustomKeyStoreType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2703,3) + #[derive(PartialEq, Clone)] + pub enum UpdateGlobalTableOutput { + UpdateGlobalTableOutput { + GlobalTableDescription: Arc>> + } + } - impl DafnyPrint - for CustomKeyStoreType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - CustomKeyStoreType::AWS_CLOUDHSM{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoreType.AWS__CLOUDHSM")?; - Ok(()) - }, - CustomKeyStoreType::EXTERNAL_KEY_STORE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoreType.EXTERNAL__KEY__STORE")?; - Ok(()) - }, - } - } - } + impl UpdateGlobalTableOutput { + /// Returns a borrow of the field GlobalTableDescription + pub fn GlobalTableDescription(&self) -> &Arc>> { + match self { + UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => GlobalTableDescription, + } + } + } - impl CustomKeyStoreType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(CustomKeyStoreType::AWS_CLOUDHSM {}), Rc::new(CustomKeyStoreType::EXTERNAL_KEY_STORE {})].iter() - } - } + impl Debug + for UpdateGlobalTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for CustomKeyStoreType {} + impl DafnyPrint + for UpdateGlobalTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableOutput.UpdateGlobalTableOutput(")?; + DafnyPrint::fmt_print(GlobalTableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for CustomKeyStoreType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - CustomKeyStoreType::AWS_CLOUDHSM{} => { + impl Eq + for UpdateGlobalTableOutput {} - }, - CustomKeyStoreType::EXTERNAL_KEY_STORE{} => { + impl Hash + for UpdateGlobalTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateGlobalTableOutput::UpdateGlobalTableOutput{GlobalTableDescription, } => { + Hash::hash(GlobalTableDescription, _state) + }, + } + } + } - }, - } - } - } + impl Default + for UpdateGlobalTableOutput { + fn default() -> UpdateGlobalTableOutput { + UpdateGlobalTableOutput::UpdateGlobalTableOutput { + GlobalTableDescription: Default::default() + } + } + } - impl Default - for CustomKeyStoreType { - fn default() -> CustomKeyStoreType { - CustomKeyStoreType::AWS_CLOUDHSM {} - } - } + impl AsRef + for UpdateGlobalTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &CustomKeyStoreType { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2706,3) + #[derive(PartialEq, Clone)] + pub enum UpdateGlobalTableSettingsInput { + UpdateGlobalTableSettingsInput { + GlobalTableName: Sequence, + GlobalTableBillingMode: Arc>>, + GlobalTableProvisionedWriteCapacityUnits: Arc>, + GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: Arc>>, + GlobalTableGlobalSecondaryIndexSettingsUpdate: Arc>, + ReplicaSettingsUpdate: Arc> + } + } - #[derive(PartialEq, Clone)] - pub enum DataKeyPairSpec { - RSA_2048 {}, - RSA_3072 {}, - RSA_4096 {}, - ECC_NIST_P256 {}, - ECC_NIST_P384 {}, - ECC_NIST_P521 {}, - ECC_SECG_P256K1 {}, - SM2 {} - } + impl UpdateGlobalTableSettingsInput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Sequence { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableName, + } + } + /// Returns a borrow of the field GlobalTableBillingMode + pub fn GlobalTableBillingMode(&self) -> &Arc>> { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableBillingMode, + } + } + /// Returns a borrow of the field GlobalTableProvisionedWriteCapacityUnits + pub fn GlobalTableProvisionedWriteCapacityUnits(&self) -> &Arc> { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableProvisionedWriteCapacityUnits, + } + } + /// Returns a borrow of the field GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate + pub fn GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate(&self) -> &Arc>> { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, + } + } + /// Returns a borrow of the field GlobalTableGlobalSecondaryIndexSettingsUpdate + pub fn GlobalTableGlobalSecondaryIndexSettingsUpdate(&self) -> &Arc> { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => GlobalTableGlobalSecondaryIndexSettingsUpdate, + } + } + /// Returns a borrow of the field ReplicaSettingsUpdate + pub fn ReplicaSettingsUpdate(&self) -> &Arc> { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => ReplicaSettingsUpdate, + } + } + } - impl DataKeyPairSpec {} + impl Debug + for UpdateGlobalTableSettingsInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DataKeyPairSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for UpdateGlobalTableSettingsInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableSettingsInput.UpdateGlobalTableSettingsInput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableBillingMode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableProvisionedWriteCapacityUnits, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalTableGlobalSecondaryIndexSettingsUpdate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaSettingsUpdate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DataKeyPairSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DataKeyPairSpec::RSA_2048{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__2048")?; - Ok(()) - }, - DataKeyPairSpec::RSA_3072{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__3072")?; - Ok(()) - }, - DataKeyPairSpec::RSA_4096{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__4096")?; - Ok(()) - }, - DataKeyPairSpec::ECC_NIST_P256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P256")?; - Ok(()) - }, - DataKeyPairSpec::ECC_NIST_P384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P384")?; - Ok(()) - }, - DataKeyPairSpec::ECC_NIST_P521{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P521")?; - Ok(()) - }, - DataKeyPairSpec::ECC_SECG_P256K1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__SECG__P256K1")?; - Ok(()) - }, - DataKeyPairSpec::SM2{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.SM2")?; - Ok(()) - }, - } - } - } + impl Eq + for UpdateGlobalTableSettingsInput {} + + impl Hash + for UpdateGlobalTableSettingsInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput{GlobalTableName, GlobalTableBillingMode, GlobalTableProvisionedWriteCapacityUnits, GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, GlobalTableGlobalSecondaryIndexSettingsUpdate, ReplicaSettingsUpdate, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(GlobalTableBillingMode, _state); + Hash::hash(GlobalTableProvisionedWriteCapacityUnits, _state); + Hash::hash(GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate, _state); + Hash::hash(GlobalTableGlobalSecondaryIndexSettingsUpdate, _state); + Hash::hash(ReplicaSettingsUpdate, _state) + }, + } + } + } - impl DataKeyPairSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DataKeyPairSpec::RSA_2048 {}), Rc::new(DataKeyPairSpec::RSA_3072 {}), Rc::new(DataKeyPairSpec::RSA_4096 {}), Rc::new(DataKeyPairSpec::ECC_NIST_P256 {}), Rc::new(DataKeyPairSpec::ECC_NIST_P384 {}), Rc::new(DataKeyPairSpec::ECC_NIST_P521 {}), Rc::new(DataKeyPairSpec::ECC_SECG_P256K1 {}), Rc::new(DataKeyPairSpec::SM2 {})].iter() - } - } + impl Default + for UpdateGlobalTableSettingsInput { + fn default() -> UpdateGlobalTableSettingsInput { + UpdateGlobalTableSettingsInput::UpdateGlobalTableSettingsInput { + GlobalTableName: Default::default(), + GlobalTableBillingMode: Default::default(), + GlobalTableProvisionedWriteCapacityUnits: Default::default(), + GlobalTableProvisionedWriteCapacityAutoScalingSettingsUpdate: Default::default(), + GlobalTableGlobalSecondaryIndexSettingsUpdate: Default::default(), + ReplicaSettingsUpdate: Default::default() + } + } + } - impl Eq - for DataKeyPairSpec {} + impl AsRef + for UpdateGlobalTableSettingsInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DataKeyPairSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DataKeyPairSpec::RSA_2048{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2714,3) + #[derive(PartialEq, Clone)] + pub enum UpdateGlobalTableSettingsOutput { + UpdateGlobalTableSettingsOutput { + GlobalTableName: Arc>>, + ReplicaSettings: Arc>>> + } + } - }, - DataKeyPairSpec::RSA_3072{} => { + impl UpdateGlobalTableSettingsOutput { + /// Returns a borrow of the field GlobalTableName + pub fn GlobalTableName(&self) -> &Arc>> { + match self { + UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => GlobalTableName, + } + } + /// Returns a borrow of the field ReplicaSettings + pub fn ReplicaSettings(&self) -> &Arc>>> { + match self { + UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => ReplicaSettings, + } + } + } - }, - DataKeyPairSpec::RSA_4096{} => { + impl Debug + for UpdateGlobalTableSettingsOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - DataKeyPairSpec::ECC_NIST_P256{} => { + impl DafnyPrint + for UpdateGlobalTableSettingsOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateGlobalTableSettingsOutput.UpdateGlobalTableSettingsOutput(")?; + DafnyPrint::fmt_print(GlobalTableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaSettings, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - DataKeyPairSpec::ECC_NIST_P384{} => { + impl Eq + for UpdateGlobalTableSettingsOutput {} + + impl Hash + for UpdateGlobalTableSettingsOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput{GlobalTableName, ReplicaSettings, } => { + Hash::hash(GlobalTableName, _state); + Hash::hash(ReplicaSettings, _state) + }, + } + } + } - }, - DataKeyPairSpec::ECC_NIST_P521{} => { + impl Default + for UpdateGlobalTableSettingsOutput { + fn default() -> UpdateGlobalTableSettingsOutput { + UpdateGlobalTableSettingsOutput::UpdateGlobalTableSettingsOutput { + GlobalTableName: Default::default(), + ReplicaSettings: Default::default() + } + } + } - }, - DataKeyPairSpec::ECC_SECG_P256K1{} => { + impl AsRef + for UpdateGlobalTableSettingsOutput { + fn as_ref(&self) -> &Self { + self + } + } - }, - DataKeyPairSpec::SM2{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2718,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemInput { + UpdateItemInput { + TableName: Sequence, + Key: Map, Arc>, + AttributeUpdates: Arc, Arc>>>, + Expected: Arc, Arc>>>, + ConditionalOperator: Arc>>, + ReturnValues: Arc>>, + ReturnConsumedCapacity: Arc>>, + ReturnItemCollectionMetrics: Arc>>, + UpdateExpression: Arc>>, + ConditionExpression: Arc>>, + ExpressionAttributeNames: Arc, Sequence>>>, + ExpressionAttributeValues: Arc, Arc>>> + } + } - }, - } - } - } + impl UpdateItemInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => TableName, + } + } + /// Returns a borrow of the field Key + pub fn Key(&self) -> &Map, Arc> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Key, + } + } + /// Returns a borrow of the field AttributeUpdates + pub fn AttributeUpdates(&self) -> &Arc, Arc>>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => AttributeUpdates, + } + } + /// Returns a borrow of the field Expected + pub fn Expected(&self) -> &Arc, Arc>>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => Expected, + } + } + /// Returns a borrow of the field ConditionalOperator + pub fn ConditionalOperator(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionalOperator, + } + } + /// Returns a borrow of the field ReturnValues + pub fn ReturnValues(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnValues, + } + } + /// Returns a borrow of the field ReturnConsumedCapacity + pub fn ReturnConsumedCapacity(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnConsumedCapacity, + } + } + /// Returns a borrow of the field ReturnItemCollectionMetrics + pub fn ReturnItemCollectionMetrics(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ReturnItemCollectionMetrics, + } + } + /// Returns a borrow of the field UpdateExpression + pub fn UpdateExpression(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => UpdateExpression, + } + } + /// Returns a borrow of the field ConditionExpression + pub fn ConditionExpression(&self) -> &Arc>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ConditionExpression, + } + } + /// Returns a borrow of the field ExpressionAttributeNames + pub fn ExpressionAttributeNames(&self) -> &Arc, Sequence>>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeNames, + } + } + /// Returns a borrow of the field ExpressionAttributeValues + pub fn ExpressionAttributeValues(&self) -> &Arc, Arc>>> { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => ExpressionAttributeValues, + } + } + } - impl Default - for DataKeyPairSpec { - fn default() -> DataKeyPairSpec { - DataKeyPairSpec::RSA_2048 {} - } - } + impl Debug + for UpdateItemInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DataKeyPairSpec { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for UpdateItemInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateItemInput.UpdateItemInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Key, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AttributeUpdates, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Expected, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionalOperator, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnValues, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReturnItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(UpdateExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConditionExpression, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeNames, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpressionAttributeValues, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DataKeySpec { - AES_256 {}, - AES_128 {} - } + impl Eq + for UpdateItemInput {} + + impl Hash + for UpdateItemInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemInput::UpdateItemInput{TableName, Key, AttributeUpdates, Expected, ConditionalOperator, ReturnValues, ReturnConsumedCapacity, ReturnItemCollectionMetrics, UpdateExpression, ConditionExpression, ExpressionAttributeNames, ExpressionAttributeValues, } => { + Hash::hash(TableName, _state); + Hash::hash(Key, _state); + Hash::hash(AttributeUpdates, _state); + Hash::hash(Expected, _state); + Hash::hash(ConditionalOperator, _state); + Hash::hash(ReturnValues, _state); + Hash::hash(ReturnConsumedCapacity, _state); + Hash::hash(ReturnItemCollectionMetrics, _state); + Hash::hash(UpdateExpression, _state); + Hash::hash(ConditionExpression, _state); + Hash::hash(ExpressionAttributeNames, _state); + Hash::hash(ExpressionAttributeValues, _state) + }, + } + } + } - impl DataKeySpec {} + impl Default + for UpdateItemInput { + fn default() -> UpdateItemInput { + UpdateItemInput::UpdateItemInput { + TableName: Default::default(), + Key: Default::default(), + AttributeUpdates: Default::default(), + Expected: Default::default(), + ConditionalOperator: Default::default(), + ReturnValues: Default::default(), + ReturnConsumedCapacity: Default::default(), + ReturnItemCollectionMetrics: Default::default(), + UpdateExpression: Default::default(), + ConditionExpression: Default::default(), + ExpressionAttributeNames: Default::default(), + ExpressionAttributeValues: Default::default() + } + } + } - impl Debug - for DataKeySpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UpdateItemInput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DataKeySpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DataKeySpec::AES_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeySpec.AES__256")?; - Ok(()) - }, - DataKeySpec::AES_128{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeySpec.AES__128")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2732,3) + #[derive(PartialEq, Clone)] + pub enum UpdateItemOutput { + UpdateItemOutput { + Attributes: Arc, Arc>>>, + ConsumedCapacity: Arc>>, + ItemCollectionMetrics: Arc>> + } + } - impl DataKeySpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DataKeySpec::AES_256 {}), Rc::new(DataKeySpec::AES_128 {})].iter() - } - } + impl UpdateItemOutput { + /// Returns a borrow of the field Attributes + pub fn Attributes(&self) -> &Arc, Arc>>> { + match self { + UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => Attributes, + } + } + /// Returns a borrow of the field ConsumedCapacity + pub fn ConsumedCapacity(&self) -> &Arc>> { + match self { + UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ConsumedCapacity, + } + } + /// Returns a borrow of the field ItemCollectionMetrics + pub fn ItemCollectionMetrics(&self) -> &Arc>> { + match self { + UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => ItemCollectionMetrics, + } + } + } - impl Eq - for DataKeySpec {} + impl Debug + for UpdateItemOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for DataKeySpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DataKeySpec::AES_256{} => { + impl DafnyPrint + for UpdateItemOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateItemOutput.UpdateItemOutput(")?; + DafnyPrint::fmt_print(Attributes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConsumedCapacity, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ItemCollectionMetrics, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - DataKeySpec::AES_128{} => { + impl Eq + for UpdateItemOutput {} + + impl Hash + for UpdateItemOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateItemOutput::UpdateItemOutput{Attributes, ConsumedCapacity, ItemCollectionMetrics, } => { + Hash::hash(Attributes, _state); + Hash::hash(ConsumedCapacity, _state); + Hash::hash(ItemCollectionMetrics, _state) + }, + } + } + } - }, - } - } - } - - impl Default - for DataKeySpec { - fn default() -> DataKeySpec { - DataKeySpec::AES_256 {} - } - } - - impl AsRef - for &DataKeySpec { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DecryptRequest { - DecryptRequest { - CiphertextBlob: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - EncryptionContext: Rc, Sequence>>>, - GrantTokens: Rc>, - KeyId: Rc>>, - EncryptionAlgorithm: Rc>>, - Recipient: Rc>>, - DryRun: Rc> - } - } - - impl DecryptRequest { - pub fn CiphertextBlob(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => CiphertextBlob, - } - } - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => EncryptionContext, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => GrantTokens, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => KeyId, - } - } - pub fn EncryptionAlgorithm(&self) -> &Rc>> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => EncryptionAlgorithm, - } - } - pub fn Recipient(&self) -> &Rc>> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => Recipient, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => DryRun, - } - } - } - - impl Debug - for DecryptRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for UpdateItemOutput { + fn default() -> UpdateItemOutput { + UpdateItemOutput::UpdateItemOutput { + Attributes: Default::default(), + ConsumedCapacity: Default::default(), + ItemCollectionMetrics: Default::default() + } + } + } - impl DafnyPrint - for DecryptRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DecryptRequest.DecryptRequest(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Recipient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for UpdateItemOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DecryptRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2737,3) + #[derive(PartialEq, Clone)] + pub enum UpdateKinesisStreamingConfiguration { + UpdateKinesisStreamingConfiguration { + ApproximateCreationDateTimePrecision: Arc>> + } + } - impl Hash - for DecryptRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(EncryptionContext, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(KeyId, _state); - Hash::hash(EncryptionAlgorithm, _state); - Hash::hash(Recipient, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for DecryptRequest { - fn default() -> DecryptRequest { - DecryptRequest::DecryptRequest { - CiphertextBlob: Default::default(), - EncryptionContext: Default::default(), - GrantTokens: Default::default(), - KeyId: Default::default(), - EncryptionAlgorithm: Default::default(), - Recipient: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &DecryptRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DecryptResponse { - DecryptResponse { - KeyId: Rc>>, - Plaintext: Rc>, - EncryptionAlgorithm: Rc>>, - CiphertextForRecipient: Rc> - } - } - - impl DecryptResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => KeyId, - } - } - pub fn Plaintext(&self) -> &Rc> { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => Plaintext, - } - } - pub fn EncryptionAlgorithm(&self) -> &Rc>> { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => EncryptionAlgorithm, - } - } - pub fn CiphertextForRecipient(&self) -> &Rc> { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => CiphertextForRecipient, - } - } - } - - impl Debug - for DecryptResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateKinesisStreamingConfiguration { + /// Returns a borrow of the field ApproximateCreationDateTimePrecision + pub fn ApproximateCreationDateTimePrecision(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => ApproximateCreationDateTimePrecision, + } + } + } - impl DafnyPrint - for DecryptResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DecryptResponse.DecryptResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Plaintext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateKinesisStreamingConfiguration { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DecryptResponse {} + impl DafnyPrint + for UpdateKinesisStreamingConfiguration { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingConfiguration.UpdateKinesisStreamingConfiguration(")?; + DafnyPrint::fmt_print(ApproximateCreationDateTimePrecision, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DecryptResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => { - Hash::hash(KeyId, _state); - Hash::hash(Plaintext, _state); - Hash::hash(EncryptionAlgorithm, _state); - Hash::hash(CiphertextForRecipient, _state) - }, - } - } - } + impl Eq + for UpdateKinesisStreamingConfiguration {} - impl Default - for DecryptResponse { - fn default() -> DecryptResponse { - DecryptResponse::DecryptResponse { - KeyId: Default::default(), - Plaintext: Default::default(), - EncryptionAlgorithm: Default::default(), - CiphertextForRecipient: Default::default() - } - } - } + impl Hash + for UpdateKinesisStreamingConfiguration { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration{ApproximateCreationDateTimePrecision, } => { + Hash::hash(ApproximateCreationDateTimePrecision, _state) + }, + } + } + } - impl AsRef - for &DecryptResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for UpdateKinesisStreamingConfiguration { + fn default() -> UpdateKinesisStreamingConfiguration { + UpdateKinesisStreamingConfiguration::UpdateKinesisStreamingConfiguration { + ApproximateCreationDateTimePrecision: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteAliasRequest { - DeleteAliasRequest { - AliasName: Sequence - } - } + impl AsRef + for UpdateKinesisStreamingConfiguration { + fn as_ref(&self) -> &Self { + self + } + } - impl DeleteAliasRequest { - pub fn AliasName(&self) -> &Sequence { - match self { - DeleteAliasRequest::DeleteAliasRequest{AliasName, } => AliasName, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2740,3) + #[derive(PartialEq, Clone)] + pub enum UpdateKinesisStreamingDestinationInput { + UpdateKinesisStreamingDestinationInput { + TableName: Sequence, + StreamArn: Sequence, + UpdateKinesisStreamingConfiguration: Arc>> + } + } - impl Debug - for DeleteAliasRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateKinesisStreamingDestinationInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Sequence { + match self { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field UpdateKinesisStreamingConfiguration + pub fn UpdateKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => UpdateKinesisStreamingConfiguration, + } + } + } - impl DafnyPrint - for DeleteAliasRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteAliasRequest::DeleteAliasRequest{AliasName, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteAliasRequest.DeleteAliasRequest(")?; - DafnyPrint::fmt_print(AliasName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateKinesisStreamingDestinationInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DeleteAliasRequest {} + impl DafnyPrint + for UpdateKinesisStreamingDestinationInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingDestinationInput.UpdateKinesisStreamingDestinationInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(UpdateKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DeleteAliasRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteAliasRequest::DeleteAliasRequest{AliasName, } => { - Hash::hash(AliasName, _state) - }, - } - } - } + impl Eq + for UpdateKinesisStreamingDestinationInput {} + + impl Hash + for UpdateKinesisStreamingDestinationInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput{TableName, StreamArn, UpdateKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(UpdateKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Default - for DeleteAliasRequest { - fn default() -> DeleteAliasRequest { - DeleteAliasRequest::DeleteAliasRequest { - AliasName: Default::default() - } - } - } + impl Default + for UpdateKinesisStreamingDestinationInput { + fn default() -> UpdateKinesisStreamingDestinationInput { + UpdateKinesisStreamingDestinationInput::UpdateKinesisStreamingDestinationInput { + TableName: Default::default(), + StreamArn: Default::default(), + UpdateKinesisStreamingConfiguration: Default::default() + } + } + } - impl AsRef - for &DeleteAliasRequest { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for UpdateKinesisStreamingDestinationInput { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteCustomKeyStoreRequest { - DeleteCustomKeyStoreRequest { - CustomKeyStoreId: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2745,3) + #[derive(PartialEq, Clone)] + pub enum UpdateKinesisStreamingDestinationOutput { + UpdateKinesisStreamingDestinationOutput { + TableName: Arc>>, + StreamArn: Arc>>, + DestinationStatus: Arc>>, + UpdateKinesisStreamingConfiguration: Arc>> + } + } - impl DeleteCustomKeyStoreRequest { - pub fn CustomKeyStoreId(&self) -> &Sequence { - match self { - DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, - } - } - } + impl UpdateKinesisStreamingDestinationOutput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => TableName, + } + } + /// Returns a borrow of the field StreamArn + pub fn StreamArn(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => StreamArn, + } + } + /// Returns a borrow of the field DestinationStatus + pub fn DestinationStatus(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => DestinationStatus, + } + } + /// Returns a borrow of the field UpdateKinesisStreamingConfiguration + pub fn UpdateKinesisStreamingConfiguration(&self) -> &Arc>> { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => UpdateKinesisStreamingConfiguration, + } + } + } - impl Debug - for DeleteCustomKeyStoreRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for UpdateKinesisStreamingDestinationOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DeleteCustomKeyStoreRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteCustomKeyStoreRequest.DeleteCustomKeyStoreRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for UpdateKinesisStreamingDestinationOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateKinesisStreamingDestinationOutput.UpdateKinesisStreamingDestinationOutput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DestinationStatus, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(UpdateKinesisStreamingConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DeleteCustomKeyStoreRequest {} + impl Eq + for UpdateKinesisStreamingDestinationOutput {} + + impl Hash + for UpdateKinesisStreamingDestinationOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput{TableName, StreamArn, DestinationStatus, UpdateKinesisStreamingConfiguration, } => { + Hash::hash(TableName, _state); + Hash::hash(StreamArn, _state); + Hash::hash(DestinationStatus, _state); + Hash::hash(UpdateKinesisStreamingConfiguration, _state) + }, + } + } + } - impl Hash - for DeleteCustomKeyStoreRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => { - Hash::hash(CustomKeyStoreId, _state) - }, - } - } - } + impl Default + for UpdateKinesisStreamingDestinationOutput { + fn default() -> UpdateKinesisStreamingDestinationOutput { + UpdateKinesisStreamingDestinationOutput::UpdateKinesisStreamingDestinationOutput { + TableName: Default::default(), + StreamArn: Default::default(), + DestinationStatus: Default::default(), + UpdateKinesisStreamingConfiguration: Default::default() + } + } + } - impl Default - for DeleteCustomKeyStoreRequest { - fn default() -> DeleteCustomKeyStoreRequest { - DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest { - CustomKeyStoreId: Default::default() - } - } - } + impl AsRef + for UpdateKinesisStreamingDestinationOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DeleteCustomKeyStoreRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2751,3) + #[derive(PartialEq, Clone)] + pub enum UpdateReplicationGroupMemberAction { + UpdateReplicationGroupMemberAction { + RegionName: Sequence, + KMSMasterKeyId: Arc>>, + ProvisionedThroughputOverride: Arc>>, + OnDemandThroughputOverride: Arc>>, + GlobalSecondaryIndexes: Arc>, + TableClassOverride: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteCustomKeyStoreResponse { - DeleteCustomKeyStoreResponse {} - } + impl UpdateReplicationGroupMemberAction { + /// Returns a borrow of the field RegionName + pub fn RegionName(&self) -> &Sequence { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => RegionName, + } + } + /// Returns a borrow of the field KMSMasterKeyId + pub fn KMSMasterKeyId(&self) -> &Arc>> { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => KMSMasterKeyId, + } + } + /// Returns a borrow of the field ProvisionedThroughputOverride + pub fn ProvisionedThroughputOverride(&self) -> &Arc>> { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => ProvisionedThroughputOverride, + } + } + /// Returns a borrow of the field OnDemandThroughputOverride + pub fn OnDemandThroughputOverride(&self) -> &Arc>> { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => OnDemandThroughputOverride, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexes + pub fn GlobalSecondaryIndexes(&self) -> &Arc> { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => GlobalSecondaryIndexes, + } + } + /// Returns a borrow of the field TableClassOverride + pub fn TableClassOverride(&self) -> &Arc>> { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => TableClassOverride, + } + } + } - impl DeleteCustomKeyStoreResponse {} + impl Debug + for UpdateReplicationGroupMemberAction { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DeleteCustomKeyStoreResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for UpdateReplicationGroupMemberAction { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateReplicationGroupMemberAction.UpdateReplicationGroupMemberAction(")?; + DafnyPrint::fmt_print(RegionName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KMSMasterKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughputOverride, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableClassOverride, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DeleteCustomKeyStoreResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteCustomKeyStoreResponse.DeleteCustomKeyStoreResponse")?; - Ok(()) - }, - } - } - } + impl Eq + for UpdateReplicationGroupMemberAction {} + + impl Hash + for UpdateReplicationGroupMemberAction { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction{RegionName, KMSMasterKeyId, ProvisionedThroughputOverride, OnDemandThroughputOverride, GlobalSecondaryIndexes, TableClassOverride, } => { + Hash::hash(RegionName, _state); + Hash::hash(KMSMasterKeyId, _state); + Hash::hash(ProvisionedThroughputOverride, _state); + Hash::hash(OnDemandThroughputOverride, _state); + Hash::hash(GlobalSecondaryIndexes, _state); + Hash::hash(TableClassOverride, _state) + }, + } + } + } - impl DeleteCustomKeyStoreResponse { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse {})].iter() - } - } + impl Default + for UpdateReplicationGroupMemberAction { + fn default() -> UpdateReplicationGroupMemberAction { + UpdateReplicationGroupMemberAction::UpdateReplicationGroupMemberAction { + RegionName: Default::default(), + KMSMasterKeyId: Default::default(), + ProvisionedThroughputOverride: Default::default(), + OnDemandThroughputOverride: Default::default(), + GlobalSecondaryIndexes: Default::default(), + TableClassOverride: Default::default() + } + } + } - impl Eq - for DeleteCustomKeyStoreResponse {} + impl AsRef + for UpdateReplicationGroupMemberAction { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DeleteCustomKeyStoreResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse{} => { + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2759,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTableInput { + UpdateTableInput { + AttributeDefinitions: Arc>>>, + TableName: Sequence, + BillingMode: Arc>>, + ProvisionedThroughput: Arc>>, + GlobalSecondaryIndexUpdates: Arc>>>, + StreamSpecification: Arc>>, + SSESpecification: Arc>>, + ReplicaUpdates: Arc>, + TableClass: Arc>>, + DeletionProtectionEnabled: Arc>, + OnDemandThroughput: Arc>> + } + } - }, - } - } - } - - impl Default - for DeleteCustomKeyStoreResponse { - fn default() -> DeleteCustomKeyStoreResponse { - DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse {} - } - } + impl UpdateTableInput { + /// Returns a borrow of the field AttributeDefinitions + pub fn AttributeDefinitions(&self) -> &Arc>>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => AttributeDefinitions, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => TableName, + } + } + /// Returns a borrow of the field BillingMode + pub fn BillingMode(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => BillingMode, + } + } + /// Returns a borrow of the field ProvisionedThroughput + pub fn ProvisionedThroughput(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => ProvisionedThroughput, + } + } + /// Returns a borrow of the field GlobalSecondaryIndexUpdates + pub fn GlobalSecondaryIndexUpdates(&self) -> &Arc>>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => GlobalSecondaryIndexUpdates, + } + } + /// Returns a borrow of the field StreamSpecification + pub fn StreamSpecification(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => StreamSpecification, + } + } + /// Returns a borrow of the field SSESpecification + pub fn SSESpecification(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => SSESpecification, + } + } + /// Returns a borrow of the field ReplicaUpdates + pub fn ReplicaUpdates(&self) -> &Arc> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => ReplicaUpdates, + } + } + /// Returns a borrow of the field TableClass + pub fn TableClass(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => TableClass, + } + } + /// Returns a borrow of the field DeletionProtectionEnabled + pub fn DeletionProtectionEnabled(&self) -> &Arc> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => DeletionProtectionEnabled, + } + } + /// Returns a borrow of the field OnDemandThroughput + pub fn OnDemandThroughput(&self) -> &Arc>> { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => OnDemandThroughput, + } + } + } - impl AsRef - for &DeleteCustomKeyStoreResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for UpdateTableInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DeleteImportedKeyMaterialRequest { - DeleteImportedKeyMaterialRequest { - KeyId: Sequence - } - } + impl DafnyPrint + for UpdateTableInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableInput.UpdateTableInput(")?; + DafnyPrint::fmt_print(AttributeDefinitions, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BillingMode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedThroughput, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexUpdates, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(StreamSpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SSESpecification, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableClass, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DeletionProtectionEnabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandThroughput, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DeleteImportedKeyMaterialRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => KeyId, - } - } - } + impl Eq + for UpdateTableInput {} + + impl Hash + for UpdateTableInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTableInput::UpdateTableInput{AttributeDefinitions, TableName, BillingMode, ProvisionedThroughput, GlobalSecondaryIndexUpdates, StreamSpecification, SSESpecification, ReplicaUpdates, TableClass, DeletionProtectionEnabled, OnDemandThroughput, } => { + Hash::hash(AttributeDefinitions, _state); + Hash::hash(TableName, _state); + Hash::hash(BillingMode, _state); + Hash::hash(ProvisionedThroughput, _state); + Hash::hash(GlobalSecondaryIndexUpdates, _state); + Hash::hash(StreamSpecification, _state); + Hash::hash(SSESpecification, _state); + Hash::hash(ReplicaUpdates, _state); + Hash::hash(TableClass, _state); + Hash::hash(DeletionProtectionEnabled, _state); + Hash::hash(OnDemandThroughput, _state) + }, + } + } + } - impl Debug - for DeleteImportedKeyMaterialRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for UpdateTableInput { + fn default() -> UpdateTableInput { + UpdateTableInput::UpdateTableInput { + AttributeDefinitions: Default::default(), + TableName: Default::default(), + BillingMode: Default::default(), + ProvisionedThroughput: Default::default(), + GlobalSecondaryIndexUpdates: Default::default(), + StreamSpecification: Default::default(), + SSESpecification: Default::default(), + ReplicaUpdates: Default::default(), + TableClass: Default::default(), + DeletionProtectionEnabled: Default::default(), + OnDemandThroughput: Default::default() + } + } + } - impl DafnyPrint - for DeleteImportedKeyMaterialRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteImportedKeyMaterialRequest.DeleteImportedKeyMaterialRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for UpdateTableInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DeleteImportedKeyMaterialRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2772,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTableOutput { + UpdateTableOutput { + TableDescription: Arc>> + } + } - impl Hash - for DeleteImportedKeyMaterialRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } - - impl Default - for DeleteImportedKeyMaterialRequest { - fn default() -> DeleteImportedKeyMaterialRequest { - DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest { - KeyId: Default::default() - } - } - } - - impl AsRef - for &DeleteImportedKeyMaterialRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DeriveSharedSecretRequest { - DeriveSharedSecretRequest { - KeyId: Sequence, - KeyAgreementAlgorithm: Rc, - PublicKey: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PublicKeyType, - GrantTokens: Rc>, - DryRun: Rc>, - Recipient: Rc>> - } - } - - impl DeriveSharedSecretRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => KeyId, - } - } - pub fn KeyAgreementAlgorithm(&self) -> &Rc { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => KeyAgreementAlgorithm, - } - } - pub fn PublicKey(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PublicKeyType { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => PublicKey, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => DryRun, - } - } - pub fn Recipient(&self) -> &Rc>> { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => Recipient, - } - } - } - - impl Debug - for DeriveSharedSecretRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl UpdateTableOutput { + /// Returns a borrow of the field TableDescription + pub fn TableDescription(&self) -> &Arc>> { + match self { + UpdateTableOutput::UpdateTableOutput{TableDescription, } => TableDescription, + } + } + } - impl DafnyPrint - for DeriveSharedSecretRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeriveSharedSecretRequest.DeriveSharedSecretRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyAgreementAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Recipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for UpdateTableOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for DeriveSharedSecretRequest {} + impl DafnyPrint + for UpdateTableOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTableOutput::UpdateTableOutput{TableDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableOutput.UpdateTableOutput(")?; + DafnyPrint::fmt_print(TableDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for DeriveSharedSecretRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => { - Hash::hash(KeyId, _state); - Hash::hash(KeyAgreementAlgorithm, _state); - Hash::hash(PublicKey, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state); - Hash::hash(Recipient, _state) - }, - } - } - } - - impl Default - for DeriveSharedSecretRequest { - fn default() -> DeriveSharedSecretRequest { - DeriveSharedSecretRequest::DeriveSharedSecretRequest { - KeyId: Default::default(), - KeyAgreementAlgorithm: Default::default(), - PublicKey: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default(), - Recipient: Default::default() - } - } - } - - impl AsRef - for &DeriveSharedSecretRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DeriveSharedSecretResponse { - DeriveSharedSecretResponse { - KeyId: Rc>>, - SharedSecret: Rc>, - CiphertextForRecipient: Rc>, - KeyAgreementAlgorithm: Rc>>, - KeyOrigin: Rc>> - } - } - - impl DeriveSharedSecretResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyId, - } - } - pub fn SharedSecret(&self) -> &Rc> { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => SharedSecret, - } - } - pub fn CiphertextForRecipient(&self) -> &Rc> { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => CiphertextForRecipient, - } - } - pub fn KeyAgreementAlgorithm(&self) -> &Rc>> { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyAgreementAlgorithm, - } - } - pub fn KeyOrigin(&self) -> &Rc>> { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyOrigin, - } - } - } - - impl Debug - for DeriveSharedSecretResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for UpdateTableOutput {} - impl DafnyPrint - for DeriveSharedSecretResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeriveSharedSecretResponse.DeriveSharedSecretResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SharedSecret, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyAgreementAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyOrigin, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for UpdateTableOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTableOutput::UpdateTableOutput{TableDescription, } => { + Hash::hash(TableDescription, _state) + }, + } + } + } - impl Eq - for DeriveSharedSecretResponse {} + impl Default + for UpdateTableOutput { + fn default() -> UpdateTableOutput { + UpdateTableOutput::UpdateTableOutput { + TableDescription: Default::default() + } + } + } - impl Hash - for DeriveSharedSecretResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => { - Hash::hash(KeyId, _state); - Hash::hash(SharedSecret, _state); - Hash::hash(CiphertextForRecipient, _state); - Hash::hash(KeyAgreementAlgorithm, _state); - Hash::hash(KeyOrigin, _state) - }, - } - } - } - - impl Default - for DeriveSharedSecretResponse { - fn default() -> DeriveSharedSecretResponse { - DeriveSharedSecretResponse::DeriveSharedSecretResponse { - KeyId: Default::default(), - SharedSecret: Default::default(), - CiphertextForRecipient: Default::default(), - KeyAgreementAlgorithm: Default::default(), - KeyOrigin: Default::default() - } - } - } - - impl AsRef - for &DeriveSharedSecretResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DescribeCustomKeyStoresRequest { - DescribeCustomKeyStoresRequest { - CustomKeyStoreId: Rc>>, - CustomKeyStoreName: Rc>>, - Limit: Rc>, - Marker: Rc>> - } - } - - impl DescribeCustomKeyStoresRequest { - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => CustomKeyStoreId, - } - } - pub fn CustomKeyStoreName(&self) -> &Rc>> { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => CustomKeyStoreName, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => Marker, - } - } - } - - impl Debug - for DescribeCustomKeyStoresRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for UpdateTableOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DescribeCustomKeyStoresRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeCustomKeyStoresRequest.DescribeCustomKeyStoresRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2775,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTableReplicaAutoScalingInput { + UpdateTableReplicaAutoScalingInput { + GlobalSecondaryIndexUpdates: Arc>, + TableName: Sequence, + ProvisionedWriteCapacityAutoScalingUpdate: Arc>>, + ReplicaUpdates: Arc> + } + } - impl Eq - for DescribeCustomKeyStoresRequest {} + impl UpdateTableReplicaAutoScalingInput { + /// Returns a borrow of the field GlobalSecondaryIndexUpdates + pub fn GlobalSecondaryIndexUpdates(&self) -> &Arc> { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => GlobalSecondaryIndexUpdates, + } + } + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => TableName, + } + } + /// Returns a borrow of the field ProvisionedWriteCapacityAutoScalingUpdate + pub fn ProvisionedWriteCapacityAutoScalingUpdate(&self) -> &Arc>> { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => ProvisionedWriteCapacityAutoScalingUpdate, + } + } + /// Returns a borrow of the field ReplicaUpdates + pub fn ReplicaUpdates(&self) -> &Arc> { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => ReplicaUpdates, + } + } + } - impl Hash - for DescribeCustomKeyStoresRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => { - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(CustomKeyStoreName, _state); - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } - - impl Default - for DescribeCustomKeyStoresRequest { - fn default() -> DescribeCustomKeyStoresRequest { - DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest { - CustomKeyStoreId: Default::default(), - CustomKeyStoreName: Default::default(), - Limit: Default::default(), - Marker: Default::default() - } - } - } - - impl AsRef - for &DescribeCustomKeyStoresRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum DescribeCustomKeyStoresResponse { - DescribeCustomKeyStoresResponse { - CustomKeyStores: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } - - impl DescribeCustomKeyStoresResponse { - pub fn CustomKeyStores(&self) -> &Rc>>> { - match self { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => CustomKeyStores, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => Truncated, - } - } - } - - impl Debug - for DescribeCustomKeyStoresResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for UpdateTableReplicaAutoScalingInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for DescribeCustomKeyStoresResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeCustomKeyStoresResponse.DescribeCustomKeyStoresResponse(")?; - DafnyPrint::fmt_print(CustomKeyStores, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for UpdateTableReplicaAutoScalingInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableReplicaAutoScalingInput.UpdateTableReplicaAutoScalingInput(")?; + DafnyPrint::fmt_print(GlobalSecondaryIndexUpdates, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ProvisionedWriteCapacityAutoScalingUpdate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ReplicaUpdates, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for DescribeCustomKeyStoresResponse {} + impl Eq + for UpdateTableReplicaAutoScalingInput {} + + impl Hash + for UpdateTableReplicaAutoScalingInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput{GlobalSecondaryIndexUpdates, TableName, ProvisionedWriteCapacityAutoScalingUpdate, ReplicaUpdates, } => { + Hash::hash(GlobalSecondaryIndexUpdates, _state); + Hash::hash(TableName, _state); + Hash::hash(ProvisionedWriteCapacityAutoScalingUpdate, _state); + Hash::hash(ReplicaUpdates, _state) + }, + } + } + } - impl Hash - for DescribeCustomKeyStoresResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => { - Hash::hash(CustomKeyStores, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Default + for UpdateTableReplicaAutoScalingInput { + fn default() -> UpdateTableReplicaAutoScalingInput { + UpdateTableReplicaAutoScalingInput::UpdateTableReplicaAutoScalingInput { + GlobalSecondaryIndexUpdates: Default::default(), + TableName: Default::default(), + ProvisionedWriteCapacityAutoScalingUpdate: Default::default(), + ReplicaUpdates: Default::default() + } + } + } - impl Default - for DescribeCustomKeyStoresResponse { - fn default() -> DescribeCustomKeyStoresResponse { - DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse { - CustomKeyStores: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl AsRef + for UpdateTableReplicaAutoScalingInput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeCustomKeyStoresResponse { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2781,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTableReplicaAutoScalingOutput { + UpdateTableReplicaAutoScalingOutput { + TableAutoScalingDescription: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeKeyRequest { - DescribeKeyRequest { - KeyId: Sequence, - GrantTokens: Rc> - } - } + impl UpdateTableReplicaAutoScalingOutput { + /// Returns a borrow of the field TableAutoScalingDescription + pub fn TableAutoScalingDescription(&self) -> &Arc>> { + match self { + UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => TableAutoScalingDescription, + } + } + } - impl DescribeKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => KeyId, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => GrantTokens, - } - } - } + impl Debug + for UpdateTableReplicaAutoScalingOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for UpdateTableReplicaAutoScalingOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTableReplicaAutoScalingOutput.UpdateTableReplicaAutoScalingOutput(")?; + DafnyPrint::fmt_print(TableAutoScalingDescription, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeKeyRequest.DescribeKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for UpdateTableReplicaAutoScalingOutput {} - impl Eq - for DescribeKeyRequest {} + impl Hash + for UpdateTableReplicaAutoScalingOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput{TableAutoScalingDescription, } => { + Hash::hash(TableAutoScalingDescription, _state) + }, + } + } + } - impl Hash - for DescribeKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => { - Hash::hash(KeyId, _state); - Hash::hash(GrantTokens, _state) - }, - } - } - } + impl Default + for UpdateTableReplicaAutoScalingOutput { + fn default() -> UpdateTableReplicaAutoScalingOutput { + UpdateTableReplicaAutoScalingOutput::UpdateTableReplicaAutoScalingOutput { + TableAutoScalingDescription: Default::default() + } + } + } - impl Default - for DescribeKeyRequest { - fn default() -> DescribeKeyRequest { - DescribeKeyRequest::DescribeKeyRequest { - KeyId: Default::default(), - GrantTokens: Default::default() - } - } - } + impl AsRef + for UpdateTableReplicaAutoScalingOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DescribeKeyRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2784,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTimeToLiveInput { + UpdateTimeToLiveInput { + TableName: Sequence, + TimeToLiveSpecification: Arc + } + } - #[derive(PartialEq, Clone)] - pub enum DescribeKeyResponse { - DescribeKeyResponse { - KeyMetadata: Rc>> - } - } + impl UpdateTimeToLiveInput { + /// Returns a borrow of the field TableName + pub fn TableName(&self) -> &Sequence { + match self { + UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => TableName, + } + } + /// Returns a borrow of the field TimeToLiveSpecification + pub fn TimeToLiveSpecification(&self) -> &Arc { + match self { + UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => TimeToLiveSpecification, + } + } + } - impl DescribeKeyResponse { - pub fn KeyMetadata(&self) -> &Rc>> { - match self { - DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => KeyMetadata, - } - } - } + impl Debug + for UpdateTimeToLiveInput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DescribeKeyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for UpdateTimeToLiveInput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTimeToLiveInput.UpdateTimeToLiveInput(")?; + DafnyPrint::fmt_print(TableName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TimeToLiveSpecification, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DescribeKeyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeKeyResponse.DescribeKeyResponse(")?; - DafnyPrint::fmt_print(KeyMetadata, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for UpdateTimeToLiveInput {} + + impl Hash + for UpdateTimeToLiveInput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTimeToLiveInput::UpdateTimeToLiveInput{TableName, TimeToLiveSpecification, } => { + Hash::hash(TableName, _state); + Hash::hash(TimeToLiveSpecification, _state) + }, + } + } + } - impl Eq - for DescribeKeyResponse {} + impl Default + for UpdateTimeToLiveInput { + fn default() -> UpdateTimeToLiveInput { + UpdateTimeToLiveInput::UpdateTimeToLiveInput { + TableName: Default::default(), + TimeToLiveSpecification: Default::default() + } + } + } - impl Hash - for DescribeKeyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => { - Hash::hash(KeyMetadata, _state) - }, - } - } - } + impl AsRef + for UpdateTimeToLiveInput { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for DescribeKeyResponse { - fn default() -> DescribeKeyResponse { - DescribeKeyResponse::DescribeKeyResponse { - KeyMetadata: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2788,3) + #[derive(PartialEq, Clone)] + pub enum UpdateTimeToLiveOutput { + UpdateTimeToLiveOutput { + TimeToLiveSpecification: Arc>> + } + } - impl AsRef - for &DescribeKeyResponse { - fn as_ref(&self) -> Self { - self - } - } + impl UpdateTimeToLiveOutput { + /// Returns a borrow of the field TimeToLiveSpecification + pub fn TimeToLiveSpecification(&self) -> &Arc>> { + match self { + UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => TimeToLiveSpecification, + } + } + } - pub type DescriptionType = Sequence; + impl Debug + for UpdateTimeToLiveOutput { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DisableKeyRequest { - DisableKeyRequest { - KeyId: Sequence - } - } + impl DafnyPrint + for UpdateTimeToLiveOutput { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.UpdateTimeToLiveOutput.UpdateTimeToLiveOutput(")?; + DafnyPrint::fmt_print(TimeToLiveSpecification, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DisableKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - DisableKeyRequest::DisableKeyRequest{KeyId, } => KeyId, - } - } - } + impl Eq + for UpdateTimeToLiveOutput {} - impl Debug - for DisableKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for UpdateTimeToLiveOutput { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + UpdateTimeToLiveOutput::UpdateTimeToLiveOutput{TimeToLiveSpecification, } => { + Hash::hash(TimeToLiveSpecification, _state) + }, + } + } + } - impl DafnyPrint - for DisableKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisableKeyRequest::DisableKeyRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisableKeyRequest.DisableKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for UpdateTimeToLiveOutput { + fn default() -> UpdateTimeToLiveOutput { + UpdateTimeToLiveOutput::UpdateTimeToLiveOutput { + TimeToLiveSpecification: Default::default() + } + } + } - impl Eq - for DisableKeyRequest {} + impl AsRef + for UpdateTimeToLiveOutput { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for DisableKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisableKeyRequest::DisableKeyRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2791,3) + #[derive(PartialEq, Clone)] + pub enum WriteRequest { + WriteRequest { + PutRequest: Arc>>, + DeleteRequest: Arc>> + } + } - impl Default - for DisableKeyRequest { - fn default() -> DisableKeyRequest { - DisableKeyRequest::DisableKeyRequest { - KeyId: Default::default() - } - } - } + impl WriteRequest { + /// Returns a borrow of the field PutRequest + pub fn PutRequest(&self) -> &Arc>> { + match self { + WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => PutRequest, + } + } + /// Returns a borrow of the field DeleteRequest + pub fn DeleteRequest(&self) -> &Arc>> { + match self { + WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => DeleteRequest, + } + } + } - impl AsRef - for &DisableKeyRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for WriteRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum DisableKeyRotationRequest { - DisableKeyRotationRequest { - KeyId: Sequence - } - } + impl DafnyPrint + for WriteRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.WriteRequest.WriteRequest(")?; + DafnyPrint::fmt_print(PutRequest, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DeleteRequest, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DisableKeyRotationRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => KeyId, - } - } - } + impl Eq + for WriteRequest {} + + impl Hash + for WriteRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + WriteRequest::WriteRequest{PutRequest, DeleteRequest, } => { + Hash::hash(PutRequest, _state); + Hash::hash(DeleteRequest, _state) + }, + } + } + } - impl Debug - for DisableKeyRotationRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for WriteRequest { + fn default() -> WriteRequest { + WriteRequest::WriteRequest { + PutRequest: Default::default(), + DeleteRequest: Default::default() + } + } + } - impl DafnyPrint - for DisableKeyRotationRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisableKeyRotationRequest.DisableKeyRotationRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for WriteRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for DisableKeyRotationRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2795,3) + pub type WriteRequests = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2799,3) + #[derive(PartialEq, Clone)] + pub enum Error { + BackupInUseException { + message: Arc>> + }, + BackupNotFoundException { + message: Arc>> + }, + ConditionalCheckFailedException { + message: Arc>>, + Item: Arc, Arc>>> + }, + ContinuousBackupsUnavailableException { + message: Arc>> + }, + DuplicateItemException { + message: Arc>> + }, + ExportConflictException { + message: Arc>> + }, + ExportNotFoundException { + message: Arc>> + }, + GlobalTableAlreadyExistsException { + message: Arc>> + }, + GlobalTableNotFoundException { + message: Arc>> + }, + IdempotentParameterMismatchException { + Message: Arc>> + }, + ImportConflictException { + message: Arc>> + }, + ImportNotFoundException { + message: Arc>> + }, + IndexNotFoundException { + message: Arc>> + }, + InternalServerError { + message: Arc>> + }, + InvalidEndpointException { + Message: Arc>> + }, + InvalidExportTimeException { + message: Arc>> + }, + InvalidRestoreTimeException { + message: Arc>> + }, + ItemCollectionSizeLimitExceededException { + message: Arc>> + }, + LimitExceededException { + message: Arc>> + }, + PointInTimeRecoveryUnavailableException { + message: Arc>> + }, + PolicyNotFoundException { + message: Arc>> + }, + ProvisionedThroughputExceededException { + message: Arc>> + }, + ReplicaAlreadyExistsException { + message: Arc>> + }, + ReplicaNotFoundException { + message: Arc>> + }, + RequestLimitExceeded { + message: Arc>> + }, + ResourceInUseException { + message: Arc>> + }, + ResourceNotFoundException { + message: Arc>> + }, + TableAlreadyExistsException { + message: Arc>> + }, + TableInUseException { + message: Arc>> + }, + TableNotFoundException { + message: Arc>> + }, + TransactionCanceledException { + Message: Arc>>, + CancellationReasons: Arc> + }, + TransactionConflictException { + message: Arc>> + }, + TransactionInProgressException { + Message: Arc>> + }, + Opaque { + obj: Object + }, + OpaqueWithText { + obj: Object, + objMessage: Sequence + } + } - impl Hash - for DisableKeyRotationRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + impl Error { + /// Gets the field message for all enum members which have it + pub fn message(&self) -> &Arc>> { + match self { + Error::BackupInUseException{message, } => message, + Error::BackupNotFoundException{message, } => message, + Error::ConditionalCheckFailedException{message, Item, } => message, + Error::ContinuousBackupsUnavailableException{message, } => message, + Error::DuplicateItemException{message, } => message, + Error::ExportConflictException{message, } => message, + Error::ExportNotFoundException{message, } => message, + Error::GlobalTableAlreadyExistsException{message, } => message, + Error::GlobalTableNotFoundException{message, } => message, + Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), + Error::ImportConflictException{message, } => message, + Error::ImportNotFoundException{message, } => message, + Error::IndexNotFoundException{message, } => message, + Error::InternalServerError{message, } => message, + Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), + Error::InvalidExportTimeException{message, } => message, + Error::InvalidRestoreTimeException{message, } => message, + Error::ItemCollectionSizeLimitExceededException{message, } => message, + Error::LimitExceededException{message, } => message, + Error::PointInTimeRecoveryUnavailableException{message, } => message, + Error::PolicyNotFoundException{message, } => message, + Error::ProvisionedThroughputExceededException{message, } => message, + Error::ReplicaAlreadyExistsException{message, } => message, + Error::ReplicaNotFoundException{message, } => message, + Error::RequestLimitExceeded{message, } => message, + Error::ResourceInUseException{message, } => message, + Error::ResourceNotFoundException{message, } => message, + Error::TableAlreadyExistsException{message, } => message, + Error::TableInUseException{message, } => message, + Error::TableNotFoundException{message, } => message, + Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), + Error::TransactionConflictException{message, } => message, + Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field Item for all enum members which have it + pub fn Item(&self) -> &Arc, Arc>>> { + match self { + Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), + Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ConditionalCheckFailedException{message, Item, } => Item, + Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), + Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), + Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::InternalServerError{message, } => panic!("field does not exist on this variant"), + Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), + Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), + Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), + Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), + Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), + Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::TableInUseException{message, } => panic!("field does not exist on this variant"), + Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), + Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), + Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field Message for all enum members which have it + pub fn Message(&self) -> &Arc>> { + match self { + Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), + Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), + Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), + Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IdempotentParameterMismatchException{Message, } => Message, + Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::InternalServerError{message, } => panic!("field does not exist on this variant"), + Error::InvalidEndpointException{Message, } => Message, + Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), + Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), + Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), + Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), + Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::TableInUseException{message, } => panic!("field does not exist on this variant"), + Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TransactionCanceledException{Message, CancellationReasons, } => Message, + Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), + Error::TransactionInProgressException{Message, } => Message, + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field CancellationReasons for all enum members which have it + pub fn CancellationReasons(&self) -> &Arc> { + match self { + Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), + Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), + Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), + Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), + Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::InternalServerError{message, } => panic!("field does not exist on this variant"), + Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), + Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), + Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), + Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), + Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), + Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::TableInUseException{message, } => panic!("field does not exist on this variant"), + Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TransactionCanceledException{Message, CancellationReasons, } => CancellationReasons, + Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), + Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), + } + } + /// Gets the field obj for all enum members which have it + pub fn obj(&self) -> &Object { + match self { + Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), + Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), + Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), + Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), + Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::InternalServerError{message, } => panic!("field does not exist on this variant"), + Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), + Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), + Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), + Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), + Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), + Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::TableInUseException{message, } => panic!("field does not exist on this variant"), + Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), + Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), + Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => obj, + Error::OpaqueWithText{obj, objMessage, } => obj, + } + } + /// Gets the field objMessage for all enum members which have it + pub fn objMessage(&self) -> &Sequence { + match self { + Error::BackupInUseException{message, } => panic!("field does not exist on this variant"), + Error::BackupNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ConditionalCheckFailedException{message, Item, } => panic!("field does not exist on this variant"), + Error::ContinuousBackupsUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::DuplicateItemException{message, } => panic!("field does not exist on this variant"), + Error::ExportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ExportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::GlobalTableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IdempotentParameterMismatchException{Message, } => panic!("field does not exist on this variant"), + Error::ImportConflictException{message, } => panic!("field does not exist on this variant"), + Error::ImportNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::IndexNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::InternalServerError{message, } => panic!("field does not exist on this variant"), + Error::InvalidEndpointException{Message, } => panic!("field does not exist on this variant"), + Error::InvalidExportTimeException{message, } => panic!("field does not exist on this variant"), + Error::InvalidRestoreTimeException{message, } => panic!("field does not exist on this variant"), + Error::ItemCollectionSizeLimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), + Error::PointInTimeRecoveryUnavailableException{message, } => panic!("field does not exist on this variant"), + Error::PolicyNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::ProvisionedThroughputExceededException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::ReplicaNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::RequestLimitExceeded{message, } => panic!("field does not exist on this variant"), + Error::ResourceInUseException{message, } => panic!("field does not exist on this variant"), + Error::ResourceNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TableAlreadyExistsException{message, } => panic!("field does not exist on this variant"), + Error::TableInUseException{message, } => panic!("field does not exist on this variant"), + Error::TableNotFoundException{message, } => panic!("field does not exist on this variant"), + Error::TransactionCanceledException{Message, CancellationReasons, } => panic!("field does not exist on this variant"), + Error::TransactionConflictException{message, } => panic!("field does not exist on this variant"), + Error::TransactionInProgressException{Message, } => panic!("field does not exist on this variant"), + Error::Opaque{obj, } => panic!("field does not exist on this variant"), + Error::OpaqueWithText{obj, objMessage, } => objMessage, + } + } + } - impl Default - for DisableKeyRotationRequest { - fn default() -> DisableKeyRotationRequest { - DisableKeyRotationRequest::DisableKeyRotationRequest { - KeyId: Default::default() - } - } - } + impl Debug + for Error { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &DisableKeyRotationRequest { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for Error { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + Error::BackupInUseException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.BackupInUseException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::BackupNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.BackupNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ConditionalCheckFailedException{message, Item, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ConditionalCheckFailedException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Item, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ContinuousBackupsUnavailableException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ContinuousBackupsUnavailableException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::DuplicateItemException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.DuplicateItemException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ExportConflictException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ExportConflictException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ExportNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ExportNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::GlobalTableAlreadyExistsException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.GlobalTableAlreadyExistsException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::GlobalTableNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.GlobalTableNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::IdempotentParameterMismatchException{Message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.IdempotentParameterMismatchException(")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ImportConflictException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ImportConflictException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ImportNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ImportNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::IndexNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.IndexNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InternalServerError{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InternalServerError(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidEndpointException{Message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidEndpointException(")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidExportTimeException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidExportTimeException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::InvalidRestoreTimeException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.InvalidRestoreTimeException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ItemCollectionSizeLimitExceededException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ItemCollectionSizeLimitExceededException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::LimitExceededException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.LimitExceededException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::PointInTimeRecoveryUnavailableException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.PointInTimeRecoveryUnavailableException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::PolicyNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.PolicyNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ProvisionedThroughputExceededException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ProvisionedThroughputExceededException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ReplicaAlreadyExistsException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ReplicaAlreadyExistsException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ReplicaNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ReplicaNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::RequestLimitExceeded{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.RequestLimitExceeded(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ResourceInUseException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ResourceInUseException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::ResourceNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.ResourceNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TableAlreadyExistsException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableAlreadyExistsException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TableInUseException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableInUseException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TableNotFoundException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TableNotFoundException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TransactionCanceledException{Message, CancellationReasons, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionCanceledException(")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CancellationReasons, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TransactionConflictException{message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionConflictException(")?; + DafnyPrint::fmt_print(message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::TransactionInProgressException{Message, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.TransactionInProgressException(")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::Opaque{obj, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.Opaque(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + Error::OpaqueWithText{obj, objMessage, } => { + write!(_formatter, "software.amazon.cryptography.services.dynamodb.internaldafny.types.Error.OpaqueWithText(")?; + DafnyPrint::fmt_print(obj, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(objMessage, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum DisconnectCustomKeyStoreRequest { - DisconnectCustomKeyStoreRequest { - CustomKeyStoreId: Sequence - } - } + impl Eq + for Error {} + + impl Hash + for Error { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + Error::BackupInUseException{message, } => { + Hash::hash(message, _state) + }, + Error::BackupNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::ConditionalCheckFailedException{message, Item, } => { + Hash::hash(message, _state); + Hash::hash(Item, _state) + }, + Error::ContinuousBackupsUnavailableException{message, } => { + Hash::hash(message, _state) + }, + Error::DuplicateItemException{message, } => { + Hash::hash(message, _state) + }, + Error::ExportConflictException{message, } => { + Hash::hash(message, _state) + }, + Error::ExportNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::GlobalTableAlreadyExistsException{message, } => { + Hash::hash(message, _state) + }, + Error::GlobalTableNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::IdempotentParameterMismatchException{Message, } => { + Hash::hash(Message, _state) + }, + Error::ImportConflictException{message, } => { + Hash::hash(message, _state) + }, + Error::ImportNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::IndexNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::InternalServerError{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidEndpointException{Message, } => { + Hash::hash(Message, _state) + }, + Error::InvalidExportTimeException{message, } => { + Hash::hash(message, _state) + }, + Error::InvalidRestoreTimeException{message, } => { + Hash::hash(message, _state) + }, + Error::ItemCollectionSizeLimitExceededException{message, } => { + Hash::hash(message, _state) + }, + Error::LimitExceededException{message, } => { + Hash::hash(message, _state) + }, + Error::PointInTimeRecoveryUnavailableException{message, } => { + Hash::hash(message, _state) + }, + Error::PolicyNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::ProvisionedThroughputExceededException{message, } => { + Hash::hash(message, _state) + }, + Error::ReplicaAlreadyExistsException{message, } => { + Hash::hash(message, _state) + }, + Error::ReplicaNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::RequestLimitExceeded{message, } => { + Hash::hash(message, _state) + }, + Error::ResourceInUseException{message, } => { + Hash::hash(message, _state) + }, + Error::ResourceNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::TableAlreadyExistsException{message, } => { + Hash::hash(message, _state) + }, + Error::TableInUseException{message, } => { + Hash::hash(message, _state) + }, + Error::TableNotFoundException{message, } => { + Hash::hash(message, _state) + }, + Error::TransactionCanceledException{Message, CancellationReasons, } => { + Hash::hash(Message, _state); + Hash::hash(CancellationReasons, _state) + }, + Error::TransactionConflictException{message, } => { + Hash::hash(message, _state) + }, + Error::TransactionInProgressException{Message, } => { + Hash::hash(Message, _state) + }, + Error::Opaque{obj, } => { + Hash::hash(obj, _state) + }, + Error::OpaqueWithText{obj, objMessage, } => { + Hash::hash(obj, _state); + Hash::hash(objMessage, _state) + }, + } + } + } - impl DisconnectCustomKeyStoreRequest { - pub fn CustomKeyStoreId(&self) -> &Sequence { - match self { - DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, - } - } - } + impl Default + for Error { + fn default() -> Error { + Error::BackupInUseException { + message: Default::default() + } + } + } - impl Debug - for DisconnectCustomKeyStoreRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for Error { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for DisconnectCustomKeyStoreRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisconnectCustomKeyStoreRequest.DisconnectCustomKeyStoreRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2909,3) + pub type OpaqueError = Arc; - impl Eq - for DisconnectCustomKeyStoreRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsDynamodb/Model/ComAmazonawsDynamodbTypes.dfy(2912,3) + pub type DummySubsetType = DafnyInt; - impl Hash - for DisconnectCustomKeyStoreRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => { - Hash::hash(CustomKeyStoreId, _state) - }, - } + /// An element of DummySubsetType + pub fn __init_DummySubsetType() -> DafnyInt { + int!(1) + } + } + } } - } - impl Default - for DisconnectCustomKeyStoreRequest { - fn default() -> DisconnectCustomKeyStoreRequest { - DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest { - CustomKeyStoreId: Default::default() - } - } - } + pub mod kms { + /// ../submodules/MaterialProviders/ComAmazonawsKms/src/Index.dfy(6,1) + pub mod internaldafny { + pub use ::std::sync::Arc; + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::string_utf16_of; + pub use ::dafny_runtime::Object; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClient; + pub use crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::Error; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::dafny_runtime::SequenceIter; + pub use ::dafny_runtime::seq; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/ComAmazonawsKms/src/Index.dfy(8,3) + pub fn DefaultKMSClientConfigType() -> Arc { + Arc::new(crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::KMSClientConfigType::KMSClientConfigType {}) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/src/Index.dfy(31,3) + pub fn DafnyUserAgentSuffix(runtime: &Sequence) -> Sequence { + let mut version: Sequence = string_utf16_of("1.0.1"); + string_utf16_of("AwsCryptographicMPL/").concat(runtime).concat(&string_utf16_of("/")).concat(&version) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(2006,3) + pub fn CreateSuccessOfClient(client: &Object) -> Arc, Arc>> { + Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, Arc>::Success { + value: client.clone() + }) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(2009,3) + pub fn CreateFailureOfError(error: &Arc) -> Arc, Arc>> { + Arc::new(crate::implementation_from_dafny::_Wrappers_Compile::Result::, Arc>::Failure { + error: error.clone() + }) + } + } - impl AsRef - for &DisconnectCustomKeyStoreRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1996,3) + #[derive(PartialEq, Clone)] + pub enum KMSClientConfigType { + KMSClientConfigType {} + } - #[derive(PartialEq, Clone)] - pub enum DisconnectCustomKeyStoreResponse { - DisconnectCustomKeyStoreResponse {} - } + impl KMSClientConfigType {} - impl DisconnectCustomKeyStoreResponse {} + impl Debug + for KMSClientConfigType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for DisconnectCustomKeyStoreResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for KMSClientConfigType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KMSClientConfigType::KMSClientConfigType{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.KMSClientConfigType.KMSClientConfigType")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for DisconnectCustomKeyStoreResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisconnectCustomKeyStoreResponse.DisconnectCustomKeyStoreResponse")?; - Ok(()) - }, - } - } - } + impl KMSClientConfigType { + /// Enumerates all possible values of KMSClientConfigType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KMSClientConfigType::KMSClientConfigType {})].iter() + } + } - impl DisconnectCustomKeyStoreResponse { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse {})].iter() - } - } + impl Eq + for KMSClientConfigType {} - impl Eq - for DisconnectCustomKeyStoreResponse {} + impl Hash + for KMSClientConfigType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KMSClientConfigType::KMSClientConfigType{} => { - impl Hash - for DisconnectCustomKeyStoreResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse{} => { + }, + } + } + } - }, - } - } - } + impl Default + for KMSClientConfigType { + fn default() -> KMSClientConfigType { + KMSClientConfigType::KMSClientConfigType {} + } + } - impl Default - for DisconnectCustomKeyStoreResponse { - fn default() -> DisconnectCustomKeyStoreResponse { - DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse {} - } - } + impl AsRef + for KMSClientConfigType { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &DisconnectCustomKeyStoreResponse { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(5,1) + pub mod types { + pub use ::dafny_runtime::Sequence; + pub use ::dafny_runtime::DafnyCharUTF16; + pub use ::dafny_runtime::int; + pub use ::dafny_runtime::truncate; + pub use ::dafny_runtime::DafnyInt; + pub use ::dafny_runtime::DafnyType; + pub use ::std::fmt::Debug; + pub use ::std::fmt::Formatter; + pub use ::dafny_runtime::DafnyPrint; + pub use ::std::cmp::Eq; + pub use ::std::hash::Hash; + pub use ::std::hash::Hasher; + pub use ::std::default::Default; + pub use ::std::convert::AsRef; + pub use ::dafny_runtime::SequenceIter; + pub use ::std::sync::Arc; + pub use ::dafny_runtime::seq; + pub use crate::implementation_from_dafny::_Wrappers_Compile::Option; + pub use ::dafny_runtime::Map; + pub use ::dafny_runtime::Object; + pub use ::dafny_runtime::allocate_object; + pub use ::dafny_runtime::UpcastObject; + pub use ::dafny_runtime::DynAny; + pub use ::dafny_runtime::UpcastObjectFn; + pub use ::dafny_runtime::Any; + pub use ::std::marker::Sync; + pub use ::std::marker::Send; + + pub struct _default {} + + impl _default { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(31,3) + pub fn IsValid_AliasNameType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(35,3) + pub fn IsValid_ArnType(x: &Sequence) -> bool { + !(x.cardinality() < int!(20)) && !(int!(2048) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(39,3) + pub fn IsValid_AttestationDocumentType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(b"262144") < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(51,3) + pub fn IsValid_CiphertextType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(6144) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(55,3) + pub fn IsValid_CloudHsmClusterIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(19)) && !(int!(24) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(153,3) + pub fn IsValid_CustomKeyStoreIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(64) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(157,3) + pub fn IsValid_CustomKeyStoreNameType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(248,3) + pub fn IsValid_DescriptionType(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(8192) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(420,3) + pub fn IsValid_GrantIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(436,3) + pub fn IsValid_GrantNameType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(459,3) + pub fn IsValid_GrantTokenList(x: &Sequence>) -> bool { + !(x.cardinality() < int!(0)) && !(int!(10) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(463,3) + pub fn IsValid_GrantTokenType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(482,3) + pub fn IsValid_KeyIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(2048) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(544,3) + pub fn IsValid_KeyStorePasswordType(x: &Sequence) -> bool { + !(x.cardinality() < int!(7)) && !(int!(32) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(553,3) + pub fn IsValid_LimitType(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(1000), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(624,3) + pub fn IsValid_MarkerType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(1024) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(645,3) + pub fn IsValid_NumberOfBytesType(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(1024), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(654,3) + pub fn IsValid_PendingWindowInDaysType(x: i32) -> bool { + !(x < truncate!(int!(1), i32)) && !(truncate!(int!(365), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(658,3) + pub fn IsValid_PlaintextType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(4096) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(663,3) + pub fn IsValid_PolicyNameType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(667,3) + pub fn IsValid_PolicyType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(b"131072") < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(671,3) + pub fn IsValid_PrincipalIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(675,3) + pub fn IsValid_PublicKeyType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(8192) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(707,3) + pub fn IsValid_RegionType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(32) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(741,3) + pub fn IsValid_RotationPeriodInDaysType(x: i32) -> bool { + !(x < truncate!(int!(90), i32)) && !(truncate!(int!(2560), i32) < x) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(794,3) + pub fn IsValid_TagKeyType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(803,3) + pub fn IsValid_TagValueType(x: &Sequence) -> bool { + !(x.cardinality() < int!(0)) && !(int!(256) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1723,3) + pub fn IsValid_TrustAnchorCertificateType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(5000) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1792,3) + pub fn IsValid_XksKeyIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(1)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1796,3) + pub fn IsValid_XksProxyAuthenticationAccessKeyIdType(x: &Sequence) -> bool { + !(x.cardinality() < int!(20)) && !(int!(30) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1804,3) + pub fn IsValid_XksProxyAuthenticationRawSecretAccessKeyType(x: &Sequence) -> bool { + !(x.cardinality() < int!(43)) && !(int!(64) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1818,3) + pub fn IsValid_XksProxyUriEndpointType(x: &Sequence) -> bool { + !(x.cardinality() < int!(10)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1822,3) + pub fn IsValid_XksProxyUriPathType(x: &Sequence) -> bool { + !(x.cardinality() < int!(10)) && !(int!(128) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1826,3) + pub fn IsValid_XksProxyVpcEndpointServiceNameType(x: &Sequence) -> bool { + !(x.cardinality() < int!(20)) && !(int!(64) < x.cardinality()) + } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(1986,3) + pub fn IsDummySubsetType(x: &DafnyInt) -> bool { + int!(0) < x.clone() + } + } - #[derive(PartialEq, Clone)] - pub enum EnableKeyRequest { - EnableKeyRequest { - KeyId: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(11,3) + #[derive(PartialEq, Clone)] + pub enum DafnyCallEvent { + DafnyCallEvent { + input: I, + output: O + } + } - impl EnableKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - EnableKeyRequest::EnableKeyRequest{KeyId, } => KeyId, - } - } - } + impl DafnyCallEvent { + /// Returns a borrow of the field input + pub fn input(&self) -> &I { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => input, + } + } + /// Returns a borrow of the field output + pub fn output(&self) -> &O { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => output, + } + } + } - impl Debug - for EnableKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DafnyCallEvent { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for EnableKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EnableKeyRequest::EnableKeyRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EnableKeyRequest.EnableKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DafnyCallEvent { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DafnyCallEvent.DafnyCallEvent(")?; + DafnyPrint::fmt_print(input, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(output, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for EnableKeyRequest {} + impl Eq + for DafnyCallEvent {} + + impl Hash + for DafnyCallEvent { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DafnyCallEvent::DafnyCallEvent{input, output, } => { + Hash::hash(input, _state); + Hash::hash(output, _state) + }, + } + } + } - impl Hash - for EnableKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EnableKeyRequest::EnableKeyRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + impl Default + for DafnyCallEvent { + fn default() -> DafnyCallEvent { + DafnyCallEvent::DafnyCallEvent { + input: Default::default(), + output: Default::default() + } + } + } - impl Default - for EnableKeyRequest { - fn default() -> EnableKeyRequest { - EnableKeyRequest::EnableKeyRequest { - KeyId: Default::default() - } - } - } + impl AsRef> + for DafnyCallEvent { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &EnableKeyRequest { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(15,3) + #[derive(PartialEq, Clone)] + pub enum AlgorithmSpec { + RSAES_PKCS1_V1_5 {}, + RSAES_OAEP_SHA_1 {}, + RSAES_OAEP_SHA_256 {}, + RSA_AES_KEY_WRAP_SHA_1 {}, + RSA_AES_KEY_WRAP_SHA_256 {}, + SM2PKE {} + } - #[derive(PartialEq, Clone)] - pub enum EnableKeyRotationRequest { - EnableKeyRotationRequest { - KeyId: Sequence, - RotationPeriodInDays: Rc> - } - } + impl AlgorithmSpec {} - impl EnableKeyRotationRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => KeyId, - } - } - pub fn RotationPeriodInDays(&self) -> &Rc> { - match self { - EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => RotationPeriodInDays, - } - } - } + impl Debug + for AlgorithmSpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for EnableKeyRotationRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for AlgorithmSpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AlgorithmSpec::RSAES_PKCS1_V1_5{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__PKCS1__V1__5")?; + Ok(()) + }, + AlgorithmSpec::RSAES_OAEP_SHA_1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__OAEP__SHA__1")?; + Ok(()) + }, + AlgorithmSpec::RSAES_OAEP_SHA_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSAES__OAEP__SHA__256")?; + Ok(()) + }, + AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSA__AES__KEY__WRAP__SHA__1")?; + Ok(()) + }, + AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.RSA__AES__KEY__WRAP__SHA__256")?; + Ok(()) + }, + AlgorithmSpec::SM2PKE{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AlgorithmSpec.SM2PKE")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for EnableKeyRotationRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EnableKeyRotationRequest.EnableKeyRotationRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RotationPeriodInDays, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AlgorithmSpec { + /// Enumerates all possible values of AlgorithmSpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(AlgorithmSpec::RSAES_PKCS1_V1_5 {}), Arc::new(AlgorithmSpec::RSAES_OAEP_SHA_1 {}), Arc::new(AlgorithmSpec::RSAES_OAEP_SHA_256 {}), Arc::new(AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1 {}), Arc::new(AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256 {}), Arc::new(AlgorithmSpec::SM2PKE {})].iter() + } + } - impl Eq - for EnableKeyRotationRequest {} + impl Eq + for AlgorithmSpec {} - impl Hash - for EnableKeyRotationRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => { - Hash::hash(KeyId, _state); - Hash::hash(RotationPeriodInDays, _state) - }, - } - } - } + impl Hash + for AlgorithmSpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AlgorithmSpec::RSAES_PKCS1_V1_5{} => { - impl Default - for EnableKeyRotationRequest { - fn default() -> EnableKeyRotationRequest { - EnableKeyRotationRequest::EnableKeyRotationRequest { - KeyId: Default::default(), - RotationPeriodInDays: Default::default() - } - } - } + }, + AlgorithmSpec::RSAES_OAEP_SHA_1{} => { - impl AsRef - for &EnableKeyRotationRequest { - fn as_ref(&self) -> Self { - self - } - } + }, + AlgorithmSpec::RSAES_OAEP_SHA_256{} => { - #[derive(PartialEq, Clone)] - pub enum EncryptionAlgorithmSpec { - SYMMETRIC_DEFAULT {}, - RSAES_OAEP_SHA_1 {}, - RSAES_OAEP_SHA_256 {} - } + }, + AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_1{} => { - impl EncryptionAlgorithmSpec {} + }, + AlgorithmSpec::RSA_AES_KEY_WRAP_SHA_256{} => { - impl Debug - for EncryptionAlgorithmSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + AlgorithmSpec::SM2PKE{} => { - impl DafnyPrint - for EncryptionAlgorithmSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.SYMMETRIC__DEFAULT")?; - Ok(()) - }, - EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.RSAES__OAEP__SHA__1")?; - Ok(()) - }, - EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.RSAES__OAEP__SHA__256")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl EncryptionAlgorithmSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT {}), Rc::new(EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1 {}), Rc::new(EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256 {})].iter() - } - } + impl Default + for AlgorithmSpec { + fn default() -> AlgorithmSpec { + AlgorithmSpec::RSAES_PKCS1_V1_5 {} + } + } - impl Eq - for EncryptionAlgorithmSpec {} + impl AsRef + for AlgorithmSpec { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for EncryptionAlgorithmSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(23,3) + #[derive(PartialEq, Clone)] + pub enum AliasListEntry { + AliasListEntry { + AliasName: Arc>>, + AliasArn: Arc>>, + TargetKeyId: Arc>>, + CreationDate: Arc>>, + LastUpdatedDate: Arc>> + } + } - }, - EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1{} => { + impl AliasListEntry { + /// Returns a borrow of the field AliasName + pub fn AliasName(&self) -> &Arc>> { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => AliasName, + } + } + /// Returns a borrow of the field AliasArn + pub fn AliasArn(&self) -> &Arc>> { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => AliasArn, + } + } + /// Returns a borrow of the field TargetKeyId + pub fn TargetKeyId(&self) -> &Arc>> { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => TargetKeyId, + } + } + /// Returns a borrow of the field CreationDate + pub fn CreationDate(&self) -> &Arc>> { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => CreationDate, + } + } + /// Returns a borrow of the field LastUpdatedDate + pub fn LastUpdatedDate(&self) -> &Arc>> { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => LastUpdatedDate, + } + } + } - }, - EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256{} => { + impl Debug + for AliasListEntry { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } - - impl Default - for EncryptionAlgorithmSpec { - fn default() -> EncryptionAlgorithmSpec { - EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT {} - } - } - - impl AsRef - for &EncryptionAlgorithmSpec { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EncryptRequest { - EncryptRequest { - KeyId: Sequence, - Plaintext: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, - EncryptionContext: Rc, Sequence>>>, - GrantTokens: Rc>, - EncryptionAlgorithm: Rc>>, - DryRun: Rc> - } - } - - impl EncryptRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => KeyId, - } - } - pub fn Plaintext(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => Plaintext, - } - } - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => EncryptionContext, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => GrantTokens, - } - } - pub fn EncryptionAlgorithm(&self) -> &Rc>> { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => EncryptionAlgorithm, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => DryRun, - } - } - } - - impl Debug - for EncryptRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for AliasListEntry { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.AliasListEntry.AliasListEntry(")?; + DafnyPrint::fmt_print(AliasName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(AliasArn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetKeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(LastUpdatedDate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for EncryptRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptRequest.EncryptRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Plaintext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for AliasListEntry {} + + impl Hash + for AliasListEntry { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + AliasListEntry::AliasListEntry{AliasName, AliasArn, TargetKeyId, CreationDate, LastUpdatedDate, } => { + Hash::hash(AliasName, _state); + Hash::hash(AliasArn, _state); + Hash::hash(TargetKeyId, _state); + Hash::hash(CreationDate, _state); + Hash::hash(LastUpdatedDate, _state) + }, + } + } + } - impl Eq - for EncryptRequest {} + impl Default + for AliasListEntry { + fn default() -> AliasListEntry { + AliasListEntry::AliasListEntry { + AliasName: Default::default(), + AliasArn: Default::default(), + TargetKeyId: Default::default(), + CreationDate: Default::default(), + LastUpdatedDate: Default::default() + } + } + } - impl Hash - for EncryptRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(Plaintext, _state); - Hash::hash(EncryptionContext, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(EncryptionAlgorithm, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for EncryptRequest { - fn default() -> EncryptRequest { - EncryptRequest::EncryptRequest { - KeyId: Default::default(), - Plaintext: Default::default(), - EncryptionContext: Default::default(), - GrantTokens: Default::default(), - EncryptionAlgorithm: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &EncryptRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum EncryptResponse { - EncryptResponse { - CiphertextBlob: Rc>, - KeyId: Rc>>, - EncryptionAlgorithm: Rc>> - } - } - - impl EncryptResponse { - pub fn CiphertextBlob(&self) -> &Rc> { - match self { - EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => CiphertextBlob, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => KeyId, - } - } - pub fn EncryptionAlgorithm(&self) -> &Rc>> { - match self { - EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => EncryptionAlgorithm, - } - } - } - - impl Debug - for EncryptResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for AliasListEntry { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for EncryptResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptResponse.EncryptResponse(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(30,3) + pub type AliasNameType = Sequence; - impl Eq - for EncryptResponse {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(34,3) + pub type ArnType = Sequence; - impl Hash - for EncryptResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(KeyId, _state); - Hash::hash(EncryptionAlgorithm, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(38,3) + pub type AttestationDocumentType = Sequence; - impl Default - for EncryptResponse { - fn default() -> EncryptResponse { - EncryptResponse::EncryptResponse { - CiphertextBlob: Default::default(), - KeyId: Default::default(), - EncryptionAlgorithm: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(44,3) + #[derive(PartialEq, Clone)] + pub enum CancelKeyDeletionRequest { + CancelKeyDeletionRequest { + KeyId: Sequence + } + } - impl AsRef - for &EncryptResponse { - fn as_ref(&self) -> Self { - self - } - } + impl CancelKeyDeletionRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => KeyId, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ExpirationModelType { - KEY_MATERIAL_EXPIRES {}, - KEY_MATERIAL_DOES_NOT_EXPIRE {} - } + impl Debug + for CancelKeyDeletionRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl ExpirationModelType {} + impl DafnyPrint + for CancelKeyDeletionRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CancelKeyDeletionRequest.CancelKeyDeletionRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Debug - for ExpirationModelType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CancelKeyDeletionRequest {} - impl DafnyPrint - for ExpirationModelType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ExpirationModelType::KEY_MATERIAL_EXPIRES{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ExpirationModelType.KEY__MATERIAL__EXPIRES")?; - Ok(()) - }, - ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ExpirationModelType.KEY__MATERIAL__DOES__NOT__EXPIRE")?; - Ok(()) - }, - } - } - } + impl Hash + for CancelKeyDeletionRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CancelKeyDeletionRequest::CancelKeyDeletionRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl ExpirationModelType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ExpirationModelType::KEY_MATERIAL_EXPIRES {}), Rc::new(ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE {})].iter() - } - } + impl Default + for CancelKeyDeletionRequest { + fn default() -> CancelKeyDeletionRequest { + CancelKeyDeletionRequest::CancelKeyDeletionRequest { + KeyId: Default::default() + } + } + } - impl Eq - for ExpirationModelType {} + impl AsRef + for CancelKeyDeletionRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for ExpirationModelType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ExpirationModelType::KEY_MATERIAL_EXPIRES{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(47,3) + #[derive(PartialEq, Clone)] + pub enum CancelKeyDeletionResponse { + CancelKeyDeletionResponse { + KeyId: Arc>> + } + } - }, - ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE{} => { + impl CancelKeyDeletionResponse { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => KeyId, + } + } + } - }, - } - } - } - - impl Default - for ExpirationModelType { - fn default() -> ExpirationModelType { - ExpirationModelType::KEY_MATERIAL_EXPIRES {} - } - } - - impl AsRef - for &ExpirationModelType { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyPairRequest { - GenerateDataKeyPairRequest { - EncryptionContext: Rc, Sequence>>>, - KeyId: Sequence, - KeyPairSpec: Rc, - GrantTokens: Rc>, - Recipient: Rc>>, - DryRun: Rc> - } - } - - impl GenerateDataKeyPairRequest { - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => EncryptionContext, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => KeyId, - } - } - pub fn KeyPairSpec(&self) -> &Rc { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => KeyPairSpec, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => GrantTokens, - } - } - pub fn Recipient(&self) -> &Rc>> { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => Recipient, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => DryRun, - } - } - } - - impl Debug - for GenerateDataKeyPairRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for CancelKeyDeletionResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GenerateDataKeyPairRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairRequest.GenerateDataKeyPairRequest(")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Recipient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for CancelKeyDeletionResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CancelKeyDeletionResponse.CancelKeyDeletionResponse(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GenerateDataKeyPairRequest {} + impl Eq + for CancelKeyDeletionResponse {} - impl Hash - for GenerateDataKeyPairRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => { - Hash::hash(EncryptionContext, _state); - Hash::hash(KeyId, _state); - Hash::hash(KeyPairSpec, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(Recipient, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyPairRequest { - fn default() -> GenerateDataKeyPairRequest { - GenerateDataKeyPairRequest::GenerateDataKeyPairRequest { - EncryptionContext: Default::default(), - KeyId: Default::default(), - KeyPairSpec: Default::default(), - GrantTokens: Default::default(), - Recipient: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyPairRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyPairResponse { - GenerateDataKeyPairResponse { - PrivateKeyCiphertextBlob: Rc>, - PrivateKeyPlaintext: Rc>, - PublicKey: Rc>, - KeyId: Rc>>, - KeyPairSpec: Rc>>, - CiphertextForRecipient: Rc> - } - } - - impl GenerateDataKeyPairResponse { - pub fn PrivateKeyCiphertextBlob(&self) -> &Rc> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PrivateKeyCiphertextBlob, - } - } - pub fn PrivateKeyPlaintext(&self) -> &Rc> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PrivateKeyPlaintext, - } - } - pub fn PublicKey(&self) -> &Rc> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PublicKey, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => KeyId, - } - } - pub fn KeyPairSpec(&self) -> &Rc>> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => KeyPairSpec, - } - } - pub fn CiphertextForRecipient(&self) -> &Rc> { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => CiphertextForRecipient, - } - } - } - - impl Debug - for GenerateDataKeyPairResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for CancelKeyDeletionResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CancelKeyDeletionResponse::CancelKeyDeletionResponse{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl DafnyPrint - for GenerateDataKeyPairResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairResponse.GenerateDataKeyPairResponse(")?; - DafnyPrint::fmt_print(PrivateKeyCiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PrivateKeyPlaintext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for CancelKeyDeletionResponse { + fn default() -> CancelKeyDeletionResponse { + CancelKeyDeletionResponse::CancelKeyDeletionResponse { + KeyId: Default::default() + } + } + } - impl Eq - for GenerateDataKeyPairResponse {} + impl AsRef + for CancelKeyDeletionResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GenerateDataKeyPairResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => { - Hash::hash(PrivateKeyCiphertextBlob, _state); - Hash::hash(PrivateKeyPlaintext, _state); - Hash::hash(PublicKey, _state); - Hash::hash(KeyId, _state); - Hash::hash(KeyPairSpec, _state); - Hash::hash(CiphertextForRecipient, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyPairResponse { - fn default() -> GenerateDataKeyPairResponse { - GenerateDataKeyPairResponse::GenerateDataKeyPairResponse { - PrivateKeyCiphertextBlob: Default::default(), - PrivateKeyPlaintext: Default::default(), - PublicKey: Default::default(), - KeyId: Default::default(), - KeyPairSpec: Default::default(), - CiphertextForRecipient: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyPairResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyPairWithoutPlaintextRequest { - GenerateDataKeyPairWithoutPlaintextRequest { - EncryptionContext: Rc, Sequence>>>, - KeyId: Sequence, - KeyPairSpec: Rc, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl GenerateDataKeyPairWithoutPlaintextRequest { - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => EncryptionContext, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => KeyId, - } - } - pub fn KeyPairSpec(&self) -> &Rc { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => KeyPairSpec, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for GenerateDataKeyPairWithoutPlaintextRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(50,3) + pub type CiphertextType = Sequence; - impl DafnyPrint - for GenerateDataKeyPairWithoutPlaintextRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairWithoutPlaintextRequest.GenerateDataKeyPairWithoutPlaintextRequest(")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(54,3) + pub type CloudHsmClusterIdType = Sequence; - impl Eq - for GenerateDataKeyPairWithoutPlaintextRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(58,3) + #[derive(PartialEq, Clone)] + pub enum ConnectCustomKeyStoreRequest { + ConnectCustomKeyStoreRequest { + CustomKeyStoreId: Sequence + } + } - impl Hash - for GenerateDataKeyPairWithoutPlaintextRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => { - Hash::hash(EncryptionContext, _state); - Hash::hash(KeyId, _state); - Hash::hash(KeyPairSpec, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyPairWithoutPlaintextRequest { - fn default() -> GenerateDataKeyPairWithoutPlaintextRequest { - GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest { - EncryptionContext: Default::default(), - KeyId: Default::default(), - KeyPairSpec: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyPairWithoutPlaintextRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyPairWithoutPlaintextResponse { - GenerateDataKeyPairWithoutPlaintextResponse { - PrivateKeyCiphertextBlob: Rc>, - PublicKey: Rc>, - KeyId: Rc>>, - KeyPairSpec: Rc>> - } - } - - impl GenerateDataKeyPairWithoutPlaintextResponse { - pub fn PrivateKeyCiphertextBlob(&self) -> &Rc> { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => PrivateKeyCiphertextBlob, - } - } - pub fn PublicKey(&self) -> &Rc> { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => PublicKey, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => KeyId, - } - } - pub fn KeyPairSpec(&self) -> &Rc>> { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => KeyPairSpec, - } - } - } - - impl Debug - for GenerateDataKeyPairWithoutPlaintextResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ConnectCustomKeyStoreRequest { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Sequence { + match self { + ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, + } + } + } - impl DafnyPrint - for GenerateDataKeyPairWithoutPlaintextResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairWithoutPlaintextResponse.GenerateDataKeyPairWithoutPlaintextResponse(")?; - DafnyPrint::fmt_print(PrivateKeyCiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ConnectCustomKeyStoreRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GenerateDataKeyPairWithoutPlaintextResponse {} + impl DafnyPrint + for ConnectCustomKeyStoreRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectCustomKeyStoreRequest.ConnectCustomKeyStoreRequest(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GenerateDataKeyPairWithoutPlaintextResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => { - Hash::hash(PrivateKeyCiphertextBlob, _state); - Hash::hash(PublicKey, _state); - Hash::hash(KeyId, _state); - Hash::hash(KeyPairSpec, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyPairWithoutPlaintextResponse { - fn default() -> GenerateDataKeyPairWithoutPlaintextResponse { - GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse { - PrivateKeyCiphertextBlob: Default::default(), - PublicKey: Default::default(), - KeyId: Default::default(), - KeyPairSpec: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyPairWithoutPlaintextResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyRequest { - GenerateDataKeyRequest { - KeyId: Sequence, - EncryptionContext: Rc, Sequence>>>, - NumberOfBytes: Rc>, - KeySpec: Rc>>, - GrantTokens: Rc>, - Recipient: Rc>>, - DryRun: Rc> - } - } - - impl GenerateDataKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => KeyId, - } - } - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => EncryptionContext, - } - } - pub fn NumberOfBytes(&self) -> &Rc> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => NumberOfBytes, - } - } - pub fn KeySpec(&self) -> &Rc>> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => KeySpec, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => GrantTokens, - } - } - pub fn Recipient(&self) -> &Rc>> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => Recipient, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => DryRun, - } - } - } - - impl Debug - for GenerateDataKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ConnectCustomKeyStoreRequest {} - impl DafnyPrint - for GenerateDataKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyRequest.GenerateDataKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Recipient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ConnectCustomKeyStoreRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest{CustomKeyStoreId, } => { + Hash::hash(CustomKeyStoreId, _state) + }, + } + } + } - impl Eq - for GenerateDataKeyRequest {} + impl Default + for ConnectCustomKeyStoreRequest { + fn default() -> ConnectCustomKeyStoreRequest { + ConnectCustomKeyStoreRequest::ConnectCustomKeyStoreRequest { + CustomKeyStoreId: Default::default() + } + } + } - impl Hash - for GenerateDataKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(EncryptionContext, _state); - Hash::hash(NumberOfBytes, _state); - Hash::hash(KeySpec, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(Recipient, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyRequest { - fn default() -> GenerateDataKeyRequest { - GenerateDataKeyRequest::GenerateDataKeyRequest { - KeyId: Default::default(), - EncryptionContext: Default::default(), - NumberOfBytes: Default::default(), - KeySpec: Default::default(), - GrantTokens: Default::default(), - Recipient: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyResponse { - GenerateDataKeyResponse { - CiphertextBlob: Rc>, - Plaintext: Rc>, - KeyId: Rc>>, - CiphertextForRecipient: Rc> - } - } - - impl GenerateDataKeyResponse { - pub fn CiphertextBlob(&self) -> &Rc> { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => CiphertextBlob, - } - } - pub fn Plaintext(&self) -> &Rc> { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => Plaintext, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => KeyId, - } - } - pub fn CiphertextForRecipient(&self) -> &Rc> { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => CiphertextForRecipient, - } - } - } - - impl Debug - for GenerateDataKeyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ConnectCustomKeyStoreRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GenerateDataKeyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyResponse.GenerateDataKeyResponse(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Plaintext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(61,3) + #[derive(PartialEq, Clone)] + pub enum ConnectCustomKeyStoreResponse { + ConnectCustomKeyStoreResponse {} + } - impl Eq - for GenerateDataKeyResponse {} + impl ConnectCustomKeyStoreResponse {} - impl Hash - for GenerateDataKeyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(Plaintext, _state); - Hash::hash(KeyId, _state); - Hash::hash(CiphertextForRecipient, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyResponse { - fn default() -> GenerateDataKeyResponse { - GenerateDataKeyResponse::GenerateDataKeyResponse { - CiphertextBlob: Default::default(), - Plaintext: Default::default(), - KeyId: Default::default(), - CiphertextForRecipient: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyWithoutPlaintextRequest { - GenerateDataKeyWithoutPlaintextRequest { - KeyId: Sequence, - EncryptionContext: Rc, Sequence>>>, - KeySpec: Rc>>, - NumberOfBytes: Rc>, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl GenerateDataKeyWithoutPlaintextRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => KeyId, - } - } - pub fn EncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => EncryptionContext, - } - } - pub fn KeySpec(&self) -> &Rc>> { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => KeySpec, - } - } - pub fn NumberOfBytes(&self) -> &Rc> { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => NumberOfBytes, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for GenerateDataKeyWithoutPlaintextRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ConnectCustomKeyStoreResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GenerateDataKeyWithoutPlaintextRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyWithoutPlaintextRequest.GenerateDataKeyWithoutPlaintextRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ConnectCustomKeyStoreResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectCustomKeyStoreResponse.ConnectCustomKeyStoreResponse")?; + Ok(()) + }, + } + } + } - impl Eq - for GenerateDataKeyWithoutPlaintextRequest {} + impl ConnectCustomKeyStoreResponse { + /// Enumerates all possible values of ConnectCustomKeyStoreResponse + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse {})].iter() + } + } - impl Hash - for GenerateDataKeyWithoutPlaintextRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(EncryptionContext, _state); - Hash::hash(KeySpec, _state); - Hash::hash(NumberOfBytes, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyWithoutPlaintextRequest { - fn default() -> GenerateDataKeyWithoutPlaintextRequest { - GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest { - KeyId: Default::default(), - EncryptionContext: Default::default(), - KeySpec: Default::default(), - NumberOfBytes: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyWithoutPlaintextRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateDataKeyWithoutPlaintextResponse { - GenerateDataKeyWithoutPlaintextResponse { - CiphertextBlob: Rc>, - KeyId: Rc>> - } - } - - impl GenerateDataKeyWithoutPlaintextResponse { - pub fn CiphertextBlob(&self) -> &Rc> { - match self { - GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => CiphertextBlob, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => KeyId, - } - } - } - - impl Debug - for GenerateDataKeyWithoutPlaintextResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for ConnectCustomKeyStoreResponse {} - impl DafnyPrint - for GenerateDataKeyWithoutPlaintextResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyWithoutPlaintextResponse.GenerateDataKeyWithoutPlaintextResponse(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Hash + for ConnectCustomKeyStoreResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse{} => { - impl Eq - for GenerateDataKeyWithoutPlaintextResponse {} + }, + } + } + } - impl Hash - for GenerateDataKeyWithoutPlaintextResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(KeyId, _state) - }, - } - } - } - - impl Default - for GenerateDataKeyWithoutPlaintextResponse { - fn default() -> GenerateDataKeyWithoutPlaintextResponse { - GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse { - CiphertextBlob: Default::default(), - KeyId: Default::default() - } - } - } - - impl AsRef - for &GenerateDataKeyWithoutPlaintextResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateMacRequest { - GenerateMacRequest { - Message: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, - KeyId: Sequence, - MacAlgorithm: Rc, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl GenerateMacRequest { - pub fn Message(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => Message, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => KeyId, - } - } - pub fn MacAlgorithm(&self) -> &Rc { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => MacAlgorithm, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for GenerateMacRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ConnectCustomKeyStoreResponse { + fn default() -> ConnectCustomKeyStoreResponse { + ConnectCustomKeyStoreResponse::ConnectCustomKeyStoreResponse {} + } + } - impl DafnyPrint - for GenerateMacRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateMacRequest.GenerateMacRequest(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ConnectCustomKeyStoreResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GenerateMacRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(64,3) + #[derive(PartialEq, Clone)] + pub enum ConnectionErrorCodeType { + INVALID_CREDENTIALS {}, + CLUSTER_NOT_FOUND {}, + NETWORK_ERRORS {}, + INTERNAL_ERROR {}, + INSUFFICIENT_CLOUDHSM_HSMS {}, + USER_LOCKED_OUT {}, + USER_NOT_FOUND {}, + USER_LOGGED_IN {}, + SUBNET_NOT_FOUND {}, + INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET {}, + XKS_PROXY_ACCESS_DENIED {}, + XKS_PROXY_NOT_REACHABLE {}, + XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND {}, + XKS_PROXY_INVALID_RESPONSE {}, + XKS_PROXY_INVALID_CONFIGURATION {}, + XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION {}, + XKS_PROXY_TIMED_OUT {}, + XKS_PROXY_INVALID_TLS_CONFIGURATION {} + } - impl Hash - for GenerateMacRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => { - Hash::hash(Message, _state); - Hash::hash(KeyId, _state); - Hash::hash(MacAlgorithm, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for GenerateMacRequest { - fn default() -> GenerateMacRequest { - GenerateMacRequest::GenerateMacRequest { - Message: Default::default(), - KeyId: Default::default(), - MacAlgorithm: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &GenerateMacRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GenerateMacResponse { - GenerateMacResponse { - Mac: Rc>, - MacAlgorithm: Rc>>, - KeyId: Rc>> - } - } - - impl GenerateMacResponse { - pub fn Mac(&self) -> &Rc> { - match self { - GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => Mac, - } - } - pub fn MacAlgorithm(&self) -> &Rc>> { - match self { - GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => MacAlgorithm, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => KeyId, - } - } - } - - impl Debug - for GenerateMacResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ConnectionErrorCodeType {} - impl DafnyPrint - for GenerateMacResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateMacResponse.GenerateMacResponse(")?; - DafnyPrint::fmt_print(Mac, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ConnectionErrorCodeType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GenerateMacResponse {} + impl DafnyPrint + for ConnectionErrorCodeType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConnectionErrorCodeType::INVALID_CREDENTIALS{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INVALID__CREDENTIALS")?; + Ok(()) + }, + ConnectionErrorCodeType::CLUSTER_NOT_FOUND{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.CLUSTER__NOT__FOUND")?; + Ok(()) + }, + ConnectionErrorCodeType::NETWORK_ERRORS{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.NETWORK__ERRORS")?; + Ok(()) + }, + ConnectionErrorCodeType::INTERNAL_ERROR{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INTERNAL__ERROR")?; + Ok(()) + }, + ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INSUFFICIENT__CLOUDHSM__HSMS")?; + Ok(()) + }, + ConnectionErrorCodeType::USER_LOCKED_OUT{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__LOCKED__OUT")?; + Ok(()) + }, + ConnectionErrorCodeType::USER_NOT_FOUND{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__NOT__FOUND")?; + Ok(()) + }, + ConnectionErrorCodeType::USER_LOGGED_IN{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.USER__LOGGED__IN")?; + Ok(()) + }, + ConnectionErrorCodeType::SUBNET_NOT_FOUND{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.SUBNET__NOT__FOUND")?; + Ok(()) + }, + ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.INSUFFICIENT__FREE__ADDRESSES__IN__SUBNET")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__ACCESS__DENIED")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__NOT__REACHABLE")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__VPC__ENDPOINT__SERVICE__NOT__FOUND")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__RESPONSE")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__CONFIGURATION")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__VPC__ENDPOINT__SERVICE__INVALID__CONFIGURATION")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__TIMED__OUT")?; + Ok(()) + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionErrorCodeType.XKS__PROXY__INVALID__TLS__CONFIGURATION")?; + Ok(()) + }, + } + } + } - impl Hash - for GenerateMacResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => { - Hash::hash(Mac, _state); - Hash::hash(MacAlgorithm, _state); - Hash::hash(KeyId, _state) - }, - } - } - } + impl ConnectionErrorCodeType { + /// Enumerates all possible values of ConnectionErrorCodeType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ConnectionErrorCodeType::INVALID_CREDENTIALS {}), Arc::new(ConnectionErrorCodeType::CLUSTER_NOT_FOUND {}), Arc::new(ConnectionErrorCodeType::NETWORK_ERRORS {}), Arc::new(ConnectionErrorCodeType::INTERNAL_ERROR {}), Arc::new(ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS {}), Arc::new(ConnectionErrorCodeType::USER_LOCKED_OUT {}), Arc::new(ConnectionErrorCodeType::USER_NOT_FOUND {}), Arc::new(ConnectionErrorCodeType::USER_LOGGED_IN {}), Arc::new(ConnectionErrorCodeType::SUBNET_NOT_FOUND {}), Arc::new(ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE {}), Arc::new(ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION {}), Arc::new(ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT {}), Arc::new(ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION {})].iter() + } + } - impl Default - for GenerateMacResponse { - fn default() -> GenerateMacResponse { - GenerateMacResponse::GenerateMacResponse { - Mac: Default::default(), - MacAlgorithm: Default::default(), - KeyId: Default::default() - } - } - } + impl Eq + for ConnectionErrorCodeType {} - impl AsRef - for &GenerateMacResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for ConnectionErrorCodeType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConnectionErrorCodeType::INVALID_CREDENTIALS{} => { - #[derive(PartialEq, Clone)] - pub enum GenerateRandomRequest { - GenerateRandomRequest { - NumberOfBytes: Rc>, - CustomKeyStoreId: Rc>>, - Recipient: Rc>> - } - } + }, + ConnectionErrorCodeType::CLUSTER_NOT_FOUND{} => { - impl GenerateRandomRequest { - pub fn NumberOfBytes(&self) -> &Rc> { - match self { - GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => NumberOfBytes, - } - } - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => CustomKeyStoreId, - } - } - pub fn Recipient(&self) -> &Rc>> { - match self { - GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => Recipient, - } - } - } + }, + ConnectionErrorCodeType::NETWORK_ERRORS{} => { - impl Debug - for GenerateRandomRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ConnectionErrorCodeType::INTERNAL_ERROR{} => { - impl DafnyPrint - for GenerateRandomRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateRandomRequest.GenerateRandomRequest(")?; - DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Recipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ConnectionErrorCodeType::INSUFFICIENT_CLOUDHSM_HSMS{} => { - impl Eq - for GenerateRandomRequest {} + }, + ConnectionErrorCodeType::USER_LOCKED_OUT{} => { - impl Hash - for GenerateRandomRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => { - Hash::hash(NumberOfBytes, _state); - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(Recipient, _state) - }, - } - } - } + }, + ConnectionErrorCodeType::USER_NOT_FOUND{} => { - impl Default - for GenerateRandomRequest { - fn default() -> GenerateRandomRequest { - GenerateRandomRequest::GenerateRandomRequest { - NumberOfBytes: Default::default(), - CustomKeyStoreId: Default::default(), - Recipient: Default::default() - } - } - } + }, + ConnectionErrorCodeType::USER_LOGGED_IN{} => { - impl AsRef - for &GenerateRandomRequest { - fn as_ref(&self) -> Self { - self - } - } + }, + ConnectionErrorCodeType::SUBNET_NOT_FOUND{} => { - #[derive(PartialEq, Clone)] - pub enum GenerateRandomResponse { - GenerateRandomResponse { - Plaintext: Rc>, - CiphertextForRecipient: Rc> - } - } + }, + ConnectionErrorCodeType::INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET{} => { - impl GenerateRandomResponse { - pub fn Plaintext(&self) -> &Rc> { - match self { - GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => Plaintext, - } - } - pub fn CiphertextForRecipient(&self) -> &Rc> { - match self { - GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => CiphertextForRecipient, - } - } - } + }, + ConnectionErrorCodeType::XKS_PROXY_ACCESS_DENIED{} => { - impl Debug - for GenerateRandomResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ConnectionErrorCodeType::XKS_PROXY_NOT_REACHABLE{} => { - impl DafnyPrint - for GenerateRandomResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateRandomResponse.GenerateRandomResponse(")?; - DafnyPrint::fmt_print(Plaintext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND{} => { - impl Eq - for GenerateRandomResponse {} + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_RESPONSE{} => { - impl Hash - for GenerateRandomResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => { - Hash::hash(Plaintext, _state); - Hash::hash(CiphertextForRecipient, _state) - }, - } - } - } + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_CONFIGURATION{} => { - impl Default - for GenerateRandomResponse { - fn default() -> GenerateRandomResponse { - GenerateRandomResponse::GenerateRandomResponse { - Plaintext: Default::default(), - CiphertextForRecipient: Default::default() - } - } - } + }, + ConnectionErrorCodeType::XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION{} => { - impl AsRef - for &GenerateRandomResponse { - fn as_ref(&self) -> Self { - self - } - } + }, + ConnectionErrorCodeType::XKS_PROXY_TIMED_OUT{} => { - #[derive(PartialEq, Clone)] - pub enum GetKeyPolicyRequest { - GetKeyPolicyRequest { - KeyId: Sequence, - PolicyName: Rc>> - } - } + }, + ConnectionErrorCodeType::XKS_PROXY_INVALID_TLS_CONFIGURATION{} => { - impl GetKeyPolicyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => KeyId, - } - } - pub fn PolicyName(&self) -> &Rc>> { - match self { - GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => PolicyName, - } - } - } + }, + } + } + } - impl Debug - for GetKeyPolicyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ConnectionErrorCodeType { + fn default() -> ConnectionErrorCodeType { + ConnectionErrorCodeType::INVALID_CREDENTIALS {} + } + } - impl DafnyPrint - for GetKeyPolicyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyPolicyRequest.GetKeyPolicyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PolicyName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ConnectionErrorCodeType { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GetKeyPolicyRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(83,3) + #[derive(PartialEq, Clone)] + pub enum ConnectionStateType { + CONNECTED {}, + CONNECTING {}, + FAILED {}, + DISCONNECTED {}, + DISCONNECTING {} + } - impl Hash - for GetKeyPolicyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => { - Hash::hash(KeyId, _state); - Hash::hash(PolicyName, _state) - }, - } - } - } + impl ConnectionStateType {} - impl Default - for GetKeyPolicyRequest { - fn default() -> GetKeyPolicyRequest { - GetKeyPolicyRequest::GetKeyPolicyRequest { - KeyId: Default::default(), - PolicyName: Default::default() - } - } - } + impl Debug + for ConnectionStateType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &GetKeyPolicyRequest { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for ConnectionStateType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ConnectionStateType::CONNECTED{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.CONNECTED")?; + Ok(()) + }, + ConnectionStateType::CONNECTING{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.CONNECTING")?; + Ok(()) + }, + ConnectionStateType::FAILED{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.FAILED")?; + Ok(()) + }, + ConnectionStateType::DISCONNECTED{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.DISCONNECTED")?; + Ok(()) + }, + ConnectionStateType::DISCONNECTING{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ConnectionStateType.DISCONNECTING")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetKeyPolicyResponse { - GetKeyPolicyResponse { - Policy: Rc>>, - PolicyName: Rc>> - } - } + impl ConnectionStateType { + /// Enumerates all possible values of ConnectionStateType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ConnectionStateType::CONNECTED {}), Arc::new(ConnectionStateType::CONNECTING {}), Arc::new(ConnectionStateType::FAILED {}), Arc::new(ConnectionStateType::DISCONNECTED {}), Arc::new(ConnectionStateType::DISCONNECTING {})].iter() + } + } - impl GetKeyPolicyResponse { - pub fn Policy(&self) -> &Rc>> { - match self { - GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => Policy, - } - } - pub fn PolicyName(&self) -> &Rc>> { - match self { - GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => PolicyName, - } - } - } + impl Eq + for ConnectionStateType {} - impl Debug - for GetKeyPolicyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for ConnectionStateType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ConnectionStateType::CONNECTED{} => { - impl DafnyPrint - for GetKeyPolicyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyPolicyResponse.GetKeyPolicyResponse(")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PolicyName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + ConnectionStateType::CONNECTING{} => { - impl Eq - for GetKeyPolicyResponse {} + }, + ConnectionStateType::FAILED{} => { - impl Hash - for GetKeyPolicyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => { - Hash::hash(Policy, _state); - Hash::hash(PolicyName, _state) - }, - } - } - } + }, + ConnectionStateType::DISCONNECTED{} => { - impl Default - for GetKeyPolicyResponse { - fn default() -> GetKeyPolicyResponse { - GetKeyPolicyResponse::GetKeyPolicyResponse { - Policy: Default::default(), - PolicyName: Default::default() - } - } - } + }, + ConnectionStateType::DISCONNECTING{} => { - impl AsRef - for &GetKeyPolicyResponse { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum GetKeyRotationStatusRequest { - GetKeyRotationStatusRequest { - KeyId: Sequence - } - } + impl Default + for ConnectionStateType { + fn default() -> ConnectionStateType { + ConnectionStateType::CONNECTED {} + } + } - impl GetKeyRotationStatusRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => KeyId, - } - } - } + impl AsRef + for ConnectionStateType { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for GetKeyRotationStatusRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(89,3) + #[derive(PartialEq, Clone)] + pub enum CreateAliasRequest { + CreateAliasRequest { + AliasName: Sequence, + TargetKeyId: Sequence + } + } - impl DafnyPrint - for GetKeyRotationStatusRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyRotationStatusRequest.GetKeyRotationStatusRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl CreateAliasRequest { + /// Returns a borrow of the field AliasName + pub fn AliasName(&self) -> &Sequence { + match self { + CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => AliasName, + } + } + /// Returns a borrow of the field TargetKeyId + pub fn TargetKeyId(&self) -> &Sequence { + match self { + CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => TargetKeyId, + } + } + } - impl Eq - for GetKeyRotationStatusRequest {} + impl Debug + for CreateAliasRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for GetKeyRotationStatusRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } - - impl Default - for GetKeyRotationStatusRequest { - fn default() -> GetKeyRotationStatusRequest { - GetKeyRotationStatusRequest::GetKeyRotationStatusRequest { - KeyId: Default::default() - } - } - } - - impl AsRef - for &GetKeyRotationStatusRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetKeyRotationStatusResponse { - GetKeyRotationStatusResponse { - KeyRotationEnabled: Rc>, - KeyId: Rc>>, - RotationPeriodInDays: Rc>, - NextRotationDate: Rc>>, - OnDemandRotationStartDate: Rc>> - } - } - - impl GetKeyRotationStatusResponse { - pub fn KeyRotationEnabled(&self) -> &Rc> { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => KeyRotationEnabled, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => KeyId, - } - } - pub fn RotationPeriodInDays(&self) -> &Rc> { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => RotationPeriodInDays, - } - } - pub fn NextRotationDate(&self) -> &Rc>> { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => NextRotationDate, - } - } - pub fn OnDemandRotationStartDate(&self) -> &Rc>> { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => OnDemandRotationStartDate, - } - } - } - - impl Debug - for GetKeyRotationStatusResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CreateAliasRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateAliasRequest.CreateAliasRequest(")?; + DafnyPrint::fmt_print(AliasName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TargetKeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GetKeyRotationStatusResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyRotationStatusResponse.GetKeyRotationStatusResponse(")?; - DafnyPrint::fmt_print(KeyRotationEnabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RotationPeriodInDays, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextRotationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(OnDemandRotationStartDate, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for CreateAliasRequest {} + + impl Hash + for CreateAliasRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateAliasRequest::CreateAliasRequest{AliasName, TargetKeyId, } => { + Hash::hash(AliasName, _state); + Hash::hash(TargetKeyId, _state) + }, + } + } + } - impl Eq - for GetKeyRotationStatusResponse {} + impl Default + for CreateAliasRequest { + fn default() -> CreateAliasRequest { + CreateAliasRequest::CreateAliasRequest { + AliasName: Default::default(), + TargetKeyId: Default::default() + } + } + } - impl Hash - for GetKeyRotationStatusResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => { - Hash::hash(KeyRotationEnabled, _state); - Hash::hash(KeyId, _state); - Hash::hash(RotationPeriodInDays, _state); - Hash::hash(NextRotationDate, _state); - Hash::hash(OnDemandRotationStartDate, _state) - }, - } - } - } - - impl Default - for GetKeyRotationStatusResponse { - fn default() -> GetKeyRotationStatusResponse { - GetKeyRotationStatusResponse::GetKeyRotationStatusResponse { - KeyRotationEnabled: Default::default(), - KeyId: Default::default(), - RotationPeriodInDays: Default::default(), - NextRotationDate: Default::default(), - OnDemandRotationStartDate: Default::default() - } - } - } - - impl AsRef - for &GetKeyRotationStatusResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetParametersForImportRequest { - GetParametersForImportRequest { - KeyId: Sequence, - WrappingAlgorithm: Rc, - WrappingKeySpec: Rc - } - } - - impl GetParametersForImportRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => KeyId, - } - } - pub fn WrappingAlgorithm(&self) -> &Rc { - match self { - GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => WrappingAlgorithm, - } - } - pub fn WrappingKeySpec(&self) -> &Rc { - match self { - GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => WrappingKeySpec, - } - } - } - - impl Debug - for GetParametersForImportRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for CreateAliasRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for GetParametersForImportRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetParametersForImportRequest.GetParametersForImportRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WrappingAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(WrappingKeySpec, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(93,3) + #[derive(PartialEq, Clone)] + pub enum CreateCustomKeyStoreRequest { + CreateCustomKeyStoreRequest { + CustomKeyStoreName: Sequence, + CloudHsmClusterId: Arc>>, + TrustAnchorCertificate: Arc>>, + KeyStorePassword: Arc>>, + CustomKeyStoreType: Arc>>, + XksProxyUriEndpoint: Arc>>, + XksProxyUriPath: Arc>>, + XksProxyVpcEndpointServiceName: Arc>>, + XksProxyAuthenticationCredential: Arc>>, + XksProxyConnectivity: Arc>> + } + } - impl Eq - for GetParametersForImportRequest {} + impl CreateCustomKeyStoreRequest { + /// Returns a borrow of the field CustomKeyStoreName + pub fn CustomKeyStoreName(&self) -> &Sequence { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CustomKeyStoreName, + } + } + /// Returns a borrow of the field CloudHsmClusterId + pub fn CloudHsmClusterId(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CloudHsmClusterId, + } + } + /// Returns a borrow of the field TrustAnchorCertificate + pub fn TrustAnchorCertificate(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => TrustAnchorCertificate, + } + } + /// Returns a borrow of the field KeyStorePassword + pub fn KeyStorePassword(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => KeyStorePassword, + } + } + /// Returns a borrow of the field CustomKeyStoreType + pub fn CustomKeyStoreType(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CustomKeyStoreType, + } + } + /// Returns a borrow of the field XksProxyUriEndpoint + pub fn XksProxyUriEndpoint(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriEndpoint, + } + } + /// Returns a borrow of the field XksProxyUriPath + pub fn XksProxyUriPath(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriPath, + } + } + /// Returns a borrow of the field XksProxyVpcEndpointServiceName + pub fn XksProxyVpcEndpointServiceName(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyVpcEndpointServiceName, + } + } + /// Returns a borrow of the field XksProxyAuthenticationCredential + pub fn XksProxyAuthenticationCredential(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyAuthenticationCredential, + } + } + /// Returns a borrow of the field XksProxyConnectivity + pub fn XksProxyConnectivity(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyConnectivity, + } + } + } - impl Hash - for GetParametersForImportRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => { - Hash::hash(KeyId, _state); - Hash::hash(WrappingAlgorithm, _state); - Hash::hash(WrappingKeySpec, _state) - }, - } - } - } - - impl Default - for GetParametersForImportRequest { - fn default() -> GetParametersForImportRequest { - GetParametersForImportRequest::GetParametersForImportRequest { - KeyId: Default::default(), - WrappingAlgorithm: Default::default(), - WrappingKeySpec: Default::default() - } - } - } - - impl AsRef - for &GetParametersForImportRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetParametersForImportResponse { - GetParametersForImportResponse { - KeyId: Rc>>, - ImportToken: Rc>, - PublicKey: Rc>, - ParametersValidTo: Rc>> - } - } - - impl GetParametersForImportResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => KeyId, - } - } - pub fn ImportToken(&self) -> &Rc> { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => ImportToken, - } - } - pub fn PublicKey(&self) -> &Rc> { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => PublicKey, - } - } - pub fn ParametersValidTo(&self) -> &Rc>> { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => ParametersValidTo, - } - } - } - - impl Debug - for GetParametersForImportResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for CreateCustomKeyStoreRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for GetParametersForImportResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetParametersForImportResponse.GetParametersForImportResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ImportToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ParametersValidTo, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for CreateCustomKeyStoreRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateCustomKeyStoreRequest.CreateCustomKeyStoreRequest(")?; + DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TrustAnchorCertificate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyStorePassword, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyUriEndpoint, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyUriPath, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyVpcEndpointServiceName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyAuthenticationCredential, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyConnectivity, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for GetParametersForImportResponse {} + impl Eq + for CreateCustomKeyStoreRequest {} + + impl Hash + for CreateCustomKeyStoreRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest{CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, KeyStorePassword, CustomKeyStoreType, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { + Hash::hash(CustomKeyStoreName, _state); + Hash::hash(CloudHsmClusterId, _state); + Hash::hash(TrustAnchorCertificate, _state); + Hash::hash(KeyStorePassword, _state); + Hash::hash(CustomKeyStoreType, _state); + Hash::hash(XksProxyUriEndpoint, _state); + Hash::hash(XksProxyUriPath, _state); + Hash::hash(XksProxyVpcEndpointServiceName, _state); + Hash::hash(XksProxyAuthenticationCredential, _state); + Hash::hash(XksProxyConnectivity, _state) + }, + } + } + } - impl Hash - for GetParametersForImportResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => { - Hash::hash(KeyId, _state); - Hash::hash(ImportToken, _state); - Hash::hash(PublicKey, _state); - Hash::hash(ParametersValidTo, _state) - }, - } - } - } + impl Default + for CreateCustomKeyStoreRequest { + fn default() -> CreateCustomKeyStoreRequest { + CreateCustomKeyStoreRequest::CreateCustomKeyStoreRequest { + CustomKeyStoreName: Default::default(), + CloudHsmClusterId: Default::default(), + TrustAnchorCertificate: Default::default(), + KeyStorePassword: Default::default(), + CustomKeyStoreType: Default::default(), + XksProxyUriEndpoint: Default::default(), + XksProxyUriPath: Default::default(), + XksProxyVpcEndpointServiceName: Default::default(), + XksProxyAuthenticationCredential: Default::default(), + XksProxyConnectivity: Default::default() + } + } + } - impl Default - for GetParametersForImportResponse { - fn default() -> GetParametersForImportResponse { - GetParametersForImportResponse::GetParametersForImportResponse { - KeyId: Default::default(), - ImportToken: Default::default(), - PublicKey: Default::default(), - ParametersValidTo: Default::default() - } - } - } + impl AsRef + for CreateCustomKeyStoreRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &GetParametersForImportResponse { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(105,3) + #[derive(PartialEq, Clone)] + pub enum CreateCustomKeyStoreResponse { + CreateCustomKeyStoreResponse { + CustomKeyStoreId: Arc>> + } + } - #[derive(PartialEq, Clone)] - pub enum GetPublicKeyRequest { - GetPublicKeyRequest { - KeyId: Sequence, - GrantTokens: Rc> - } - } + impl CreateCustomKeyStoreResponse { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => CustomKeyStoreId, + } + } + } - impl GetPublicKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => KeyId, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => GrantTokens, - } - } - } + impl Debug + for CreateCustomKeyStoreResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for GetPublicKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for CreateCustomKeyStoreResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateCustomKeyStoreResponse.CreateCustomKeyStoreResponse(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for GetPublicKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetPublicKeyRequest.GetPublicKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for CreateCustomKeyStoreResponse {} - impl Eq - for GetPublicKeyRequest {} + impl Hash + for CreateCustomKeyStoreResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse{CustomKeyStoreId, } => { + Hash::hash(CustomKeyStoreId, _state) + }, + } + } + } - impl Hash - for GetPublicKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => { - Hash::hash(KeyId, _state); - Hash::hash(GrantTokens, _state) - }, - } - } - } - - impl Default - for GetPublicKeyRequest { - fn default() -> GetPublicKeyRequest { - GetPublicKeyRequest::GetPublicKeyRequest { - KeyId: Default::default(), - GrantTokens: Default::default() - } - } - } - - impl AsRef - for &GetPublicKeyRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GetPublicKeyResponse { - GetPublicKeyResponse { - KeyId: Rc>>, - PublicKey: Rc>, - CustomerMasterKeySpec: Rc>>, - KeySpec: Rc>>, - KeyUsage: Rc>>, - EncryptionAlgorithms: Rc>>>, - SigningAlgorithms: Rc>>>, - KeyAgreementAlgorithms: Rc>>> - } - } - - impl GetPublicKeyResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyId, - } - } - pub fn PublicKey(&self) -> &Rc> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => PublicKey, - } - } - pub fn CustomerMasterKeySpec(&self) -> &Rc>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => CustomerMasterKeySpec, - } - } - pub fn KeySpec(&self) -> &Rc>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeySpec, - } - } - pub fn KeyUsage(&self) -> &Rc>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyUsage, - } - } - pub fn EncryptionAlgorithms(&self) -> &Rc>>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => EncryptionAlgorithms, - } - } - pub fn SigningAlgorithms(&self) -> &Rc>>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => SigningAlgorithms, - } - } - pub fn KeyAgreementAlgorithms(&self) -> &Rc>>> { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyAgreementAlgorithms, - } - } - } - - impl Debug - for GetPublicKeyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for CreateCustomKeyStoreResponse { + fn default() -> CreateCustomKeyStoreResponse { + CreateCustomKeyStoreResponse::CreateCustomKeyStoreResponse { + CustomKeyStoreId: Default::default() + } + } + } - impl DafnyPrint - for GetPublicKeyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetPublicKeyResponse.GetPublicKeyResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PublicKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyAgreementAlgorithms, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for CreateCustomKeyStoreResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for GetPublicKeyResponse {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(108,3) + #[derive(PartialEq, Clone)] + pub enum CreateGrantRequest { + CreateGrantRequest { + KeyId: Sequence, + GranteePrincipal: Sequence, + RetiringPrincipal: Arc>>, + Operations: Sequence>, + Constraints: Arc>>, + GrantTokens: Arc>, + Name: Arc>>, + DryRun: Arc> + } + } - impl Hash - for GetPublicKeyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => { - Hash::hash(KeyId, _state); - Hash::hash(PublicKey, _state); - Hash::hash(CustomerMasterKeySpec, _state); - Hash::hash(KeySpec, _state); - Hash::hash(KeyUsage, _state); - Hash::hash(EncryptionAlgorithms, _state); - Hash::hash(SigningAlgorithms, _state); - Hash::hash(KeyAgreementAlgorithms, _state) - }, - } - } - } - - impl Default - for GetPublicKeyResponse { - fn default() -> GetPublicKeyResponse { - GetPublicKeyResponse::GetPublicKeyResponse { - KeyId: Default::default(), - PublicKey: Default::default(), - CustomerMasterKeySpec: Default::default(), - KeySpec: Default::default(), - KeyUsage: Default::default(), - EncryptionAlgorithms: Default::default(), - SigningAlgorithms: Default::default(), - KeyAgreementAlgorithms: Default::default() - } - } - } - - impl AsRef - for &GetPublicKeyResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum GrantConstraints { - GrantConstraints { - EncryptionContextSubset: Rc, Sequence>>>, - EncryptionContextEquals: Rc, Sequence>>> - } - } - - impl GrantConstraints { - pub fn EncryptionContextSubset(&self) -> &Rc, Sequence>>> { - match self { - GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => EncryptionContextSubset, - } - } - pub fn EncryptionContextEquals(&self) -> &Rc, Sequence>>> { - match self { - GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => EncryptionContextEquals, - } - } - } - - impl Debug - for GrantConstraints { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CreateGrantRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field GranteePrincipal + pub fn GranteePrincipal(&self) -> &Sequence { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => GranteePrincipal, + } + } + /// Returns a borrow of the field RetiringPrincipal + pub fn RetiringPrincipal(&self) -> &Arc>> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => RetiringPrincipal, + } + } + /// Returns a borrow of the field Operations + pub fn Operations(&self) -> &Sequence> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Operations, + } + } + /// Returns a borrow of the field Constraints + pub fn Constraints(&self) -> &Arc>> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Constraints, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field Name + pub fn Name(&self) -> &Arc>> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => Name, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => DryRun, + } + } + } - impl DafnyPrint - for GrantConstraints { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantConstraints.GrantConstraints(")?; - DafnyPrint::fmt_print(EncryptionContextSubset, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionContextEquals, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for CreateGrantRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GrantConstraints {} + impl DafnyPrint + for CreateGrantRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateGrantRequest.CreateGrantRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GranteePrincipal, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RetiringPrincipal, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Operations, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Constraints, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GrantConstraints { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => { - Hash::hash(EncryptionContextSubset, _state); - Hash::hash(EncryptionContextEquals, _state) - }, - } - } - } - - impl Default - for GrantConstraints { - fn default() -> GrantConstraints { - GrantConstraints::GrantConstraints { - EncryptionContextSubset: Default::default(), - EncryptionContextEquals: Default::default() - } - } - } - - impl AsRef - for &GrantConstraints { - fn as_ref(&self) -> Self { - self - } - } - - pub type GrantIdType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum GrantListEntry { - GrantListEntry { - KeyId: Rc>>, - GrantId: Rc>>, - Name: Rc>>, - CreationDate: Rc>>, - GranteePrincipal: Rc>>, - RetiringPrincipal: Rc>>, - IssuingAccount: Rc>>, - Operations: Rc>>>, - Constraints: Rc>> - } - } - - impl GrantListEntry { - pub fn KeyId(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => KeyId, - } - } - pub fn GrantId(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => GrantId, - } - } - pub fn Name(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Name, - } - } - pub fn CreationDate(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => CreationDate, - } - } - pub fn GranteePrincipal(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => GranteePrincipal, - } - } - pub fn RetiringPrincipal(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => RetiringPrincipal, - } - } - pub fn IssuingAccount(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => IssuingAccount, - } - } - pub fn Operations(&self) -> &Rc>>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Operations, - } - } - pub fn Constraints(&self) -> &Rc>> { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Constraints, - } - } - } - - impl Debug - for GrantListEntry { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for CreateGrantRequest {} + + impl Hash + for CreateGrantRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateGrantRequest::CreateGrantRequest{KeyId, GranteePrincipal, RetiringPrincipal, Operations, Constraints, GrantTokens, Name, DryRun, } => { + Hash::hash(KeyId, _state); + Hash::hash(GranteePrincipal, _state); + Hash::hash(RetiringPrincipal, _state); + Hash::hash(Operations, _state); + Hash::hash(Constraints, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(Name, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - impl DafnyPrint - for GrantListEntry { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantListEntry.GrantListEntry(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Name, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CreationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GranteePrincipal, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RetiringPrincipal, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(IssuingAccount, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Operations, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Constraints, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for CreateGrantRequest { + fn default() -> CreateGrantRequest { + CreateGrantRequest::CreateGrantRequest { + KeyId: Default::default(), + GranteePrincipal: Default::default(), + RetiringPrincipal: Default::default(), + Operations: Default::default(), + Constraints: Default::default(), + GrantTokens: Default::default(), + Name: Default::default(), + DryRun: Default::default() + } + } + } - impl Eq - for GrantListEntry {} + impl AsRef + for CreateGrantRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for GrantListEntry { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => { - Hash::hash(KeyId, _state); - Hash::hash(GrantId, _state); - Hash::hash(Name, _state); - Hash::hash(CreationDate, _state); - Hash::hash(GranteePrincipal, _state); - Hash::hash(RetiringPrincipal, _state); - Hash::hash(IssuingAccount, _state); - Hash::hash(Operations, _state); - Hash::hash(Constraints, _state) - }, - } - } - } - - impl Default - for GrantListEntry { - fn default() -> GrantListEntry { - GrantListEntry::GrantListEntry { - KeyId: Default::default(), - GrantId: Default::default(), - Name: Default::default(), - CreationDate: Default::default(), - GranteePrincipal: Default::default(), - RetiringPrincipal: Default::default(), - IssuingAccount: Default::default(), - Operations: Default::default(), - Constraints: Default::default() - } - } - } - - impl AsRef - for &GrantListEntry { - fn as_ref(&self) -> Self { - self - } - } - - pub type GrantNameType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum GrantOperation { - Decrypt {}, - Encrypt {}, - GenerateDataKey {}, - GenerateDataKeyWithoutPlaintext {}, - ReEncryptFrom {}, - ReEncryptTo {}, - Sign {}, - Verify {}, - GetPublicKey {}, - CreateGrant {}, - RetireGrant {}, - DescribeKey {}, - GenerateDataKeyPair {}, - GenerateDataKeyPairWithoutPlaintext {}, - GenerateMac {}, - VerifyMac {}, - DeriveSharedSecret {} - } - - impl GrantOperation {} - - impl Debug - for GrantOperation { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(118,3) + #[derive(PartialEq, Clone)] + pub enum CreateGrantResponse { + CreateGrantResponse { + GrantToken: Arc>>, + GrantId: Arc>> + } + } - impl DafnyPrint - for GrantOperation { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - GrantOperation::Decrypt{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Decrypt")?; - Ok(()) - }, - GrantOperation::Encrypt{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Encrypt")?; - Ok(()) - }, - GrantOperation::GenerateDataKey{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKey")?; - Ok(()) - }, - GrantOperation::GenerateDataKeyWithoutPlaintext{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyWithoutPlaintext")?; - Ok(()) - }, - GrantOperation::ReEncryptFrom{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.ReEncryptFrom")?; - Ok(()) - }, - GrantOperation::ReEncryptTo{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.ReEncryptTo")?; - Ok(()) - }, - GrantOperation::Sign{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Sign")?; - Ok(()) - }, - GrantOperation::Verify{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Verify")?; - Ok(()) - }, - GrantOperation::GetPublicKey{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GetPublicKey")?; - Ok(()) - }, - GrantOperation::CreateGrant{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.CreateGrant")?; - Ok(()) - }, - GrantOperation::RetireGrant{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.RetireGrant")?; - Ok(()) - }, - GrantOperation::DescribeKey{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.DescribeKey")?; - Ok(()) - }, - GrantOperation::GenerateDataKeyPair{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyPair")?; - Ok(()) - }, - GrantOperation::GenerateDataKeyPairWithoutPlaintext{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyPairWithoutPlaintext")?; - Ok(()) - }, - GrantOperation::GenerateMac{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateMac")?; - Ok(()) - }, - GrantOperation::VerifyMac{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.VerifyMac")?; - Ok(()) - }, - GrantOperation::DeriveSharedSecret{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.DeriveSharedSecret")?; - Ok(()) - }, - } - } - } + impl CreateGrantResponse { + /// Returns a borrow of the field GrantToken + pub fn GrantToken(&self) -> &Arc>> { + match self { + CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => GrantToken, + } + } + /// Returns a borrow of the field GrantId + pub fn GrantId(&self) -> &Arc>> { + match self { + CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => GrantId, + } + } + } - impl GrantOperation { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(GrantOperation::Decrypt {}), Rc::new(GrantOperation::Encrypt {}), Rc::new(GrantOperation::GenerateDataKey {}), Rc::new(GrantOperation::GenerateDataKeyWithoutPlaintext {}), Rc::new(GrantOperation::ReEncryptFrom {}), Rc::new(GrantOperation::ReEncryptTo {}), Rc::new(GrantOperation::Sign {}), Rc::new(GrantOperation::Verify {}), Rc::new(GrantOperation::GetPublicKey {}), Rc::new(GrantOperation::CreateGrant {}), Rc::new(GrantOperation::RetireGrant {}), Rc::new(GrantOperation::DescribeKey {}), Rc::new(GrantOperation::GenerateDataKeyPair {}), Rc::new(GrantOperation::GenerateDataKeyPairWithoutPlaintext {}), Rc::new(GrantOperation::GenerateMac {}), Rc::new(GrantOperation::VerifyMac {}), Rc::new(GrantOperation::DeriveSharedSecret {})].iter() - } - } + impl Debug + for CreateGrantResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for GrantOperation {} + impl DafnyPrint + for CreateGrantResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateGrantResponse.CreateGrantResponse(")?; + DafnyPrint::fmt_print(GrantToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for GrantOperation { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - GrantOperation::Decrypt{} => { + impl Eq + for CreateGrantResponse {} + + impl Hash + for CreateGrantResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateGrantResponse::CreateGrantResponse{GrantToken, GrantId, } => { + Hash::hash(GrantToken, _state); + Hash::hash(GrantId, _state) + }, + } + } + } - }, - GrantOperation::Encrypt{} => { + impl Default + for CreateGrantResponse { + fn default() -> CreateGrantResponse { + CreateGrantResponse::CreateGrantResponse { + GrantToken: Default::default(), + GrantId: Default::default() + } + } + } - }, - GrantOperation::GenerateDataKey{} => { + impl AsRef + for CreateGrantResponse { + fn as_ref(&self) -> &Self { + self + } + } - }, - GrantOperation::GenerateDataKeyWithoutPlaintext{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(122,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyRequest { + CreateKeyRequest { + Policy: Arc>>, + Description: Arc>>, + KeyUsage: Arc>>, + CustomerMasterKeySpec: Arc>>, + KeySpec: Arc>>, + Origin: Arc>>, + CustomKeyStoreId: Arc>>, + BypassPolicyLockoutSafetyCheck: Arc>, + Tags: Arc>>>, + MultiRegion: Arc>, + XksKeyId: Arc>> + } + } - }, - GrantOperation::ReEncryptFrom{} => { + impl CreateKeyRequest { + /// Returns a borrow of the field Policy + pub fn Policy(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Policy, + } + } + /// Returns a borrow of the field Description + pub fn Description(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Description, + } + } + /// Returns a borrow of the field KeyUsage + pub fn KeyUsage(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => KeyUsage, + } + } + /// Returns a borrow of the field CustomerMasterKeySpec + pub fn CustomerMasterKeySpec(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => CustomerMasterKeySpec, + } + } + /// Returns a borrow of the field KeySpec + pub fn KeySpec(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => KeySpec, + } + } + /// Returns a borrow of the field Origin + pub fn Origin(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Origin, + } + } + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => CustomKeyStoreId, + } + } + /// Returns a borrow of the field BypassPolicyLockoutSafetyCheck + pub fn BypassPolicyLockoutSafetyCheck(&self) -> &Arc> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => BypassPolicyLockoutSafetyCheck, + } + } + /// Returns a borrow of the field Tags + pub fn Tags(&self) -> &Arc>>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => Tags, + } + } + /// Returns a borrow of the field MultiRegion + pub fn MultiRegion(&self) -> &Arc> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => MultiRegion, + } + } + /// Returns a borrow of the field XksKeyId + pub fn XksKeyId(&self) -> &Arc>> { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => XksKeyId, + } + } + } - }, - GrantOperation::ReEncryptTo{} => { + impl Debug + for CreateKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - GrantOperation::Sign{} => { + impl DafnyPrint + for CreateKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateKeyRequest.CreateKeyRequest(")?; + DafnyPrint::fmt_print(Policy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Description, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Origin, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(BypassPolicyLockoutSafetyCheck, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Tags, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MultiRegion, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksKeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - GrantOperation::Verify{} => { + impl Eq + for CreateKeyRequest {} + + impl Hash + for CreateKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyRequest::CreateKeyRequest{Policy, Description, KeyUsage, CustomerMasterKeySpec, KeySpec, Origin, CustomKeyStoreId, BypassPolicyLockoutSafetyCheck, Tags, MultiRegion, XksKeyId, } => { + Hash::hash(Policy, _state); + Hash::hash(Description, _state); + Hash::hash(KeyUsage, _state); + Hash::hash(CustomerMasterKeySpec, _state); + Hash::hash(KeySpec, _state); + Hash::hash(Origin, _state); + Hash::hash(CustomKeyStoreId, _state); + Hash::hash(BypassPolicyLockoutSafetyCheck, _state); + Hash::hash(Tags, _state); + Hash::hash(MultiRegion, _state); + Hash::hash(XksKeyId, _state) + }, + } + } + } - }, - GrantOperation::GetPublicKey{} => { + impl Default + for CreateKeyRequest { + fn default() -> CreateKeyRequest { + CreateKeyRequest::CreateKeyRequest { + Policy: Default::default(), + Description: Default::default(), + KeyUsage: Default::default(), + CustomerMasterKeySpec: Default::default(), + KeySpec: Default::default(), + Origin: Default::default(), + CustomKeyStoreId: Default::default(), + BypassPolicyLockoutSafetyCheck: Default::default(), + Tags: Default::default(), + MultiRegion: Default::default(), + XksKeyId: Default::default() + } + } + } - }, - GrantOperation::CreateGrant{} => { + impl AsRef + for CreateKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - }, - GrantOperation::RetireGrant{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(135,3) + #[derive(PartialEq, Clone)] + pub enum CreateKeyResponse { + CreateKeyResponse { + KeyMetadata: Arc>> + } + } - }, - GrantOperation::DescribeKey{} => { + impl CreateKeyResponse { + /// Returns a borrow of the field KeyMetadata + pub fn KeyMetadata(&self) -> &Arc>> { + match self { + CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => KeyMetadata, + } + } + } - }, - GrantOperation::GenerateDataKeyPair{} => { + impl Debug + for CreateKeyResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - GrantOperation::GenerateDataKeyPairWithoutPlaintext{} => { + impl DafnyPrint + for CreateKeyResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CreateKeyResponse.CreateKeyResponse(")?; + DafnyPrint::fmt_print(KeyMetadata, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - GrantOperation::GenerateMac{} => { + impl Eq + for CreateKeyResponse {} - }, - GrantOperation::VerifyMac{} => { + impl Hash + for CreateKeyResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CreateKeyResponse::CreateKeyResponse{KeyMetadata, } => { + Hash::hash(KeyMetadata, _state) + }, + } + } + } - }, - GrantOperation::DeriveSharedSecret{} => { + impl Default + for CreateKeyResponse { + fn default() -> CreateKeyResponse { + CreateKeyResponse::CreateKeyResponse { + KeyMetadata: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for CreateKeyResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for GrantOperation { - fn default() -> GrantOperation { - GrantOperation::Decrypt {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(138,3) + #[derive(PartialEq, Clone)] + pub enum CustomerMasterKeySpec { + RSA_2048 {}, + RSA_3072 {}, + RSA_4096 {}, + ECC_NIST_P256 {}, + ECC_NIST_P384 {}, + ECC_NIST_P521 {}, + ECC_SECG_P256K1 {}, + SYMMETRIC_DEFAULT {}, + HMAC_224 {}, + HMAC_256 {}, + HMAC_384 {}, + HMAC_512 {}, + SM2 {} + } - impl AsRef - for &GrantOperation { - fn as_ref(&self) -> Self { - self - } - } + impl CustomerMasterKeySpec {} - pub type GrantTokenList = Sequence>; + impl Debug + for CustomerMasterKeySpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type GrantTokenType = Sequence; + impl DafnyPrint + for CustomerMasterKeySpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CustomerMasterKeySpec::RSA_2048{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__2048")?; + Ok(()) + }, + CustomerMasterKeySpec::RSA_3072{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__3072")?; + Ok(()) + }, + CustomerMasterKeySpec::RSA_4096{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.RSA__4096")?; + Ok(()) + }, + CustomerMasterKeySpec::ECC_NIST_P256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P256")?; + Ok(()) + }, + CustomerMasterKeySpec::ECC_NIST_P384{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P384")?; + Ok(()) + }, + CustomerMasterKeySpec::ECC_NIST_P521{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__NIST__P521")?; + Ok(()) + }, + CustomerMasterKeySpec::ECC_SECG_P256K1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.ECC__SECG__P256K1")?; + Ok(()) + }, + CustomerMasterKeySpec::SYMMETRIC_DEFAULT{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.SYMMETRIC__DEFAULT")?; + Ok(()) + }, + CustomerMasterKeySpec::HMAC_224{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__224")?; + Ok(()) + }, + CustomerMasterKeySpec::HMAC_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__256")?; + Ok(()) + }, + CustomerMasterKeySpec::HMAC_384{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__384")?; + Ok(()) + }, + CustomerMasterKeySpec::HMAC_512{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.HMAC__512")?; + Ok(()) + }, + CustomerMasterKeySpec::SM2{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomerMasterKeySpec.SM2")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ImportKeyMaterialRequest { - ImportKeyMaterialRequest { - KeyId: Sequence, - ImportToken: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - EncryptedKeyMaterial: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - ValidTo: Rc>>, - ExpirationModel: Rc>> - } - } + impl CustomerMasterKeySpec { + /// Enumerates all possible values of CustomerMasterKeySpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CustomerMasterKeySpec::RSA_2048 {}), Arc::new(CustomerMasterKeySpec::RSA_3072 {}), Arc::new(CustomerMasterKeySpec::RSA_4096 {}), Arc::new(CustomerMasterKeySpec::ECC_NIST_P256 {}), Arc::new(CustomerMasterKeySpec::ECC_NIST_P384 {}), Arc::new(CustomerMasterKeySpec::ECC_NIST_P521 {}), Arc::new(CustomerMasterKeySpec::ECC_SECG_P256K1 {}), Arc::new(CustomerMasterKeySpec::SYMMETRIC_DEFAULT {}), Arc::new(CustomerMasterKeySpec::HMAC_224 {}), Arc::new(CustomerMasterKeySpec::HMAC_256 {}), Arc::new(CustomerMasterKeySpec::HMAC_384 {}), Arc::new(CustomerMasterKeySpec::HMAC_512 {}), Arc::new(CustomerMasterKeySpec::SM2 {})].iter() + } + } - impl ImportKeyMaterialRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => KeyId, - } - } - pub fn ImportToken(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ImportToken, - } - } - pub fn EncryptedKeyMaterial(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => EncryptedKeyMaterial, - } - } - pub fn ValidTo(&self) -> &Rc>> { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ValidTo, - } - } - pub fn ExpirationModel(&self) -> &Rc>> { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ExpirationModel, - } - } - } + impl Eq + for CustomerMasterKeySpec {} - impl Debug - for ImportKeyMaterialRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for CustomerMasterKeySpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CustomerMasterKeySpec::RSA_2048{} => { - impl DafnyPrint - for ImportKeyMaterialRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ImportKeyMaterialRequest.ImportKeyMaterialRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ImportToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptedKeyMaterial, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ValidTo, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpirationModel, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + CustomerMasterKeySpec::RSA_3072{} => { - impl Eq - for ImportKeyMaterialRequest {} + }, + CustomerMasterKeySpec::RSA_4096{} => { - impl Hash - for ImportKeyMaterialRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => { - Hash::hash(KeyId, _state); - Hash::hash(ImportToken, _state); - Hash::hash(EncryptedKeyMaterial, _state); - Hash::hash(ValidTo, _state); - Hash::hash(ExpirationModel, _state) - }, - } - } - } + }, + CustomerMasterKeySpec::ECC_NIST_P256{} => { - impl Default - for ImportKeyMaterialRequest { - fn default() -> ImportKeyMaterialRequest { - ImportKeyMaterialRequest::ImportKeyMaterialRequest { - KeyId: Default::default(), - ImportToken: Default::default(), - EncryptedKeyMaterial: Default::default(), - ValidTo: Default::default(), - ExpirationModel: Default::default() - } - } - } + }, + CustomerMasterKeySpec::ECC_NIST_P384{} => { - impl AsRef - for &ImportKeyMaterialRequest { - fn as_ref(&self) -> Self { - self - } - } + }, + CustomerMasterKeySpec::ECC_NIST_P521{} => { - #[derive(PartialEq, Clone)] - pub enum ImportKeyMaterialResponse { - ImportKeyMaterialResponse {} - } + }, + CustomerMasterKeySpec::ECC_SECG_P256K1{} => { - impl ImportKeyMaterialResponse {} + }, + CustomerMasterKeySpec::SYMMETRIC_DEFAULT{} => { - impl Debug - for ImportKeyMaterialResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + CustomerMasterKeySpec::HMAC_224{} => { - impl DafnyPrint - for ImportKeyMaterialResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ImportKeyMaterialResponse::ImportKeyMaterialResponse{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ImportKeyMaterialResponse.ImportKeyMaterialResponse")?; - Ok(()) - }, - } - } - } - - impl ImportKeyMaterialResponse { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(ImportKeyMaterialResponse::ImportKeyMaterialResponse {})].iter() - } - } + }, + CustomerMasterKeySpec::HMAC_256{} => { - impl Eq - for ImportKeyMaterialResponse {} + }, + CustomerMasterKeySpec::HMAC_384{} => { - impl Hash - for ImportKeyMaterialResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ImportKeyMaterialResponse::ImportKeyMaterialResponse{} => { + }, + CustomerMasterKeySpec::HMAC_512{} => { - }, - } - } - } + }, + CustomerMasterKeySpec::SM2{} => { - impl Default - for ImportKeyMaterialResponse { - fn default() -> ImportKeyMaterialResponse { - ImportKeyMaterialResponse::ImportKeyMaterialResponse {} - } - } + }, + } + } + } - impl AsRef - for &ImportKeyMaterialResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for CustomerMasterKeySpec { + fn default() -> CustomerMasterKeySpec { + CustomerMasterKeySpec::RSA_2048 {} + } + } - #[derive(PartialEq, Clone)] - pub enum KeyAgreementAlgorithmSpec { - ECDH {} - } + impl AsRef + for CustomerMasterKeySpec { + fn as_ref(&self) -> &Self { + self + } + } - impl KeyAgreementAlgorithmSpec {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(152,3) + pub type CustomKeyStoreIdType = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(156,3) + pub type CustomKeyStoreNameType = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(161,3) + #[derive(PartialEq, Clone)] + pub enum CustomKeyStoresListEntry { + CustomKeyStoresListEntry { + CustomKeyStoreId: Arc>>, + CustomKeyStoreName: Arc>>, + CloudHsmClusterId: Arc>>, + TrustAnchorCertificate: Arc>>, + ConnectionState: Arc>>, + ConnectionErrorCode: Arc>>, + CreationDate: Arc>>, + CustomKeyStoreType: Arc>>, + XksProxyConfiguration: Arc>> + } + } - impl Debug - for KeyAgreementAlgorithmSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CustomKeyStoresListEntry { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreId, + } + } + /// Returns a borrow of the field CustomKeyStoreName + pub fn CustomKeyStoreName(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreName, + } + } + /// Returns a borrow of the field CloudHsmClusterId + pub fn CloudHsmClusterId(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CloudHsmClusterId, + } + } + /// Returns a borrow of the field TrustAnchorCertificate + pub fn TrustAnchorCertificate(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => TrustAnchorCertificate, + } + } + /// Returns a borrow of the field ConnectionState + pub fn ConnectionState(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => ConnectionState, + } + } + /// Returns a borrow of the field ConnectionErrorCode + pub fn ConnectionErrorCode(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => ConnectionErrorCode, + } + } + /// Returns a borrow of the field CreationDate + pub fn CreationDate(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CreationDate, + } + } + /// Returns a borrow of the field CustomKeyStoreType + pub fn CustomKeyStoreType(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => CustomKeyStoreType, + } + } + /// Returns a borrow of the field XksProxyConfiguration + pub fn XksProxyConfiguration(&self) -> &Arc>> { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => XksProxyConfiguration, + } + } + } - impl DafnyPrint - for KeyAgreementAlgorithmSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyAgreementAlgorithmSpec::ECDH{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyAgreementAlgorithmSpec.ECDH")?; - Ok(()) - }, - } - } - } + impl Debug + for CustomKeyStoresListEntry { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl KeyAgreementAlgorithmSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyAgreementAlgorithmSpec::ECDH {})].iter() - } - } + impl DafnyPrint + for CustomKeyStoresListEntry { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoresListEntry.CustomKeyStoresListEntry(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(TrustAnchorCertificate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConnectionState, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ConnectionErrorCode, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreType, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksProxyConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for KeyAgreementAlgorithmSpec {} + impl Eq + for CustomKeyStoresListEntry {} + + impl Hash + for CustomKeyStoresListEntry { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CustomKeyStoresListEntry::CustomKeyStoresListEntry{CustomKeyStoreId, CustomKeyStoreName, CloudHsmClusterId, TrustAnchorCertificate, ConnectionState, ConnectionErrorCode, CreationDate, CustomKeyStoreType, XksProxyConfiguration, } => { + Hash::hash(CustomKeyStoreId, _state); + Hash::hash(CustomKeyStoreName, _state); + Hash::hash(CloudHsmClusterId, _state); + Hash::hash(TrustAnchorCertificate, _state); + Hash::hash(ConnectionState, _state); + Hash::hash(ConnectionErrorCode, _state); + Hash::hash(CreationDate, _state); + Hash::hash(CustomKeyStoreType, _state); + Hash::hash(XksProxyConfiguration, _state) + }, + } + } + } - impl Hash - for KeyAgreementAlgorithmSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyAgreementAlgorithmSpec::ECDH{} => { + impl Default + for CustomKeyStoresListEntry { + fn default() -> CustomKeyStoresListEntry { + CustomKeyStoresListEntry::CustomKeyStoresListEntry { + CustomKeyStoreId: Default::default(), + CustomKeyStoreName: Default::default(), + CloudHsmClusterId: Default::default(), + TrustAnchorCertificate: Default::default(), + ConnectionState: Default::default(), + ConnectionErrorCode: Default::default(), + CreationDate: Default::default(), + CustomKeyStoreType: Default::default(), + XksProxyConfiguration: Default::default() + } + } + } - }, - } - } - } + impl AsRef + for CustomKeyStoresListEntry { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for KeyAgreementAlgorithmSpec { - fn default() -> KeyAgreementAlgorithmSpec { - KeyAgreementAlgorithmSpec::ECDH {} - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(172,3) + #[derive(PartialEq, Clone)] + pub enum CustomKeyStoreType { + AWS_CLOUDHSM {}, + EXTERNAL_KEY_STORE {} + } - impl AsRef - for &KeyAgreementAlgorithmSpec { - fn as_ref(&self) -> Self { - self - } - } + impl CustomKeyStoreType {} - #[derive(PartialEq, Clone)] - pub enum KeyEncryptionMechanism { - RSAES_OAEP_SHA_256 {} - } + impl Debug + for CustomKeyStoreType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl KeyEncryptionMechanism {} + impl DafnyPrint + for CustomKeyStoreType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + CustomKeyStoreType::AWS_CLOUDHSM{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoreType.AWS__CLOUDHSM")?; + Ok(()) + }, + CustomKeyStoreType::EXTERNAL_KEY_STORE{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.CustomKeyStoreType.EXTERNAL__KEY__STORE")?; + Ok(()) + }, + } + } + } - impl Debug - for KeyEncryptionMechanism { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl CustomKeyStoreType { + /// Enumerates all possible values of CustomKeyStoreType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(CustomKeyStoreType::AWS_CLOUDHSM {}), Arc::new(CustomKeyStoreType::EXTERNAL_KEY_STORE {})].iter() + } + } - impl DafnyPrint - for KeyEncryptionMechanism { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyEncryptionMechanism::RSAES_OAEP_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyEncryptionMechanism.RSAES__OAEP__SHA__256")?; - Ok(()) - }, - } - } - } + impl Eq + for CustomKeyStoreType {} - impl KeyEncryptionMechanism { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyEncryptionMechanism::RSAES_OAEP_SHA_256 {})].iter() - } - } + impl Hash + for CustomKeyStoreType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + CustomKeyStoreType::AWS_CLOUDHSM{} => { - impl Eq - for KeyEncryptionMechanism {} + }, + CustomKeyStoreType::EXTERNAL_KEY_STORE{} => { - impl Hash - for KeyEncryptionMechanism { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyEncryptionMechanism::RSAES_OAEP_SHA_256{} => { + }, + } + } + } - }, - } - } - } + impl Default + for CustomKeyStoreType { + fn default() -> CustomKeyStoreType { + CustomKeyStoreType::AWS_CLOUDHSM {} + } + } - impl Default - for KeyEncryptionMechanism { - fn default() -> KeyEncryptionMechanism { - KeyEncryptionMechanism::RSAES_OAEP_SHA_256 {} - } - } + impl AsRef + for CustomKeyStoreType { + fn as_ref(&self) -> &Self { + self + } + } - impl AsRef - for &KeyEncryptionMechanism { - fn as_ref(&self) -> Self { - self - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(175,3) + #[derive(PartialEq, Clone)] + pub enum DataKeyPairSpec { + RSA_2048 {}, + RSA_3072 {}, + RSA_4096 {}, + ECC_NIST_P256 {}, + ECC_NIST_P384 {}, + ECC_NIST_P521 {}, + ECC_SECG_P256K1 {}, + SM2 {} + } - pub type KeyIdType = Sequence; + impl DataKeyPairSpec {} - #[derive(PartialEq, Clone)] - pub enum KeyListEntry { - KeyListEntry { - KeyId: Rc>>, - KeyArn: Rc>> - } - } + impl Debug + for DataKeyPairSpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl KeyListEntry { - pub fn KeyId(&self) -> &Rc>> { - match self { - KeyListEntry::KeyListEntry{KeyId, KeyArn, } => KeyId, - } - } - pub fn KeyArn(&self) -> &Rc>> { - match self { - KeyListEntry::KeyListEntry{KeyId, KeyArn, } => KeyArn, - } - } - } + impl DafnyPrint + for DataKeyPairSpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DataKeyPairSpec::RSA_2048{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__2048")?; + Ok(()) + }, + DataKeyPairSpec::RSA_3072{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__3072")?; + Ok(()) + }, + DataKeyPairSpec::RSA_4096{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.RSA__4096")?; + Ok(()) + }, + DataKeyPairSpec::ECC_NIST_P256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P256")?; + Ok(()) + }, + DataKeyPairSpec::ECC_NIST_P384{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P384")?; + Ok(()) + }, + DataKeyPairSpec::ECC_NIST_P521{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__NIST__P521")?; + Ok(()) + }, + DataKeyPairSpec::ECC_SECG_P256K1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.ECC__SECG__P256K1")?; + Ok(()) + }, + DataKeyPairSpec::SM2{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeyPairSpec.SM2")?; + Ok(()) + }, + } + } + } - impl Debug - for KeyListEntry { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DataKeyPairSpec { + /// Enumerates all possible values of DataKeyPairSpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DataKeyPairSpec::RSA_2048 {}), Arc::new(DataKeyPairSpec::RSA_3072 {}), Arc::new(DataKeyPairSpec::RSA_4096 {}), Arc::new(DataKeyPairSpec::ECC_NIST_P256 {}), Arc::new(DataKeyPairSpec::ECC_NIST_P384 {}), Arc::new(DataKeyPairSpec::ECC_NIST_P521 {}), Arc::new(DataKeyPairSpec::ECC_SECG_P256K1 {}), Arc::new(DataKeyPairSpec::SM2 {})].iter() + } + } - impl DafnyPrint - for KeyListEntry { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyListEntry::KeyListEntry{KeyId, KeyArn, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyListEntry.KeyListEntry(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyArn, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DataKeyPairSpec {} - impl Eq - for KeyListEntry {} + impl Hash + for DataKeyPairSpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DataKeyPairSpec::RSA_2048{} => { - impl Hash - for KeyListEntry { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyListEntry::KeyListEntry{KeyId, KeyArn, } => { - Hash::hash(KeyId, _state); - Hash::hash(KeyArn, _state) - }, - } - } - } + }, + DataKeyPairSpec::RSA_3072{} => { - impl Default - for KeyListEntry { - fn default() -> KeyListEntry { - KeyListEntry::KeyListEntry { - KeyId: Default::default(), - KeyArn: Default::default() - } - } - } + }, + DataKeyPairSpec::RSA_4096{} => { - impl AsRef - for &KeyListEntry { - fn as_ref(&self) -> Self { - self - } - } + }, + DataKeyPairSpec::ECC_NIST_P256{} => { - #[derive(PartialEq, Clone)] - pub enum KeyManagerType { - AWS {}, - CUSTOMER {} - } + }, + DataKeyPairSpec::ECC_NIST_P384{} => { - impl KeyManagerType {} + }, + DataKeyPairSpec::ECC_NIST_P521{} => { - impl Debug - for KeyManagerType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + DataKeyPairSpec::ECC_SECG_P256K1{} => { - impl DafnyPrint - for KeyManagerType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyManagerType::AWS{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyManagerType.AWS")?; - Ok(()) - }, - KeyManagerType::CUSTOMER{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyManagerType.CUSTOMER")?; - Ok(()) - }, - } - } - } + }, + DataKeyPairSpec::SM2{} => { - impl KeyManagerType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyManagerType::AWS {}), Rc::new(KeyManagerType::CUSTOMER {})].iter() - } - } + }, + } + } + } - impl Eq - for KeyManagerType {} + impl Default + for DataKeyPairSpec { + fn default() -> DataKeyPairSpec { + DataKeyPairSpec::RSA_2048 {} + } + } - impl Hash - for KeyManagerType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyManagerType::AWS{} => { + impl AsRef + for DataKeyPairSpec { + fn as_ref(&self) -> &Self { + self + } + } - }, - KeyManagerType::CUSTOMER{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(184,3) + #[derive(PartialEq, Clone)] + pub enum DataKeySpec { + AES_256 {}, + AES_128 {} + } - }, - } - } - } - - impl Default - for KeyManagerType { - fn default() -> KeyManagerType { - KeyManagerType::AWS {} - } - } - - impl AsRef - for &KeyManagerType { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum KeyMetadata { - KeyMetadata { - AWSAccountId: Rc>>, - KeyId: Sequence, - Arn: Rc>>, - CreationDate: Rc>>, - Enabled: Rc>, - Description: Rc>>, - KeyUsage: Rc>>, - KeyState: Rc>>, - DeletionDate: Rc>>, - ValidTo: Rc>>, - Origin: Rc>>, - CustomKeyStoreId: Rc>>, - CloudHsmClusterId: Rc>>, - ExpirationModel: Rc>>, - KeyManager: Rc>>, - CustomerMasterKeySpec: Rc>>, - KeySpec: Rc>>, - EncryptionAlgorithms: Rc>>>, - SigningAlgorithms: Rc>>>, - KeyAgreementAlgorithms: Rc>>>, - MultiRegion: Rc>, - MultiRegionConfiguration: Rc>>, - PendingDeletionWindowInDays: Rc>, - MacAlgorithms: Rc>>>, - XksKeyConfiguration: Rc>> - } - } - - impl KeyMetadata { - pub fn AWSAccountId(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => AWSAccountId, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyId, - } - } - pub fn Arn(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Arn, - } - } - pub fn CreationDate(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CreationDate, - } - } - pub fn Enabled(&self) -> &Rc> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Enabled, - } - } - pub fn Description(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Description, - } - } - pub fn KeyUsage(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyUsage, - } - } - pub fn KeyState(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyState, - } - } - pub fn DeletionDate(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => DeletionDate, - } - } - pub fn ValidTo(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => ValidTo, - } - } - pub fn Origin(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Origin, - } - } - pub fn CustomKeyStoreId(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CustomKeyStoreId, - } - } - pub fn CloudHsmClusterId(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CloudHsmClusterId, - } - } - pub fn ExpirationModel(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => ExpirationModel, - } - } - pub fn KeyManager(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyManager, - } - } - pub fn CustomerMasterKeySpec(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CustomerMasterKeySpec, - } - } - pub fn KeySpec(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeySpec, - } - } - pub fn EncryptionAlgorithms(&self) -> &Rc>>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => EncryptionAlgorithms, - } - } - pub fn SigningAlgorithms(&self) -> &Rc>>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => SigningAlgorithms, - } - } - pub fn KeyAgreementAlgorithms(&self) -> &Rc>>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyAgreementAlgorithms, - } - } - pub fn MultiRegion(&self) -> &Rc> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MultiRegion, - } - } - pub fn MultiRegionConfiguration(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MultiRegionConfiguration, - } - } - pub fn PendingDeletionWindowInDays(&self) -> &Rc> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => PendingDeletionWindowInDays, - } - } - pub fn MacAlgorithms(&self) -> &Rc>>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MacAlgorithms, - } - } - pub fn XksKeyConfiguration(&self) -> &Rc>> { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => XksKeyConfiguration, - } - } - } - - impl Debug - for KeyMetadata { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DataKeySpec {} - impl DafnyPrint - for KeyMetadata { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyMetadata.KeyMetadata(")?; - DafnyPrint::fmt_print(AWSAccountId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Arn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CreationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Enabled, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Description, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyState, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DeletionDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ValidTo, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Origin, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ExpirationModel, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyManager, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeySpec, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(EncryptionAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyAgreementAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MultiRegion, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MultiRegionConfiguration, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PendingDeletionWindowInDays, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacAlgorithms, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksKeyConfiguration, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DataKeySpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for KeyMetadata {} + impl DafnyPrint + for DataKeySpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DataKeySpec::AES_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeySpec.AES__256")?; + Ok(()) + }, + DataKeySpec::AES_128{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DataKeySpec.AES__128")?; + Ok(()) + }, + } + } + } - impl Hash - for KeyMetadata { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => { - Hash::hash(AWSAccountId, _state); - Hash::hash(KeyId, _state); - Hash::hash(Arn, _state); - Hash::hash(CreationDate, _state); - Hash::hash(Enabled, _state); - Hash::hash(Description, _state); - Hash::hash(KeyUsage, _state); - Hash::hash(KeyState, _state); - Hash::hash(DeletionDate, _state); - Hash::hash(ValidTo, _state); - Hash::hash(Origin, _state); - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(CloudHsmClusterId, _state); - Hash::hash(ExpirationModel, _state); - Hash::hash(KeyManager, _state); - Hash::hash(CustomerMasterKeySpec, _state); - Hash::hash(KeySpec, _state); - Hash::hash(EncryptionAlgorithms, _state); - Hash::hash(SigningAlgorithms, _state); - Hash::hash(KeyAgreementAlgorithms, _state); - Hash::hash(MultiRegion, _state); - Hash::hash(MultiRegionConfiguration, _state); - Hash::hash(PendingDeletionWindowInDays, _state); - Hash::hash(MacAlgorithms, _state); - Hash::hash(XksKeyConfiguration, _state) - }, - } - } - } - - impl Default - for KeyMetadata { - fn default() -> KeyMetadata { - KeyMetadata::KeyMetadata { - AWSAccountId: Default::default(), - KeyId: Default::default(), - Arn: Default::default(), - CreationDate: Default::default(), - Enabled: Default::default(), - Description: Default::default(), - KeyUsage: Default::default(), - KeyState: Default::default(), - DeletionDate: Default::default(), - ValidTo: Default::default(), - Origin: Default::default(), - CustomKeyStoreId: Default::default(), - CloudHsmClusterId: Default::default(), - ExpirationModel: Default::default(), - KeyManager: Default::default(), - CustomerMasterKeySpec: Default::default(), - KeySpec: Default::default(), - EncryptionAlgorithms: Default::default(), - SigningAlgorithms: Default::default(), - KeyAgreementAlgorithms: Default::default(), - MultiRegion: Default::default(), - MultiRegionConfiguration: Default::default(), - PendingDeletionWindowInDays: Default::default(), - MacAlgorithms: Default::default(), - XksKeyConfiguration: Default::default() - } - } - } - - impl AsRef - for &KeyMetadata { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum KeySpec { - RSA_2048 {}, - RSA_3072 {}, - RSA_4096 {}, - ECC_NIST_P256 {}, - ECC_NIST_P384 {}, - ECC_NIST_P521 {}, - ECC_SECG_P256K1 {}, - SYMMETRIC_DEFAULT {}, - HMAC_224 {}, - HMAC_256 {}, - HMAC_384 {}, - HMAC_512 {}, - SM2 {} - } - - impl KeySpec {} - - impl Debug - for KeySpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DataKeySpec { + /// Enumerates all possible values of DataKeySpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DataKeySpec::AES_256 {}), Arc::new(DataKeySpec::AES_128 {})].iter() + } + } - impl DafnyPrint - for KeySpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeySpec::RSA_2048{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__2048")?; - Ok(()) - }, - KeySpec::RSA_3072{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__3072")?; - Ok(()) - }, - KeySpec::RSA_4096{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__4096")?; - Ok(()) - }, - KeySpec::ECC_NIST_P256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P256")?; - Ok(()) - }, - KeySpec::ECC_NIST_P384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P384")?; - Ok(()) - }, - KeySpec::ECC_NIST_P521{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P521")?; - Ok(()) - }, - KeySpec::ECC_SECG_P256K1{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__SECG__P256K1")?; - Ok(()) - }, - KeySpec::SYMMETRIC_DEFAULT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.SYMMETRIC__DEFAULT")?; - Ok(()) - }, - KeySpec::HMAC_224{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__224")?; - Ok(()) - }, - KeySpec::HMAC_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__256")?; - Ok(()) - }, - KeySpec::HMAC_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__384")?; - Ok(()) - }, - KeySpec::HMAC_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__512")?; - Ok(()) - }, - KeySpec::SM2{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.SM2")?; - Ok(()) - }, - } - } - } + impl Eq + for DataKeySpec {} - impl KeySpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeySpec::RSA_2048 {}), Rc::new(KeySpec::RSA_3072 {}), Rc::new(KeySpec::RSA_4096 {}), Rc::new(KeySpec::ECC_NIST_P256 {}), Rc::new(KeySpec::ECC_NIST_P384 {}), Rc::new(KeySpec::ECC_NIST_P521 {}), Rc::new(KeySpec::ECC_SECG_P256K1 {}), Rc::new(KeySpec::SYMMETRIC_DEFAULT {}), Rc::new(KeySpec::HMAC_224 {}), Rc::new(KeySpec::HMAC_256 {}), Rc::new(KeySpec::HMAC_384 {}), Rc::new(KeySpec::HMAC_512 {}), Rc::new(KeySpec::SM2 {})].iter() - } - } + impl Hash + for DataKeySpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DataKeySpec::AES_256{} => { - impl Eq - for KeySpec {} + }, + DataKeySpec::AES_128{} => { - impl Hash - for KeySpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeySpec::RSA_2048{} => { + }, + } + } + } - }, - KeySpec::RSA_3072{} => { + impl Default + for DataKeySpec { + fn default() -> DataKeySpec { + DataKeySpec::AES_256 {} + } + } - }, - KeySpec::RSA_4096{} => { + impl AsRef + for DataKeySpec { + fn as_ref(&self) -> &Self { + self + } + } - }, - KeySpec::ECC_NIST_P256{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(187,3) + #[derive(PartialEq, Clone)] + pub enum DecryptRequest { + DecryptRequest { + CiphertextBlob: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, + EncryptionContext: Arc, Sequence>>>, + GrantTokens: Arc>, + KeyId: Arc>>, + EncryptionAlgorithm: Arc>>, + Recipient: Arc>>, + DryRun: Arc> + } + } - }, - KeySpec::ECC_NIST_P384{} => { + impl DecryptRequest { + /// Returns a borrow of the field CiphertextBlob + pub fn CiphertextBlob(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => CiphertextBlob, + } + } + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field EncryptionAlgorithm + pub fn EncryptionAlgorithm(&self) -> &Arc>> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => EncryptionAlgorithm, + } + } + /// Returns a borrow of the field Recipient + pub fn Recipient(&self) -> &Arc>> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => Recipient, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => DryRun, + } + } + } - }, - KeySpec::ECC_NIST_P521{} => { + impl Debug + for DecryptRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - KeySpec::ECC_SECG_P256K1{} => { + impl DafnyPrint + for DecryptRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DecryptRequest.DecryptRequest(")?; + DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Recipient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - KeySpec::SYMMETRIC_DEFAULT{} => { + impl Eq + for DecryptRequest {} + + impl Hash + for DecryptRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptRequest::DecryptRequest{CiphertextBlob, EncryptionContext, GrantTokens, KeyId, EncryptionAlgorithm, Recipient, DryRun, } => { + Hash::hash(CiphertextBlob, _state); + Hash::hash(EncryptionContext, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(KeyId, _state); + Hash::hash(EncryptionAlgorithm, _state); + Hash::hash(Recipient, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - }, - KeySpec::HMAC_224{} => { + impl Default + for DecryptRequest { + fn default() -> DecryptRequest { + DecryptRequest::DecryptRequest { + CiphertextBlob: Default::default(), + EncryptionContext: Default::default(), + GrantTokens: Default::default(), + KeyId: Default::default(), + EncryptionAlgorithm: Default::default(), + Recipient: Default::default(), + DryRun: Default::default() + } + } + } - }, - KeySpec::HMAC_256{} => { + impl AsRef + for DecryptRequest { + fn as_ref(&self) -> &Self { + self + } + } - }, - KeySpec::HMAC_384{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(196,3) + #[derive(PartialEq, Clone)] + pub enum DecryptResponse { + DecryptResponse { + KeyId: Arc>>, + Plaintext: Arc>, + EncryptionAlgorithm: Arc>>, + CiphertextForRecipient: Arc> + } + } - }, - KeySpec::HMAC_512{} => { + impl DecryptResponse { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => KeyId, + } + } + /// Returns a borrow of the field Plaintext + pub fn Plaintext(&self) -> &Arc> { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => Plaintext, + } + } + /// Returns a borrow of the field EncryptionAlgorithm + pub fn EncryptionAlgorithm(&self) -> &Arc>> { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => EncryptionAlgorithm, + } + } + /// Returns a borrow of the field CiphertextForRecipient + pub fn CiphertextForRecipient(&self) -> &Arc> { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => CiphertextForRecipient, + } + } + } - }, - KeySpec::SM2{} => { + impl Debug + for DecryptResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - } - } - } + impl DafnyPrint + for DecryptResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DecryptResponse.DecryptResponse(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Plaintext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for KeySpec { - fn default() -> KeySpec { - KeySpec::RSA_2048 {} - } - } + impl Eq + for DecryptResponse {} + + impl Hash + for DecryptResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DecryptResponse::DecryptResponse{KeyId, Plaintext, EncryptionAlgorithm, CiphertextForRecipient, } => { + Hash::hash(KeyId, _state); + Hash::hash(Plaintext, _state); + Hash::hash(EncryptionAlgorithm, _state); + Hash::hash(CiphertextForRecipient, _state) + }, + } + } + } - impl AsRef - for &KeySpec { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DecryptResponse { + fn default() -> DecryptResponse { + DecryptResponse::DecryptResponse { + KeyId: Default::default(), + Plaintext: Default::default(), + EncryptionAlgorithm: Default::default(), + CiphertextForRecipient: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum KeyState { - Creating {}, - Enabled {}, - Disabled {}, - PendingDeletion {}, - PendingImport {}, - PendingReplicaDeletion {}, - Unavailable {}, - Updating {} - } + impl AsRef + for DecryptResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl KeyState {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(202,3) + #[derive(PartialEq, Clone)] + pub enum DeleteAliasRequest { + DeleteAliasRequest { + AliasName: Sequence + } + } - impl Debug - for KeyState { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DeleteAliasRequest { + /// Returns a borrow of the field AliasName + pub fn AliasName(&self) -> &Sequence { + match self { + DeleteAliasRequest::DeleteAliasRequest{AliasName, } => AliasName, + } + } + } - impl DafnyPrint - for KeyState { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyState::Creating{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Creating")?; - Ok(()) - }, - KeyState::Enabled{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Enabled")?; - Ok(()) - }, - KeyState::Disabled{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Disabled")?; - Ok(()) - }, - KeyState::PendingDeletion{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingDeletion")?; - Ok(()) - }, - KeyState::PendingImport{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingImport")?; - Ok(()) - }, - KeyState::PendingReplicaDeletion{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingReplicaDeletion")?; - Ok(()) - }, - KeyState::Unavailable{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Unavailable")?; - Ok(()) - }, - KeyState::Updating{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Updating")?; - Ok(()) - }, - } - } - } + impl Debug + for DeleteAliasRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl KeyState { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyState::Creating {}), Rc::new(KeyState::Enabled {}), Rc::new(KeyState::Disabled {}), Rc::new(KeyState::PendingDeletion {}), Rc::new(KeyState::PendingImport {}), Rc::new(KeyState::PendingReplicaDeletion {}), Rc::new(KeyState::Unavailable {}), Rc::new(KeyState::Updating {})].iter() - } - } + impl DafnyPrint + for DeleteAliasRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteAliasRequest::DeleteAliasRequest{AliasName, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteAliasRequest.DeleteAliasRequest(")?; + DafnyPrint::fmt_print(AliasName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for KeyState {} + impl Eq + for DeleteAliasRequest {} - impl Hash - for KeyState { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyState::Creating{} => { + impl Hash + for DeleteAliasRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteAliasRequest::DeleteAliasRequest{AliasName, } => { + Hash::hash(AliasName, _state) + }, + } + } + } - }, - KeyState::Enabled{} => { + impl Default + for DeleteAliasRequest { + fn default() -> DeleteAliasRequest { + DeleteAliasRequest::DeleteAliasRequest { + AliasName: Default::default() + } + } + } - }, - KeyState::Disabled{} => { + impl AsRef + for DeleteAliasRequest { + fn as_ref(&self) -> &Self { + self + } + } - }, - KeyState::PendingDeletion{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(205,3) + #[derive(PartialEq, Clone)] + pub enum DeleteCustomKeyStoreRequest { + DeleteCustomKeyStoreRequest { + CustomKeyStoreId: Sequence + } + } - }, - KeyState::PendingImport{} => { + impl DeleteCustomKeyStoreRequest { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Sequence { + match self { + DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, + } + } + } - }, - KeyState::PendingReplicaDeletion{} => { + impl Debug + for DeleteCustomKeyStoreRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - KeyState::Unavailable{} => { + impl DafnyPrint + for DeleteCustomKeyStoreRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteCustomKeyStoreRequest.DeleteCustomKeyStoreRequest(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - KeyState::Updating{} => { + impl Eq + for DeleteCustomKeyStoreRequest {} - }, - } - } - } + impl Hash + for DeleteCustomKeyStoreRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest{CustomKeyStoreId, } => { + Hash::hash(CustomKeyStoreId, _state) + }, + } + } + } - impl Default - for KeyState { - fn default() -> KeyState { - KeyState::Creating {} - } - } + impl Default + for DeleteCustomKeyStoreRequest { + fn default() -> DeleteCustomKeyStoreRequest { + DeleteCustomKeyStoreRequest::DeleteCustomKeyStoreRequest { + CustomKeyStoreId: Default::default() + } + } + } - impl AsRef - for &KeyState { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DeleteCustomKeyStoreRequest { + fn as_ref(&self) -> &Self { + self + } + } - pub type KeyStorePasswordType = Sequence; + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(208,3) + #[derive(PartialEq, Clone)] + pub enum DeleteCustomKeyStoreResponse { + DeleteCustomKeyStoreResponse {} + } - #[derive(PartialEq, Clone)] - pub enum KeyUsageType { - SIGN_VERIFY {}, - ENCRYPT_DECRYPT {}, - GENERATE_VERIFY_MAC {}, - KEY_AGREEMENT {} - } + impl DeleteCustomKeyStoreResponse {} - impl KeyUsageType {} + impl Debug + for DeleteCustomKeyStoreResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for KeyUsageType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeleteCustomKeyStoreResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteCustomKeyStoreResponse.DeleteCustomKeyStoreResponse")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for KeyUsageType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - KeyUsageType::SIGN_VERIFY{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyUsageType.SIGN__VERIFY")?; - Ok(()) - }, - KeyUsageType::ENCRYPT_DECRYPT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyUsageType.ENCRYPT__DECRYPT")?; - Ok(()) - }, - KeyUsageType::GENERATE_VERIFY_MAC{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyUsageType.GENERATE__VERIFY__MAC")?; - Ok(()) - }, - KeyUsageType::KEY_AGREEMENT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyUsageType.KEY__AGREEMENT")?; - Ok(()) - }, - } - } - } + impl DeleteCustomKeyStoreResponse { + /// Enumerates all possible values of DeleteCustomKeyStoreResponse + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse {})].iter() + } + } - impl KeyUsageType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(KeyUsageType::SIGN_VERIFY {}), Rc::new(KeyUsageType::ENCRYPT_DECRYPT {}), Rc::new(KeyUsageType::GENERATE_VERIFY_MAC {}), Rc::new(KeyUsageType::KEY_AGREEMENT {})].iter() - } - } + impl Eq + for DeleteCustomKeyStoreResponse {} - impl Eq - for KeyUsageType {} + impl Hash + for DeleteCustomKeyStoreResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse{} => { - impl Hash - for KeyUsageType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - KeyUsageType::SIGN_VERIFY{} => { + }, + } + } + } - }, - KeyUsageType::ENCRYPT_DECRYPT{} => { + impl Default + for DeleteCustomKeyStoreResponse { + fn default() -> DeleteCustomKeyStoreResponse { + DeleteCustomKeyStoreResponse::DeleteCustomKeyStoreResponse {} + } + } - }, - KeyUsageType::GENERATE_VERIFY_MAC{} => { + impl AsRef + for DeleteCustomKeyStoreResponse { + fn as_ref(&self) -> &Self { + self + } + } - }, - KeyUsageType::KEY_AGREEMENT{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(211,3) + #[derive(PartialEq, Clone)] + pub enum DeleteImportedKeyMaterialRequest { + DeleteImportedKeyMaterialRequest { + KeyId: Sequence + } + } - }, - } - } - } + impl DeleteImportedKeyMaterialRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => KeyId, + } + } + } - impl Default - for KeyUsageType { - fn default() -> KeyUsageType { - KeyUsageType::SIGN_VERIFY {} - } - } + impl Debug + for DeleteImportedKeyMaterialRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &KeyUsageType { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for DeleteImportedKeyMaterialRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeleteImportedKeyMaterialRequest.DeleteImportedKeyMaterialRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type LimitType = i32; + impl Eq + for DeleteImportedKeyMaterialRequest {} - #[derive(PartialEq, Clone)] - pub enum ListAliasesRequest { - ListAliasesRequest { - KeyId: Rc>>, - Limit: Rc>, - Marker: Rc>> - } - } + impl Hash + for DeleteImportedKeyMaterialRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl ListAliasesRequest { - pub fn KeyId(&self) -> &Rc>> { - match self { - ListAliasesRequest::ListAliasesRequest{KeyId, Limit, Marker, } => KeyId, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListAliasesRequest::ListAliasesRequest{KeyId, Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListAliasesRequest::ListAliasesRequest{KeyId, Limit, Marker, } => Marker, - } - } - } + impl Default + for DeleteImportedKeyMaterialRequest { + fn default() -> DeleteImportedKeyMaterialRequest { + DeleteImportedKeyMaterialRequest::DeleteImportedKeyMaterialRequest { + KeyId: Default::default() + } + } + } - impl Debug - for ListAliasesRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DeleteImportedKeyMaterialRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ListAliasesRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListAliasesRequest::ListAliasesRequest{KeyId, Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListAliasesRequest.ListAliasesRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(214,3) + #[derive(PartialEq, Clone)] + pub enum DeriveSharedSecretRequest { + DeriveSharedSecretRequest { + KeyId: Sequence, + KeyAgreementAlgorithm: Arc, + PublicKey: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PublicKeyType, + GrantTokens: Arc>, + DryRun: Arc>, + Recipient: Arc>> + } + } - impl Eq - for ListAliasesRequest {} + impl DeriveSharedSecretRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => KeyId, + } + } + /// Returns a borrow of the field KeyAgreementAlgorithm + pub fn KeyAgreementAlgorithm(&self) -> &Arc { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => KeyAgreementAlgorithm, + } + } + /// Returns a borrow of the field PublicKey + pub fn PublicKey(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PublicKeyType { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => PublicKey, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => GrantTokens, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => DryRun, + } + } + /// Returns a borrow of the field Recipient + pub fn Recipient(&self) -> &Arc>> { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => Recipient, + } + } + } - impl Hash - for ListAliasesRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListAliasesRequest::ListAliasesRequest{KeyId, Limit, Marker, } => { - Hash::hash(KeyId, _state); - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } + impl Debug + for DeriveSharedSecretRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ListAliasesRequest { - fn default() -> ListAliasesRequest { - ListAliasesRequest::ListAliasesRequest { - KeyId: Default::default(), - Limit: Default::default(), - Marker: Default::default() - } - } - } + impl DafnyPrint + for DeriveSharedSecretRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeriveSharedSecretRequest.DeriveSharedSecretRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyAgreementAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Recipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ListAliasesRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for DeriveSharedSecretRequest {} + + impl Hash + for DeriveSharedSecretRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeriveSharedSecretRequest::DeriveSharedSecretRequest{KeyId, KeyAgreementAlgorithm, PublicKey, GrantTokens, DryRun, Recipient, } => { + Hash::hash(KeyId, _state); + Hash::hash(KeyAgreementAlgorithm, _state); + Hash::hash(PublicKey, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(DryRun, _state); + Hash::hash(Recipient, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListAliasesResponse { - ListAliasesResponse { - Aliases: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } + impl Default + for DeriveSharedSecretRequest { + fn default() -> DeriveSharedSecretRequest { + DeriveSharedSecretRequest::DeriveSharedSecretRequest { + KeyId: Default::default(), + KeyAgreementAlgorithm: Default::default(), + PublicKey: Default::default(), + GrantTokens: Default::default(), + DryRun: Default::default(), + Recipient: Default::default() + } + } + } - impl ListAliasesResponse { - pub fn Aliases(&self) -> &Rc>>> { - match self { - ListAliasesResponse::ListAliasesResponse{Aliases, NextMarker, Truncated, } => Aliases, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListAliasesResponse::ListAliasesResponse{Aliases, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListAliasesResponse::ListAliasesResponse{Aliases, NextMarker, Truncated, } => Truncated, - } - } - } + impl AsRef + for DeriveSharedSecretRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ListAliasesResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(222,3) + #[derive(PartialEq, Clone)] + pub enum DeriveSharedSecretResponse { + DeriveSharedSecretResponse { + KeyId: Arc>>, + SharedSecret: Arc>, + CiphertextForRecipient: Arc>, + KeyAgreementAlgorithm: Arc>>, + KeyOrigin: Arc>> + } + } - impl DafnyPrint - for ListAliasesResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListAliasesResponse::ListAliasesResponse{Aliases, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListAliasesResponse.ListAliasesResponse(")?; - DafnyPrint::fmt_print(Aliases, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DeriveSharedSecretResponse { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyId, + } + } + /// Returns a borrow of the field SharedSecret + pub fn SharedSecret(&self) -> &Arc> { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => SharedSecret, + } + } + /// Returns a borrow of the field CiphertextForRecipient + pub fn CiphertextForRecipient(&self) -> &Arc> { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => CiphertextForRecipient, + } + } + /// Returns a borrow of the field KeyAgreementAlgorithm + pub fn KeyAgreementAlgorithm(&self) -> &Arc>> { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyAgreementAlgorithm, + } + } + /// Returns a borrow of the field KeyOrigin + pub fn KeyOrigin(&self) -> &Arc>> { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => KeyOrigin, + } + } + } - impl Eq - for ListAliasesResponse {} + impl Debug + for DeriveSharedSecretResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ListAliasesResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListAliasesResponse::ListAliasesResponse{Aliases, NextMarker, Truncated, } => { - Hash::hash(Aliases, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } - - impl Default - for ListAliasesResponse { - fn default() -> ListAliasesResponse { - ListAliasesResponse::ListAliasesResponse { - Aliases: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } - - impl AsRef - for &ListAliasesResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ListGrantsRequest { - ListGrantsRequest { - Limit: Rc>, - Marker: Rc>>, - KeyId: Sequence, - GrantId: Rc>>, - GranteePrincipal: Rc>> - } - } - - impl ListGrantsRequest { - pub fn Limit(&self) -> &Rc> { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => Marker, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => KeyId, - } - } - pub fn GrantId(&self) -> &Rc>> { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => GrantId, - } - } - pub fn GranteePrincipal(&self) -> &Rc>> { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => GranteePrincipal, - } - } - } - - impl Debug - for ListGrantsRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for DeriveSharedSecretResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DeriveSharedSecretResponse.DeriveSharedSecretResponse(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SharedSecret, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyAgreementAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyOrigin, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ListGrantsRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListGrantsRequest.ListGrantsRequest(")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GranteePrincipal, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for DeriveSharedSecretResponse {} + + impl Hash + for DeriveSharedSecretResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DeriveSharedSecretResponse::DeriveSharedSecretResponse{KeyId, SharedSecret, CiphertextForRecipient, KeyAgreementAlgorithm, KeyOrigin, } => { + Hash::hash(KeyId, _state); + Hash::hash(SharedSecret, _state); + Hash::hash(CiphertextForRecipient, _state); + Hash::hash(KeyAgreementAlgorithm, _state); + Hash::hash(KeyOrigin, _state) + }, + } + } + } - impl Eq - for ListGrantsRequest {} + impl Default + for DeriveSharedSecretResponse { + fn default() -> DeriveSharedSecretResponse { + DeriveSharedSecretResponse::DeriveSharedSecretResponse { + KeyId: Default::default(), + SharedSecret: Default::default(), + CiphertextForRecipient: Default::default(), + KeyAgreementAlgorithm: Default::default(), + KeyOrigin: Default::default() + } + } + } - impl Hash - for ListGrantsRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListGrantsRequest::ListGrantsRequest{Limit, Marker, KeyId, GrantId, GranteePrincipal, } => { - Hash::hash(Limit, _state); - Hash::hash(Marker, _state); - Hash::hash(KeyId, _state); - Hash::hash(GrantId, _state); - Hash::hash(GranteePrincipal, _state) - }, - } - } - } - - impl Default - for ListGrantsRequest { - fn default() -> ListGrantsRequest { - ListGrantsRequest::ListGrantsRequest { - Limit: Default::default(), - Marker: Default::default(), - KeyId: Default::default(), - GrantId: Default::default(), - GranteePrincipal: Default::default() - } - } - } - - impl AsRef - for &ListGrantsRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ListGrantsResponse { - ListGrantsResponse { - Grants: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } - - impl ListGrantsResponse { - pub fn Grants(&self) -> &Rc>>> { - match self { - ListGrantsResponse::ListGrantsResponse{Grants, NextMarker, Truncated, } => Grants, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListGrantsResponse::ListGrantsResponse{Grants, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListGrantsResponse::ListGrantsResponse{Grants, NextMarker, Truncated, } => Truncated, - } - } - } - - impl Debug - for ListGrantsResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DeriveSharedSecretResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ListGrantsResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListGrantsResponse::ListGrantsResponse{Grants, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListGrantsResponse.ListGrantsResponse(")?; - DafnyPrint::fmt_print(Grants, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(229,3) + #[derive(PartialEq, Clone)] + pub enum DescribeCustomKeyStoresRequest { + DescribeCustomKeyStoresRequest { + CustomKeyStoreId: Arc>>, + CustomKeyStoreName: Arc>>, + Limit: Arc>, + Marker: Arc>> + } + } - impl Eq - for ListGrantsResponse {} + impl DescribeCustomKeyStoresRequest { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => CustomKeyStoreId, + } + } + /// Returns a borrow of the field CustomKeyStoreName + pub fn CustomKeyStoreName(&self) -> &Arc>> { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => CustomKeyStoreName, + } + } + /// Returns a borrow of the field Limit + pub fn Limit(&self) -> &Arc> { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => Limit, + } + } + /// Returns a borrow of the field Marker + pub fn Marker(&self) -> &Arc>> { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => Marker, + } + } + } - impl Hash - for ListGrantsResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListGrantsResponse::ListGrantsResponse{Grants, NextMarker, Truncated, } => { - Hash::hash(Grants, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Debug + for DescribeCustomKeyStoresRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ListGrantsResponse { - fn default() -> ListGrantsResponse { - ListGrantsResponse::ListGrantsResponse { - Grants: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl DafnyPrint + for DescribeCustomKeyStoresRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeCustomKeyStoresRequest.DescribeCustomKeyStoresRequest(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreName, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Limit, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Marker, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ListGrantsResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for DescribeCustomKeyStoresRequest {} + + impl Hash + for DescribeCustomKeyStoresRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest{CustomKeyStoreId, CustomKeyStoreName, Limit, Marker, } => { + Hash::hash(CustomKeyStoreId, _state); + Hash::hash(CustomKeyStoreName, _state); + Hash::hash(Limit, _state); + Hash::hash(Marker, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeyPoliciesRequest { - ListKeyPoliciesRequest { - KeyId: Sequence, - Limit: Rc>, - Marker: Rc>> - } - } + impl Default + for DescribeCustomKeyStoresRequest { + fn default() -> DescribeCustomKeyStoresRequest { + DescribeCustomKeyStoresRequest::DescribeCustomKeyStoresRequest { + CustomKeyStoreId: Default::default(), + CustomKeyStoreName: Default::default(), + Limit: Default::default(), + Marker: Default::default() + } + } + } - impl ListKeyPoliciesRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ListKeyPoliciesRequest::ListKeyPoliciesRequest{KeyId, Limit, Marker, } => KeyId, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListKeyPoliciesRequest::ListKeyPoliciesRequest{KeyId, Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListKeyPoliciesRequest::ListKeyPoliciesRequest{KeyId, Limit, Marker, } => Marker, - } - } - } + impl AsRef + for DescribeCustomKeyStoresRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for ListKeyPoliciesRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(235,3) + #[derive(PartialEq, Clone)] + pub enum DescribeCustomKeyStoresResponse { + DescribeCustomKeyStoresResponse { + CustomKeyStores: Arc>>>, + NextMarker: Arc>>, + Truncated: Arc> + } + } - impl DafnyPrint - for ListKeyPoliciesRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeyPoliciesRequest::ListKeyPoliciesRequest{KeyId, Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeyPoliciesRequest.ListKeyPoliciesRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DescribeCustomKeyStoresResponse { + /// Returns a borrow of the field CustomKeyStores + pub fn CustomKeyStores(&self) -> &Arc>>> { + match self { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => CustomKeyStores, + } + } + /// Returns a borrow of the field NextMarker + pub fn NextMarker(&self) -> &Arc>> { + match self { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => NextMarker, + } + } + /// Returns a borrow of the field Truncated + pub fn Truncated(&self) -> &Arc> { + match self { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => Truncated, + } + } + } - impl Eq - for ListKeyPoliciesRequest {} + impl Debug + for DescribeCustomKeyStoresResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for ListKeyPoliciesRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeyPoliciesRequest::ListKeyPoliciesRequest{KeyId, Limit, Marker, } => { - Hash::hash(KeyId, _state); - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } + impl DafnyPrint + for DescribeCustomKeyStoresResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeCustomKeyStoresResponse.DescribeCustomKeyStoresResponse(")?; + DafnyPrint::fmt_print(CustomKeyStores, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextMarker, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Truncated, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for ListKeyPoliciesRequest { - fn default() -> ListKeyPoliciesRequest { - ListKeyPoliciesRequest::ListKeyPoliciesRequest { - KeyId: Default::default(), - Limit: Default::default(), - Marker: Default::default() - } - } - } + impl Eq + for DescribeCustomKeyStoresResponse {} + + impl Hash + for DescribeCustomKeyStoresResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse{CustomKeyStores, NextMarker, Truncated, } => { + Hash::hash(CustomKeyStores, _state); + Hash::hash(NextMarker, _state); + Hash::hash(Truncated, _state) + }, + } + } + } - impl AsRef - for &ListKeyPoliciesRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DescribeCustomKeyStoresResponse { + fn default() -> DescribeCustomKeyStoresResponse { + DescribeCustomKeyStoresResponse::DescribeCustomKeyStoresResponse { + CustomKeyStores: Default::default(), + NextMarker: Default::default(), + Truncated: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeyPoliciesResponse { - ListKeyPoliciesResponse { - PolicyNames: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } + impl AsRef + for DescribeCustomKeyStoresResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl ListKeyPoliciesResponse { - pub fn PolicyNames(&self) -> &Rc>>> { - match self { - ListKeyPoliciesResponse::ListKeyPoliciesResponse{PolicyNames, NextMarker, Truncated, } => PolicyNames, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListKeyPoliciesResponse::ListKeyPoliciesResponse{PolicyNames, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListKeyPoliciesResponse::ListKeyPoliciesResponse{PolicyNames, NextMarker, Truncated, } => Truncated, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(240,3) + #[derive(PartialEq, Clone)] + pub enum DescribeKeyRequest { + DescribeKeyRequest { + KeyId: Sequence, + GrantTokens: Arc> + } + } - impl Debug - for ListKeyPoliciesResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DescribeKeyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => KeyId, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => GrantTokens, + } + } + } - impl DafnyPrint - for ListKeyPoliciesResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeyPoliciesResponse::ListKeyPoliciesResponse{PolicyNames, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeyPoliciesResponse.ListKeyPoliciesResponse(")?; - DafnyPrint::fmt_print(PolicyNames, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DescribeKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListKeyPoliciesResponse {} + impl DafnyPrint + for DescribeKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeKeyRequest.DescribeKeyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListKeyPoliciesResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeyPoliciesResponse::ListKeyPoliciesResponse{PolicyNames, NextMarker, Truncated, } => { - Hash::hash(PolicyNames, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Eq + for DescribeKeyRequest {} + + impl Hash + for DescribeKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeKeyRequest::DescribeKeyRequest{KeyId, GrantTokens, } => { + Hash::hash(KeyId, _state); + Hash::hash(GrantTokens, _state) + }, + } + } + } - impl Default - for ListKeyPoliciesResponse { - fn default() -> ListKeyPoliciesResponse { - ListKeyPoliciesResponse::ListKeyPoliciesResponse { - PolicyNames: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl Default + for DescribeKeyRequest { + fn default() -> DescribeKeyRequest { + DescribeKeyRequest::DescribeKeyRequest { + KeyId: Default::default(), + GrantTokens: Default::default() + } + } + } - impl AsRef - for &ListKeyPoliciesResponse { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DescribeKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeyRotationsRequest { - ListKeyRotationsRequest { - KeyId: Sequence, - Limit: Rc>, - Marker: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(244,3) + #[derive(PartialEq, Clone)] + pub enum DescribeKeyResponse { + DescribeKeyResponse { + KeyMetadata: Arc>> + } + } - impl ListKeyRotationsRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ListKeyRotationsRequest::ListKeyRotationsRequest{KeyId, Limit, Marker, } => KeyId, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListKeyRotationsRequest::ListKeyRotationsRequest{KeyId, Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListKeyRotationsRequest::ListKeyRotationsRequest{KeyId, Limit, Marker, } => Marker, - } - } - } + impl DescribeKeyResponse { + /// Returns a borrow of the field KeyMetadata + pub fn KeyMetadata(&self) -> &Arc>> { + match self { + DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => KeyMetadata, + } + } + } - impl Debug - for ListKeyRotationsRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for DescribeKeyResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ListKeyRotationsRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeyRotationsRequest::ListKeyRotationsRequest{KeyId, Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeyRotationsRequest.ListKeyRotationsRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for DescribeKeyResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DescribeKeyResponse.DescribeKeyResponse(")?; + DafnyPrint::fmt_print(KeyMetadata, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ListKeyRotationsRequest {} + impl Eq + for DescribeKeyResponse {} - impl Hash - for ListKeyRotationsRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeyRotationsRequest::ListKeyRotationsRequest{KeyId, Limit, Marker, } => { - Hash::hash(KeyId, _state); - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } + impl Hash + for DescribeKeyResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DescribeKeyResponse::DescribeKeyResponse{KeyMetadata, } => { + Hash::hash(KeyMetadata, _state) + }, + } + } + } - impl Default - for ListKeyRotationsRequest { - fn default() -> ListKeyRotationsRequest { - ListKeyRotationsRequest::ListKeyRotationsRequest { - KeyId: Default::default(), - Limit: Default::default(), - Marker: Default::default() - } - } - } + impl Default + for DescribeKeyResponse { + fn default() -> DescribeKeyResponse { + DescribeKeyResponse::DescribeKeyResponse { + KeyMetadata: Default::default() + } + } + } - impl AsRef - for &ListKeyRotationsRequest { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for DescribeKeyResponse { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeyRotationsResponse { - ListKeyRotationsResponse { - Rotations: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(247,3) + pub type DescriptionType = Sequence; - impl ListKeyRotationsResponse { - pub fn Rotations(&self) -> &Rc>>> { - match self { - ListKeyRotationsResponse::ListKeyRotationsResponse{Rotations, NextMarker, Truncated, } => Rotations, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListKeyRotationsResponse::ListKeyRotationsResponse{Rotations, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListKeyRotationsResponse::ListKeyRotationsResponse{Rotations, NextMarker, Truncated, } => Truncated, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(251,3) + #[derive(PartialEq, Clone)] + pub enum DisableKeyRequest { + DisableKeyRequest { + KeyId: Sequence + } + } - impl Debug - for ListKeyRotationsResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DisableKeyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + DisableKeyRequest::DisableKeyRequest{KeyId, } => KeyId, + } + } + } - impl DafnyPrint - for ListKeyRotationsResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeyRotationsResponse::ListKeyRotationsResponse{Rotations, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeyRotationsResponse.ListKeyRotationsResponse(")?; - DafnyPrint::fmt_print(Rotations, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DisableKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListKeyRotationsResponse {} + impl DafnyPrint + for DisableKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisableKeyRequest::DisableKeyRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisableKeyRequest.DisableKeyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListKeyRotationsResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeyRotationsResponse::ListKeyRotationsResponse{Rotations, NextMarker, Truncated, } => { - Hash::hash(Rotations, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Eq + for DisableKeyRequest {} - impl Default - for ListKeyRotationsResponse { - fn default() -> ListKeyRotationsResponse { - ListKeyRotationsResponse::ListKeyRotationsResponse { - Rotations: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl Hash + for DisableKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisableKeyRequest::DisableKeyRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl AsRef - for &ListKeyRotationsResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DisableKeyRequest { + fn default() -> DisableKeyRequest { + DisableKeyRequest::DisableKeyRequest { + KeyId: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeysRequest { - ListKeysRequest { - Limit: Rc>, - Marker: Rc>> - } - } + impl AsRef + for DisableKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl ListKeysRequest { - pub fn Limit(&self) -> &Rc> { - match self { - ListKeysRequest::ListKeysRequest{Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListKeysRequest::ListKeysRequest{Limit, Marker, } => Marker, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(254,3) + #[derive(PartialEq, Clone)] + pub enum DisableKeyRotationRequest { + DisableKeyRotationRequest { + KeyId: Sequence + } + } - impl Debug - for ListKeysRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DisableKeyRotationRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => KeyId, + } + } + } - impl DafnyPrint - for ListKeysRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeysRequest::ListKeysRequest{Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeysRequest.ListKeysRequest(")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DisableKeyRotationRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListKeysRequest {} + impl DafnyPrint + for DisableKeyRotationRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisableKeyRotationRequest.DisableKeyRotationRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListKeysRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeysRequest::ListKeysRequest{Limit, Marker, } => { - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } + impl Eq + for DisableKeyRotationRequest {} - impl Default - for ListKeysRequest { - fn default() -> ListKeysRequest { - ListKeysRequest::ListKeysRequest { - Limit: Default::default(), - Marker: Default::default() - } - } - } + impl Hash + for DisableKeyRotationRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisableKeyRotationRequest::DisableKeyRotationRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl AsRef - for &ListKeysRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DisableKeyRotationRequest { + fn default() -> DisableKeyRotationRequest { + DisableKeyRotationRequest::DisableKeyRotationRequest { + KeyId: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListKeysResponse { - ListKeysResponse { - Keys: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } + impl AsRef + for DisableKeyRotationRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl ListKeysResponse { - pub fn Keys(&self) -> &Rc>>> { - match self { - ListKeysResponse::ListKeysResponse{Keys, NextMarker, Truncated, } => Keys, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListKeysResponse::ListKeysResponse{Keys, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListKeysResponse::ListKeysResponse{Keys, NextMarker, Truncated, } => Truncated, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(257,3) + #[derive(PartialEq, Clone)] + pub enum DisconnectCustomKeyStoreRequest { + DisconnectCustomKeyStoreRequest { + CustomKeyStoreId: Sequence + } + } - impl Debug - for ListKeysResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DisconnectCustomKeyStoreRequest { + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Sequence { + match self { + DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => CustomKeyStoreId, + } + } + } - impl DafnyPrint - for ListKeysResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListKeysResponse::ListKeysResponse{Keys, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListKeysResponse.ListKeysResponse(")?; - DafnyPrint::fmt_print(Keys, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DisconnectCustomKeyStoreRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListKeysResponse {} + impl DafnyPrint + for DisconnectCustomKeyStoreRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisconnectCustomKeyStoreRequest.DisconnectCustomKeyStoreRequest(")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for ListKeysResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListKeysResponse::ListKeysResponse{Keys, NextMarker, Truncated, } => { - Hash::hash(Keys, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Eq + for DisconnectCustomKeyStoreRequest {} - impl Default - for ListKeysResponse { - fn default() -> ListKeysResponse { - ListKeysResponse::ListKeysResponse { - Keys: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl Hash + for DisconnectCustomKeyStoreRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest{CustomKeyStoreId, } => { + Hash::hash(CustomKeyStoreId, _state) + }, + } + } + } - impl AsRef - for &ListKeysResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for DisconnectCustomKeyStoreRequest { + fn default() -> DisconnectCustomKeyStoreRequest { + DisconnectCustomKeyStoreRequest::DisconnectCustomKeyStoreRequest { + CustomKeyStoreId: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum ListResourceTagsRequest { - ListResourceTagsRequest { - KeyId: Sequence, - Limit: Rc>, - Marker: Rc>> - } - } + impl AsRef + for DisconnectCustomKeyStoreRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl ListResourceTagsRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ListResourceTagsRequest::ListResourceTagsRequest{KeyId, Limit, Marker, } => KeyId, - } - } - pub fn Limit(&self) -> &Rc> { - match self { - ListResourceTagsRequest::ListResourceTagsRequest{KeyId, Limit, Marker, } => Limit, - } - } - pub fn Marker(&self) -> &Rc>> { - match self { - ListResourceTagsRequest::ListResourceTagsRequest{KeyId, Limit, Marker, } => Marker, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(260,3) + #[derive(PartialEq, Clone)] + pub enum DisconnectCustomKeyStoreResponse { + DisconnectCustomKeyStoreResponse {} + } - impl Debug - for ListResourceTagsRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DisconnectCustomKeyStoreResponse {} - impl DafnyPrint - for ListResourceTagsRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListResourceTagsRequest::ListResourceTagsRequest{KeyId, Limit, Marker, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListResourceTagsRequest.ListResourceTagsRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Limit, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Marker, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for DisconnectCustomKeyStoreResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for ListResourceTagsRequest {} + impl DafnyPrint + for DisconnectCustomKeyStoreResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.DisconnectCustomKeyStoreResponse.DisconnectCustomKeyStoreResponse")?; + Ok(()) + }, + } + } + } - impl Hash - for ListResourceTagsRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListResourceTagsRequest::ListResourceTagsRequest{KeyId, Limit, Marker, } => { - Hash::hash(KeyId, _state); - Hash::hash(Limit, _state); - Hash::hash(Marker, _state) - }, - } - } - } + impl DisconnectCustomKeyStoreResponse { + /// Enumerates all possible values of DisconnectCustomKeyStoreResponse + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse {})].iter() + } + } - impl Default - for ListResourceTagsRequest { - fn default() -> ListResourceTagsRequest { - ListResourceTagsRequest::ListResourceTagsRequest { - KeyId: Default::default(), - Limit: Default::default(), - Marker: Default::default() - } - } - } + impl Eq + for DisconnectCustomKeyStoreResponse {} - impl AsRef - for &ListResourceTagsRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for DisconnectCustomKeyStoreResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse{} => { - #[derive(PartialEq, Clone)] - pub enum ListResourceTagsResponse { - ListResourceTagsResponse { - Tags: Rc>>>, - NextMarker: Rc>>, - Truncated: Rc> - } - } + }, + } + } + } - impl ListResourceTagsResponse { - pub fn Tags(&self) -> &Rc>>> { - match self { - ListResourceTagsResponse::ListResourceTagsResponse{Tags, NextMarker, Truncated, } => Tags, - } - } - pub fn NextMarker(&self) -> &Rc>> { - match self { - ListResourceTagsResponse::ListResourceTagsResponse{Tags, NextMarker, Truncated, } => NextMarker, - } - } - pub fn Truncated(&self) -> &Rc> { - match self { - ListResourceTagsResponse::ListResourceTagsResponse{Tags, NextMarker, Truncated, } => Truncated, - } - } - } + impl Default + for DisconnectCustomKeyStoreResponse { + fn default() -> DisconnectCustomKeyStoreResponse { + DisconnectCustomKeyStoreResponse::DisconnectCustomKeyStoreResponse {} + } + } - impl Debug - for ListResourceTagsResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for DisconnectCustomKeyStoreResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ListResourceTagsResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ListResourceTagsResponse::ListResourceTagsResponse{Tags, NextMarker, Truncated, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ListResourceTagsResponse.ListResourceTagsResponse(")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NextMarker, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Truncated, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(263,3) + #[derive(PartialEq, Clone)] + pub enum EnableKeyRequest { + EnableKeyRequest { + KeyId: Sequence + } + } - impl Eq - for ListResourceTagsResponse {} + impl EnableKeyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + EnableKeyRequest::EnableKeyRequest{KeyId, } => KeyId, + } + } + } - impl Hash - for ListResourceTagsResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ListResourceTagsResponse::ListResourceTagsResponse{Tags, NextMarker, Truncated, } => { - Hash::hash(Tags, _state); - Hash::hash(NextMarker, _state); - Hash::hash(Truncated, _state) - }, - } - } - } + impl Debug + for EnableKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for ListResourceTagsResponse { - fn default() -> ListResourceTagsResponse { - ListResourceTagsResponse::ListResourceTagsResponse { - Tags: Default::default(), - NextMarker: Default::default(), - Truncated: Default::default() - } - } - } + impl DafnyPrint + for EnableKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EnableKeyRequest::EnableKeyRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EnableKeyRequest.EnableKeyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &ListResourceTagsResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for EnableKeyRequest {} - #[derive(PartialEq, Clone)] - pub enum MacAlgorithmSpec { - HMAC_SHA_224 {}, - HMAC_SHA_256 {}, - HMAC_SHA_384 {}, - HMAC_SHA_512 {} - } + impl Hash + for EnableKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EnableKeyRequest::EnableKeyRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl MacAlgorithmSpec {} + impl Default + for EnableKeyRequest { + fn default() -> EnableKeyRequest { + EnableKeyRequest::EnableKeyRequest { + KeyId: Default::default() + } + } + } - impl Debug - for MacAlgorithmSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for EnableKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for MacAlgorithmSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MacAlgorithmSpec::HMAC_SHA_224{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MacAlgorithmSpec.HMAC__SHA__224")?; - Ok(()) - }, - MacAlgorithmSpec::HMAC_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MacAlgorithmSpec.HMAC__SHA__256")?; - Ok(()) - }, - MacAlgorithmSpec::HMAC_SHA_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MacAlgorithmSpec.HMAC__SHA__384")?; - Ok(()) - }, - MacAlgorithmSpec::HMAC_SHA_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MacAlgorithmSpec.HMAC__SHA__512")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(266,3) + #[derive(PartialEq, Clone)] + pub enum EnableKeyRotationRequest { + EnableKeyRotationRequest { + KeyId: Sequence, + RotationPeriodInDays: Arc> + } + } - impl MacAlgorithmSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(MacAlgorithmSpec::HMAC_SHA_224 {}), Rc::new(MacAlgorithmSpec::HMAC_SHA_256 {}), Rc::new(MacAlgorithmSpec::HMAC_SHA_384 {}), Rc::new(MacAlgorithmSpec::HMAC_SHA_512 {})].iter() - } - } + impl EnableKeyRotationRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => KeyId, + } + } + /// Returns a borrow of the field RotationPeriodInDays + pub fn RotationPeriodInDays(&self) -> &Arc> { + match self { + EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => RotationPeriodInDays, + } + } + } - impl Eq - for MacAlgorithmSpec {} + impl Debug + for EnableKeyRotationRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for MacAlgorithmSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MacAlgorithmSpec::HMAC_SHA_224{} => { + impl DafnyPrint + for EnableKeyRotationRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EnableKeyRotationRequest.EnableKeyRotationRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RotationPeriodInDays, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - MacAlgorithmSpec::HMAC_SHA_256{} => { + impl Eq + for EnableKeyRotationRequest {} + + impl Hash + for EnableKeyRotationRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EnableKeyRotationRequest::EnableKeyRotationRequest{KeyId, RotationPeriodInDays, } => { + Hash::hash(KeyId, _state); + Hash::hash(RotationPeriodInDays, _state) + }, + } + } + } - }, - MacAlgorithmSpec::HMAC_SHA_384{} => { + impl Default + for EnableKeyRotationRequest { + fn default() -> EnableKeyRotationRequest { + EnableKeyRotationRequest::EnableKeyRotationRequest { + KeyId: Default::default(), + RotationPeriodInDays: Default::default() + } + } + } - }, - MacAlgorithmSpec::HMAC_SHA_512{} => { + impl AsRef + for EnableKeyRotationRequest { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(270,3) + #[derive(PartialEq, Clone)] + pub enum EncryptionAlgorithmSpec { + SYMMETRIC_DEFAULT {}, + RSAES_OAEP_SHA_1 {}, + RSAES_OAEP_SHA_256 {} + } - impl Default - for MacAlgorithmSpec { - fn default() -> MacAlgorithmSpec { - MacAlgorithmSpec::HMAC_SHA_224 {} - } - } + impl EncryptionAlgorithmSpec {} - impl AsRef - for &MacAlgorithmSpec { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for EncryptionAlgorithmSpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type MarkerType = Sequence; + impl DafnyPrint + for EncryptionAlgorithmSpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.SYMMETRIC__DEFAULT")?; + Ok(()) + }, + EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.RSAES__OAEP__SHA__1")?; + Ok(()) + }, + EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptionAlgorithmSpec.RSAES__OAEP__SHA__256")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum MessageType { - RAW {}, - DIGEST {} - } + impl EncryptionAlgorithmSpec { + /// Enumerates all possible values of EncryptionAlgorithmSpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT {}), Arc::new(EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1 {}), Arc::new(EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256 {})].iter() + } + } - impl MessageType {} + impl Eq + for EncryptionAlgorithmSpec {} - impl Debug - for MessageType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for EncryptionAlgorithmSpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT{} => { - impl DafnyPrint - for MessageType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MessageType::RAW{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MessageType.RAW")?; - Ok(()) - }, - MessageType::DIGEST{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MessageType.DIGEST")?; - Ok(()) - }, - } - } - } + }, + EncryptionAlgorithmSpec::RSAES_OAEP_SHA_1{} => { - impl MessageType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(MessageType::RAW {}), Rc::new(MessageType::DIGEST {})].iter() - } - } + }, + EncryptionAlgorithmSpec::RSAES_OAEP_SHA_256{} => { - impl Eq - for MessageType {} + }, + } + } + } - impl Hash - for MessageType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MessageType::RAW{} => { + impl Default + for EncryptionAlgorithmSpec { + fn default() -> EncryptionAlgorithmSpec { + EncryptionAlgorithmSpec::SYMMETRIC_DEFAULT {} + } + } - }, - MessageType::DIGEST{} => { + impl AsRef + for EncryptionAlgorithmSpec { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(278,3) + #[derive(PartialEq, Clone)] + pub enum EncryptRequest { + EncryptRequest { + KeyId: Sequence, + Plaintext: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, + EncryptionContext: Arc, Sequence>>>, + GrantTokens: Arc>, + EncryptionAlgorithm: Arc>>, + DryRun: Arc> + } + } - impl Default - for MessageType { - fn default() -> MessageType { - MessageType::RAW {} - } - } + impl EncryptRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field Plaintext + pub fn Plaintext(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => Plaintext, + } + } + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field EncryptionAlgorithm + pub fn EncryptionAlgorithm(&self) -> &Arc>> { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => EncryptionAlgorithm, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => DryRun, + } + } + } - impl AsRef - for &MessageType { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for EncryptRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum MultiRegionConfiguration { - MultiRegionConfiguration { - MultiRegionKeyType: Rc>>, - PrimaryKey: Rc>>, - ReplicaKeys: Rc>>> - } - } + impl DafnyPrint + for EncryptRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptRequest.EncryptRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Plaintext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl MultiRegionConfiguration { - pub fn MultiRegionKeyType(&self) -> &Rc>> { - match self { - MultiRegionConfiguration::MultiRegionConfiguration{MultiRegionKeyType, PrimaryKey, ReplicaKeys, } => MultiRegionKeyType, - } - } - pub fn PrimaryKey(&self) -> &Rc>> { - match self { - MultiRegionConfiguration::MultiRegionConfiguration{MultiRegionKeyType, PrimaryKey, ReplicaKeys, } => PrimaryKey, - } - } - pub fn ReplicaKeys(&self) -> &Rc>>> { - match self { - MultiRegionConfiguration::MultiRegionConfiguration{MultiRegionKeyType, PrimaryKey, ReplicaKeys, } => ReplicaKeys, - } - } - } + impl Eq + for EncryptRequest {} + + impl Hash + for EncryptRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptRequest::EncryptRequest{KeyId, Plaintext, EncryptionContext, GrantTokens, EncryptionAlgorithm, DryRun, } => { + Hash::hash(KeyId, _state); + Hash::hash(Plaintext, _state); + Hash::hash(EncryptionContext, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(EncryptionAlgorithm, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - impl Debug - for MultiRegionConfiguration { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for EncryptRequest { + fn default() -> EncryptRequest { + EncryptRequest::EncryptRequest { + KeyId: Default::default(), + Plaintext: Default::default(), + EncryptionContext: Default::default(), + GrantTokens: Default::default(), + EncryptionAlgorithm: Default::default(), + DryRun: Default::default() + } + } + } - impl DafnyPrint - for MultiRegionConfiguration { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MultiRegionConfiguration::MultiRegionConfiguration{MultiRegionKeyType, PrimaryKey, ReplicaKeys, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MultiRegionConfiguration.MultiRegionConfiguration(")?; - DafnyPrint::fmt_print(MultiRegionKeyType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PrimaryKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for EncryptRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for MultiRegionConfiguration {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(286,3) + #[derive(PartialEq, Clone)] + pub enum EncryptResponse { + EncryptResponse { + CiphertextBlob: Arc>, + KeyId: Arc>>, + EncryptionAlgorithm: Arc>> + } + } - impl Hash - for MultiRegionConfiguration { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MultiRegionConfiguration::MultiRegionConfiguration{MultiRegionKeyType, PrimaryKey, ReplicaKeys, } => { - Hash::hash(MultiRegionKeyType, _state); - Hash::hash(PrimaryKey, _state); - Hash::hash(ReplicaKeys, _state) - }, - } - } - } + impl EncryptResponse { + /// Returns a borrow of the field CiphertextBlob + pub fn CiphertextBlob(&self) -> &Arc> { + match self { + EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => CiphertextBlob, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => KeyId, + } + } + /// Returns a borrow of the field EncryptionAlgorithm + pub fn EncryptionAlgorithm(&self) -> &Arc>> { + match self { + EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => EncryptionAlgorithm, + } + } + } - impl Default - for MultiRegionConfiguration { - fn default() -> MultiRegionConfiguration { - MultiRegionConfiguration::MultiRegionConfiguration { - MultiRegionKeyType: Default::default(), - PrimaryKey: Default::default(), - ReplicaKeys: Default::default() - } - } - } + impl Debug + for EncryptResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &MultiRegionConfiguration { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for EncryptResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.EncryptResponse.EncryptResponse(")?; + DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithm, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum MultiRegionKey { - MultiRegionKey { - Arn: Rc>>, - Region: Rc>> - } - } + impl Eq + for EncryptResponse {} + + impl Hash + for EncryptResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + EncryptResponse::EncryptResponse{CiphertextBlob, KeyId, EncryptionAlgorithm, } => { + Hash::hash(CiphertextBlob, _state); + Hash::hash(KeyId, _state); + Hash::hash(EncryptionAlgorithm, _state) + }, + } + } + } - impl MultiRegionKey { - pub fn Arn(&self) -> &Rc>> { - match self { - MultiRegionKey::MultiRegionKey{Arn, Region, } => Arn, - } - } - pub fn Region(&self) -> &Rc>> { - match self { - MultiRegionKey::MultiRegionKey{Arn, Region, } => Region, - } - } - } + impl Default + for EncryptResponse { + fn default() -> EncryptResponse { + EncryptResponse::EncryptResponse { + CiphertextBlob: Default::default(), + KeyId: Default::default(), + EncryptionAlgorithm: Default::default() + } + } + } - impl Debug - for MultiRegionKey { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for EncryptResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for MultiRegionKey { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MultiRegionKey::MultiRegionKey{Arn, Region, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MultiRegionKey.MultiRegionKey(")?; - DafnyPrint::fmt_print(Arn, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Region, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(292,3) + #[derive(PartialEq, Clone)] + pub enum ExpirationModelType { + KEY_MATERIAL_EXPIRES {}, + KEY_MATERIAL_DOES_NOT_EXPIRE {} + } - impl Eq - for MultiRegionKey {} + impl ExpirationModelType {} - impl Hash - for MultiRegionKey { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MultiRegionKey::MultiRegionKey{Arn, Region, } => { - Hash::hash(Arn, _state); - Hash::hash(Region, _state) - }, - } - } - } + impl Debug + for ExpirationModelType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for MultiRegionKey { - fn default() -> MultiRegionKey { - MultiRegionKey::MultiRegionKey { - Arn: Default::default(), - Region: Default::default() - } - } - } + impl DafnyPrint + for ExpirationModelType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ExpirationModelType::KEY_MATERIAL_EXPIRES{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ExpirationModelType.KEY__MATERIAL__EXPIRES")?; + Ok(()) + }, + ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ExpirationModelType.KEY__MATERIAL__DOES__NOT__EXPIRE")?; + Ok(()) + }, + } + } + } - impl AsRef - for &MultiRegionKey { - fn as_ref(&self) -> Self { - self - } - } + impl ExpirationModelType { + /// Enumerates all possible values of ExpirationModelType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ExpirationModelType::KEY_MATERIAL_EXPIRES {}), Arc::new(ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE {})].iter() + } + } - #[derive(PartialEq, Clone)] - pub enum MultiRegionKeyType { - PRIMARY {}, - REPLICA {} - } + impl Eq + for ExpirationModelType {} - impl MultiRegionKeyType {} + impl Hash + for ExpirationModelType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ExpirationModelType::KEY_MATERIAL_EXPIRES{} => { - impl Debug - for MultiRegionKeyType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + ExpirationModelType::KEY_MATERIAL_DOES_NOT_EXPIRE{} => { - impl DafnyPrint - for MultiRegionKeyType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - MultiRegionKeyType::PRIMARY{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MultiRegionKeyType.PRIMARY")?; - Ok(()) - }, - MultiRegionKeyType::REPLICA{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.MultiRegionKeyType.REPLICA")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl MultiRegionKeyType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(MultiRegionKeyType::PRIMARY {}), Rc::new(MultiRegionKeyType::REPLICA {})].iter() - } - } + impl Default + for ExpirationModelType { + fn default() -> ExpirationModelType { + ExpirationModelType::KEY_MATERIAL_EXPIRES {} + } + } - impl Eq - for MultiRegionKeyType {} + impl AsRef + for ExpirationModelType { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for MultiRegionKeyType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - MultiRegionKeyType::PRIMARY{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(295,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyPairRequest { + GenerateDataKeyPairRequest { + EncryptionContext: Arc, Sequence>>>, + KeyId: Sequence, + KeyPairSpec: Arc, + GrantTokens: Arc>, + Recipient: Arc>>, + DryRun: Arc> + } + } - }, - MultiRegionKeyType::REPLICA{} => { + impl GenerateDataKeyPairRequest { + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field KeyPairSpec + pub fn KeyPairSpec(&self) -> &Arc { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => KeyPairSpec, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field Recipient + pub fn Recipient(&self) -> &Arc>> { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => Recipient, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => DryRun, + } + } + } - }, - } - } - } + impl Debug + for GenerateDataKeyPairRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for MultiRegionKeyType { - fn default() -> MultiRegionKeyType { - MultiRegionKeyType::PRIMARY {} - } - } + impl DafnyPrint + for GenerateDataKeyPairRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairRequest.GenerateDataKeyPairRequest(")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Recipient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &MultiRegionKeyType { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for GenerateDataKeyPairRequest {} + + impl Hash + for GenerateDataKeyPairRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, Recipient, DryRun, } => { + Hash::hash(EncryptionContext, _state); + Hash::hash(KeyId, _state); + Hash::hash(KeyPairSpec, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(Recipient, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - pub type NumberOfBytesType = i32; + impl Default + for GenerateDataKeyPairRequest { + fn default() -> GenerateDataKeyPairRequest { + GenerateDataKeyPairRequest::GenerateDataKeyPairRequest { + EncryptionContext: Default::default(), + KeyId: Default::default(), + KeyPairSpec: Default::default(), + GrantTokens: Default::default(), + Recipient: Default::default(), + DryRun: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum OriginType { - AWS_KMS {}, - EXTERNAL {}, - AWS_CLOUDHSM {}, - EXTERNAL_KEY_STORE {} - } + impl AsRef + for GenerateDataKeyPairRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl OriginType {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(303,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyPairResponse { + GenerateDataKeyPairResponse { + PrivateKeyCiphertextBlob: Arc>, + PrivateKeyPlaintext: Arc>, + PublicKey: Arc>, + KeyId: Arc>>, + KeyPairSpec: Arc>>, + CiphertextForRecipient: Arc> + } + } - impl Debug - for OriginType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GenerateDataKeyPairResponse { + /// Returns a borrow of the field PrivateKeyCiphertextBlob + pub fn PrivateKeyCiphertextBlob(&self) -> &Arc> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PrivateKeyCiphertextBlob, + } + } + /// Returns a borrow of the field PrivateKeyPlaintext + pub fn PrivateKeyPlaintext(&self) -> &Arc> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PrivateKeyPlaintext, + } + } + /// Returns a borrow of the field PublicKey + pub fn PublicKey(&self) -> &Arc> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => PublicKey, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => KeyId, + } + } + /// Returns a borrow of the field KeyPairSpec + pub fn KeyPairSpec(&self) -> &Arc>> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => KeyPairSpec, + } + } + /// Returns a borrow of the field CiphertextForRecipient + pub fn CiphertextForRecipient(&self) -> &Arc> { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => CiphertextForRecipient, + } + } + } - impl DafnyPrint - for OriginType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - OriginType::AWS_KMS{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.OriginType.AWS__KMS")?; - Ok(()) - }, - OriginType::EXTERNAL{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.OriginType.EXTERNAL")?; - Ok(()) - }, - OriginType::AWS_CLOUDHSM{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.OriginType.AWS__CLOUDHSM")?; - Ok(()) - }, - OriginType::EXTERNAL_KEY_STORE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.OriginType.EXTERNAL__KEY__STORE")?; - Ok(()) - }, - } - } - } + impl Debug + for GenerateDataKeyPairResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl OriginType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(OriginType::AWS_KMS {}), Rc::new(OriginType::EXTERNAL {}), Rc::new(OriginType::AWS_CLOUDHSM {}), Rc::new(OriginType::EXTERNAL_KEY_STORE {})].iter() - } - } + impl DafnyPrint + for GenerateDataKeyPairResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairResponse.GenerateDataKeyPairResponse(")?; + DafnyPrint::fmt_print(PrivateKeyCiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PrivateKeyPlaintext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for OriginType {} + impl Eq + for GenerateDataKeyPairResponse {} + + impl Hash + for GenerateDataKeyPairResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse{PrivateKeyCiphertextBlob, PrivateKeyPlaintext, PublicKey, KeyId, KeyPairSpec, CiphertextForRecipient, } => { + Hash::hash(PrivateKeyCiphertextBlob, _state); + Hash::hash(PrivateKeyPlaintext, _state); + Hash::hash(PublicKey, _state); + Hash::hash(KeyId, _state); + Hash::hash(KeyPairSpec, _state); + Hash::hash(CiphertextForRecipient, _state) + }, + } + } + } - impl Hash - for OriginType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - OriginType::AWS_KMS{} => { + impl Default + for GenerateDataKeyPairResponse { + fn default() -> GenerateDataKeyPairResponse { + GenerateDataKeyPairResponse::GenerateDataKeyPairResponse { + PrivateKeyCiphertextBlob: Default::default(), + PrivateKeyPlaintext: Default::default(), + PublicKey: Default::default(), + KeyId: Default::default(), + KeyPairSpec: Default::default(), + CiphertextForRecipient: Default::default() + } + } + } - }, - OriginType::EXTERNAL{} => { + impl AsRef + for GenerateDataKeyPairResponse { + fn as_ref(&self) -> &Self { + self + } + } - }, - OriginType::AWS_CLOUDHSM{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(311,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyPairWithoutPlaintextRequest { + GenerateDataKeyPairWithoutPlaintextRequest { + EncryptionContext: Arc, Sequence>>>, + KeyId: Sequence, + KeyPairSpec: Arc, + GrantTokens: Arc>, + DryRun: Arc> + } + } - }, - OriginType::EXTERNAL_KEY_STORE{} => { + impl GenerateDataKeyPairWithoutPlaintextRequest { + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field KeyPairSpec + pub fn KeyPairSpec(&self) -> &Arc { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => KeyPairSpec, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => DryRun, + } + } + } - }, - } - } - } + impl Debug + for GenerateDataKeyPairWithoutPlaintextRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for OriginType { - fn default() -> OriginType { - OriginType::AWS_KMS {} - } - } + impl DafnyPrint + for GenerateDataKeyPairWithoutPlaintextRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairWithoutPlaintextRequest.GenerateDataKeyPairWithoutPlaintextRequest(")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &OriginType { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for GenerateDataKeyPairWithoutPlaintextRequest {} + + impl Hash + for GenerateDataKeyPairWithoutPlaintextRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest{EncryptionContext, KeyId, KeyPairSpec, GrantTokens, DryRun, } => { + Hash::hash(EncryptionContext, _state); + Hash::hash(KeyId, _state); + Hash::hash(KeyPairSpec, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - pub type PendingWindowInDaysType = i32; + impl Default + for GenerateDataKeyPairWithoutPlaintextRequest { + fn default() -> GenerateDataKeyPairWithoutPlaintextRequest { + GenerateDataKeyPairWithoutPlaintextRequest::GenerateDataKeyPairWithoutPlaintextRequest { + EncryptionContext: Default::default(), + KeyId: Default::default(), + KeyPairSpec: Default::default(), + GrantTokens: Default::default(), + DryRun: Default::default() + } + } + } - pub type PlaintextType = Sequence; + impl AsRef + for GenerateDataKeyPairWithoutPlaintextRequest { + fn as_ref(&self) -> &Self { + self + } + } - pub type PolicyNameType = Sequence; + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(318,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyPairWithoutPlaintextResponse { + GenerateDataKeyPairWithoutPlaintextResponse { + PrivateKeyCiphertextBlob: Arc>, + PublicKey: Arc>, + KeyId: Arc>>, + KeyPairSpec: Arc>> + } + } - pub type PolicyType = Sequence; + impl GenerateDataKeyPairWithoutPlaintextResponse { + /// Returns a borrow of the field PrivateKeyCiphertextBlob + pub fn PrivateKeyCiphertextBlob(&self) -> &Arc> { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => PrivateKeyCiphertextBlob, + } + } + /// Returns a borrow of the field PublicKey + pub fn PublicKey(&self) -> &Arc> { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => PublicKey, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => KeyId, + } + } + /// Returns a borrow of the field KeyPairSpec + pub fn KeyPairSpec(&self) -> &Arc>> { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => KeyPairSpec, + } + } + } - pub type PrincipalIdType = Sequence; + impl Debug + for GenerateDataKeyPairWithoutPlaintextResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type PublicKeyType = Sequence; + impl DafnyPrint + for GenerateDataKeyPairWithoutPlaintextResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyPairWithoutPlaintextResponse.GenerateDataKeyPairWithoutPlaintextResponse(")?; + DafnyPrint::fmt_print(PrivateKeyCiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyPairSpec, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum PutKeyPolicyRequest { - PutKeyPolicyRequest { - KeyId: Sequence, - PolicyName: Rc>>, - Policy: Sequence, - BypassPolicyLockoutSafetyCheck: Rc> - } - } + impl Eq + for GenerateDataKeyPairWithoutPlaintextResponse {} + + impl Hash + for GenerateDataKeyPairWithoutPlaintextResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse{PrivateKeyCiphertextBlob, PublicKey, KeyId, KeyPairSpec, } => { + Hash::hash(PrivateKeyCiphertextBlob, _state); + Hash::hash(PublicKey, _state); + Hash::hash(KeyId, _state); + Hash::hash(KeyPairSpec, _state) + }, + } + } + } - impl PutKeyPolicyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => KeyId, - } - } - pub fn PolicyName(&self) -> &Rc>> { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => PolicyName, - } - } - pub fn Policy(&self) -> &Sequence { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => Policy, - } - } - pub fn BypassPolicyLockoutSafetyCheck(&self) -> &Rc> { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => BypassPolicyLockoutSafetyCheck, - } - } - } + impl Default + for GenerateDataKeyPairWithoutPlaintextResponse { + fn default() -> GenerateDataKeyPairWithoutPlaintextResponse { + GenerateDataKeyPairWithoutPlaintextResponse::GenerateDataKeyPairWithoutPlaintextResponse { + PrivateKeyCiphertextBlob: Default::default(), + PublicKey: Default::default(), + KeyId: Default::default(), + KeyPairSpec: Default::default() + } + } + } - impl Debug - for PutKeyPolicyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GenerateDataKeyPairWithoutPlaintextResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for PutKeyPolicyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.PutKeyPolicyRequest.PutKeyPolicyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PolicyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BypassPolicyLockoutSafetyCheck, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(324,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyRequest { + GenerateDataKeyRequest { + KeyId: Sequence, + EncryptionContext: Arc, Sequence>>>, + NumberOfBytes: Arc>, + KeySpec: Arc>>, + GrantTokens: Arc>, + Recipient: Arc>>, + DryRun: Arc> + } + } - impl Eq - for PutKeyPolicyRequest {} + impl GenerateDataKeyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field NumberOfBytes + pub fn NumberOfBytes(&self) -> &Arc> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => NumberOfBytes, + } + } + /// Returns a borrow of the field KeySpec + pub fn KeySpec(&self) -> &Arc>> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => KeySpec, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field Recipient + pub fn Recipient(&self) -> &Arc>> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => Recipient, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => DryRun, + } + } + } - impl Hash - for PutKeyPolicyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - PutKeyPolicyRequest::PutKeyPolicyRequest{KeyId, PolicyName, Policy, BypassPolicyLockoutSafetyCheck, } => { - Hash::hash(KeyId, _state); - Hash::hash(PolicyName, _state); - Hash::hash(Policy, _state); - Hash::hash(BypassPolicyLockoutSafetyCheck, _state) - }, - } - } - } + impl Debug + for GenerateDataKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for PutKeyPolicyRequest { - fn default() -> PutKeyPolicyRequest { - PutKeyPolicyRequest::PutKeyPolicyRequest { - KeyId: Default::default(), - PolicyName: Default::default(), - Policy: Default::default(), - BypassPolicyLockoutSafetyCheck: Default::default() - } - } - } + impl DafnyPrint + for GenerateDataKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyRequest.GenerateDataKeyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Recipient, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &PutKeyPolicyRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for GenerateDataKeyRequest {} + + impl Hash + for GenerateDataKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyRequest::GenerateDataKeyRequest{KeyId, EncryptionContext, NumberOfBytes, KeySpec, GrantTokens, Recipient, DryRun, } => { + Hash::hash(KeyId, _state); + Hash::hash(EncryptionContext, _state); + Hash::hash(NumberOfBytes, _state); + Hash::hash(KeySpec, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(Recipient, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum RecipientInfo { - RecipientInfo { - KeyEncryptionAlgorithm: Rc>>, - AttestationDocument: Rc> - } - } + impl Default + for GenerateDataKeyRequest { + fn default() -> GenerateDataKeyRequest { + GenerateDataKeyRequest::GenerateDataKeyRequest { + KeyId: Default::default(), + EncryptionContext: Default::default(), + NumberOfBytes: Default::default(), + KeySpec: Default::default(), + GrantTokens: Default::default(), + Recipient: Default::default(), + DryRun: Default::default() + } + } + } - impl RecipientInfo { - pub fn KeyEncryptionAlgorithm(&self) -> &Rc>> { - match self { - RecipientInfo::RecipientInfo{KeyEncryptionAlgorithm, AttestationDocument, } => KeyEncryptionAlgorithm, - } - } - pub fn AttestationDocument(&self) -> &Rc> { - match self { - RecipientInfo::RecipientInfo{KeyEncryptionAlgorithm, AttestationDocument, } => AttestationDocument, - } - } - } + impl AsRef + for GenerateDataKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Debug - for RecipientInfo { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(333,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyResponse { + GenerateDataKeyResponse { + CiphertextBlob: Arc>, + Plaintext: Arc>, + KeyId: Arc>>, + CiphertextForRecipient: Arc> + } + } - impl DafnyPrint - for RecipientInfo { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RecipientInfo::RecipientInfo{KeyEncryptionAlgorithm, AttestationDocument, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RecipientInfo.RecipientInfo(")?; - DafnyPrint::fmt_print(KeyEncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AttestationDocument, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl GenerateDataKeyResponse { + /// Returns a borrow of the field CiphertextBlob + pub fn CiphertextBlob(&self) -> &Arc> { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => CiphertextBlob, + } + } + /// Returns a borrow of the field Plaintext + pub fn Plaintext(&self) -> &Arc> { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => Plaintext, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => KeyId, + } + } + /// Returns a borrow of the field CiphertextForRecipient + pub fn CiphertextForRecipient(&self) -> &Arc> { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => CiphertextForRecipient, + } + } + } - impl Eq - for RecipientInfo {} + impl Debug + for GenerateDataKeyResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for RecipientInfo { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RecipientInfo::RecipientInfo{KeyEncryptionAlgorithm, AttestationDocument, } => { - Hash::hash(KeyEncryptionAlgorithm, _state); - Hash::hash(AttestationDocument, _state) - }, - } - } - } - - impl Default - for RecipientInfo { - fn default() -> RecipientInfo { - RecipientInfo::RecipientInfo { - KeyEncryptionAlgorithm: Default::default(), - AttestationDocument: Default::default() - } - } - } - - impl AsRef - for &RecipientInfo { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReEncryptRequest { - ReEncryptRequest { - CiphertextBlob: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - SourceEncryptionContext: Rc, Sequence>>>, - SourceKeyId: Rc>>, - DestinationKeyId: Sequence, - DestinationEncryptionContext: Rc, Sequence>>>, - SourceEncryptionAlgorithm: Rc>>, - DestinationEncryptionAlgorithm: Rc>>, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl ReEncryptRequest { - pub fn CiphertextBlob(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => CiphertextBlob, - } - } - pub fn SourceEncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => SourceEncryptionContext, - } - } - pub fn SourceKeyId(&self) -> &Rc>> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => SourceKeyId, - } - } - pub fn DestinationKeyId(&self) -> &Sequence { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => DestinationKeyId, - } - } - pub fn DestinationEncryptionContext(&self) -> &Rc, Sequence>>> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => DestinationEncryptionContext, - } - } - pub fn SourceEncryptionAlgorithm(&self) -> &Rc>> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => SourceEncryptionAlgorithm, - } - } - pub fn DestinationEncryptionAlgorithm(&self) -> &Rc>> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => DestinationEncryptionAlgorithm, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for ReEncryptRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GenerateDataKeyResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyResponse.GenerateDataKeyResponse(")?; + DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Plaintext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for ReEncryptRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ReEncryptRequest.ReEncryptRequest(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceEncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationEncryptionContext, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceEncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationEncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for GenerateDataKeyResponse {} + + impl Hash + for GenerateDataKeyResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyResponse::GenerateDataKeyResponse{CiphertextBlob, Plaintext, KeyId, CiphertextForRecipient, } => { + Hash::hash(CiphertextBlob, _state); + Hash::hash(Plaintext, _state); + Hash::hash(KeyId, _state); + Hash::hash(CiphertextForRecipient, _state) + }, + } + } + } - impl Eq - for ReEncryptRequest {} + impl Default + for GenerateDataKeyResponse { + fn default() -> GenerateDataKeyResponse { + GenerateDataKeyResponse::GenerateDataKeyResponse { + CiphertextBlob: Default::default(), + Plaintext: Default::default(), + KeyId: Default::default(), + CiphertextForRecipient: Default::default() + } + } + } - impl Hash - for ReEncryptRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReEncryptRequest::ReEncryptRequest{CiphertextBlob, SourceEncryptionContext, SourceKeyId, DestinationKeyId, DestinationEncryptionContext, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, GrantTokens, DryRun, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(SourceEncryptionContext, _state); - Hash::hash(SourceKeyId, _state); - Hash::hash(DestinationKeyId, _state); - Hash::hash(DestinationEncryptionContext, _state); - Hash::hash(SourceEncryptionAlgorithm, _state); - Hash::hash(DestinationEncryptionAlgorithm, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for ReEncryptRequest { - fn default() -> ReEncryptRequest { - ReEncryptRequest::ReEncryptRequest { - CiphertextBlob: Default::default(), - SourceEncryptionContext: Default::default(), - SourceKeyId: Default::default(), - DestinationKeyId: Default::default(), - DestinationEncryptionContext: Default::default(), - SourceEncryptionAlgorithm: Default::default(), - DestinationEncryptionAlgorithm: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &ReEncryptRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReEncryptResponse { - ReEncryptResponse { - CiphertextBlob: Rc>, - SourceKeyId: Rc>>, - KeyId: Rc>>, - SourceEncryptionAlgorithm: Rc>>, - DestinationEncryptionAlgorithm: Rc>> - } - } - - impl ReEncryptResponse { - pub fn CiphertextBlob(&self) -> &Rc> { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => CiphertextBlob, - } - } - pub fn SourceKeyId(&self) -> &Rc>> { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => SourceKeyId, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => KeyId, - } - } - pub fn SourceEncryptionAlgorithm(&self) -> &Rc>> { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => SourceEncryptionAlgorithm, - } - } - pub fn DestinationEncryptionAlgorithm(&self) -> &Rc>> { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => DestinationEncryptionAlgorithm, - } - } - } - - impl Debug - for ReEncryptResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GenerateDataKeyResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ReEncryptResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ReEncryptResponse.ReEncryptResponse(")?; - DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SourceEncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DestinationEncryptionAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(339,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyWithoutPlaintextRequest { + GenerateDataKeyWithoutPlaintextRequest { + KeyId: Sequence, + EncryptionContext: Arc, Sequence>>>, + KeySpec: Arc>>, + NumberOfBytes: Arc>, + GrantTokens: Arc>, + DryRun: Arc> + } + } - impl Eq - for ReEncryptResponse {} + impl GenerateDataKeyWithoutPlaintextRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field EncryptionContext + pub fn EncryptionContext(&self) -> &Arc, Sequence>>> { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => EncryptionContext, + } + } + /// Returns a borrow of the field KeySpec + pub fn KeySpec(&self) -> &Arc>> { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => KeySpec, + } + } + /// Returns a borrow of the field NumberOfBytes + pub fn NumberOfBytes(&self) -> &Arc> { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => NumberOfBytes, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => DryRun, + } + } + } - impl Hash - for ReEncryptResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReEncryptResponse::ReEncryptResponse{CiphertextBlob, SourceKeyId, KeyId, SourceEncryptionAlgorithm, DestinationEncryptionAlgorithm, } => { - Hash::hash(CiphertextBlob, _state); - Hash::hash(SourceKeyId, _state); - Hash::hash(KeyId, _state); - Hash::hash(SourceEncryptionAlgorithm, _state); - Hash::hash(DestinationEncryptionAlgorithm, _state) - }, - } - } - } - - impl Default - for ReEncryptResponse { - fn default() -> ReEncryptResponse { - ReEncryptResponse::ReEncryptResponse { - CiphertextBlob: Default::default(), - SourceKeyId: Default::default(), - KeyId: Default::default(), - SourceEncryptionAlgorithm: Default::default(), - DestinationEncryptionAlgorithm: Default::default() - } - } - } - - impl AsRef - for &ReEncryptResponse { - fn as_ref(&self) -> Self { - self - } - } - - pub type RegionType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum ReplicateKeyRequest { - ReplicateKeyRequest { - KeyId: Sequence, - ReplicaRegion: Sequence, - Policy: Rc>>, - BypassPolicyLockoutSafetyCheck: Rc>, - Description: Rc>>, - Tags: Rc>>> - } - } - - impl ReplicateKeyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => KeyId, - } - } - pub fn ReplicaRegion(&self) -> &Sequence { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => ReplicaRegion, - } - } - pub fn Policy(&self) -> &Rc>> { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => Policy, - } - } - pub fn BypassPolicyLockoutSafetyCheck(&self) -> &Rc> { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => BypassPolicyLockoutSafetyCheck, - } - } - pub fn Description(&self) -> &Rc>> { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => Description, - } - } - pub fn Tags(&self) -> &Rc>>> { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => Tags, - } - } - } - - impl Debug - for ReplicateKeyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GenerateDataKeyWithoutPlaintextRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ReplicateKeyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ReplicateKeyRequest.ReplicateKeyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaRegion, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Policy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(BypassPolicyLockoutSafetyCheck, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Description, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GenerateDataKeyWithoutPlaintextRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyWithoutPlaintextRequest.GenerateDataKeyWithoutPlaintextRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionContext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ReplicateKeyRequest {} + impl Eq + for GenerateDataKeyWithoutPlaintextRequest {} + + impl Hash + for GenerateDataKeyWithoutPlaintextRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest{KeyId, EncryptionContext, KeySpec, NumberOfBytes, GrantTokens, DryRun, } => { + Hash::hash(KeyId, _state); + Hash::hash(EncryptionContext, _state); + Hash::hash(KeySpec, _state); + Hash::hash(NumberOfBytes, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - impl Hash - for ReplicateKeyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicateKeyRequest::ReplicateKeyRequest{KeyId, ReplicaRegion, Policy, BypassPolicyLockoutSafetyCheck, Description, Tags, } => { - Hash::hash(KeyId, _state); - Hash::hash(ReplicaRegion, _state); - Hash::hash(Policy, _state); - Hash::hash(BypassPolicyLockoutSafetyCheck, _state); - Hash::hash(Description, _state); - Hash::hash(Tags, _state) - }, - } - } - } - - impl Default - for ReplicateKeyRequest { - fn default() -> ReplicateKeyRequest { - ReplicateKeyRequest::ReplicateKeyRequest { - KeyId: Default::default(), - ReplicaRegion: Default::default(), - Policy: Default::default(), - BypassPolicyLockoutSafetyCheck: Default::default(), - Description: Default::default(), - Tags: Default::default() - } - } - } - - impl AsRef - for &ReplicateKeyRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ReplicateKeyResponse { - ReplicateKeyResponse { - ReplicaKeyMetadata: Rc>>, - ReplicaPolicy: Rc>>, - ReplicaTags: Rc>>> - } - } - - impl ReplicateKeyResponse { - pub fn ReplicaKeyMetadata(&self) -> &Rc>> { - match self { - ReplicateKeyResponse::ReplicateKeyResponse{ReplicaKeyMetadata, ReplicaPolicy, ReplicaTags, } => ReplicaKeyMetadata, - } - } - pub fn ReplicaPolicy(&self) -> &Rc>> { - match self { - ReplicateKeyResponse::ReplicateKeyResponse{ReplicaKeyMetadata, ReplicaPolicy, ReplicaTags, } => ReplicaPolicy, - } - } - pub fn ReplicaTags(&self) -> &Rc>>> { - match self { - ReplicateKeyResponse::ReplicateKeyResponse{ReplicaKeyMetadata, ReplicaPolicy, ReplicaTags, } => ReplicaTags, - } - } - } - - impl Debug - for ReplicateKeyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GenerateDataKeyWithoutPlaintextRequest { + fn default() -> GenerateDataKeyWithoutPlaintextRequest { + GenerateDataKeyWithoutPlaintextRequest::GenerateDataKeyWithoutPlaintextRequest { + KeyId: Default::default(), + EncryptionContext: Default::default(), + KeySpec: Default::default(), + NumberOfBytes: Default::default(), + GrantTokens: Default::default(), + DryRun: Default::default() + } + } + } - impl DafnyPrint - for ReplicateKeyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ReplicateKeyResponse::ReplicateKeyResponse{ReplicaKeyMetadata, ReplicaPolicy, ReplicaTags, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ReplicateKeyResponse.ReplicateKeyResponse(")?; - DafnyPrint::fmt_print(ReplicaKeyMetadata, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaPolicy, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(ReplicaTags, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GenerateDataKeyWithoutPlaintextRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for ReplicateKeyResponse {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(347,3) + #[derive(PartialEq, Clone)] + pub enum GenerateDataKeyWithoutPlaintextResponse { + GenerateDataKeyWithoutPlaintextResponse { + CiphertextBlob: Arc>, + KeyId: Arc>> + } + } - impl Hash - for ReplicateKeyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ReplicateKeyResponse::ReplicateKeyResponse{ReplicaKeyMetadata, ReplicaPolicy, ReplicaTags, } => { - Hash::hash(ReplicaKeyMetadata, _state); - Hash::hash(ReplicaPolicy, _state); - Hash::hash(ReplicaTags, _state) - }, - } - } - } - - impl Default - for ReplicateKeyResponse { - fn default() -> ReplicateKeyResponse { - ReplicateKeyResponse::ReplicateKeyResponse { - ReplicaKeyMetadata: Default::default(), - ReplicaPolicy: Default::default(), - ReplicaTags: Default::default() - } - } - } - - impl AsRef - for &ReplicateKeyResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RetireGrantRequest { - RetireGrantRequest { - GrantToken: Rc>>, - KeyId: Rc>>, - GrantId: Rc>>, - DryRun: Rc> - } - } - - impl RetireGrantRequest { - pub fn GrantToken(&self) -> &Rc>> { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => GrantToken, - } - } - pub fn KeyId(&self) -> &Rc>> { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => KeyId, - } - } - pub fn GrantId(&self) -> &Rc>> { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => GrantId, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => DryRun, - } - } - } - - impl Debug - for RetireGrantRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GenerateDataKeyWithoutPlaintextResponse { + /// Returns a borrow of the field CiphertextBlob + pub fn CiphertextBlob(&self) -> &Arc> { + match self { + GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => CiphertextBlob, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => KeyId, + } + } + } - impl DafnyPrint - for RetireGrantRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RetireGrantRequest.RetireGrantRequest(")?; - DafnyPrint::fmt_print(GrantToken, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GenerateDataKeyWithoutPlaintextResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for RetireGrantRequest {} + impl DafnyPrint + for GenerateDataKeyWithoutPlaintextResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateDataKeyWithoutPlaintextResponse.GenerateDataKeyWithoutPlaintextResponse(")?; + DafnyPrint::fmt_print(CiphertextBlob, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for RetireGrantRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RetireGrantRequest::RetireGrantRequest{GrantToken, KeyId, GrantId, DryRun, } => { - Hash::hash(GrantToken, _state); - Hash::hash(KeyId, _state); - Hash::hash(GrantId, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for RetireGrantRequest { - fn default() -> RetireGrantRequest { - RetireGrantRequest::RetireGrantRequest { - GrantToken: Default::default(), - KeyId: Default::default(), - GrantId: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &RetireGrantRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum RevokeGrantRequest { - RevokeGrantRequest { - KeyId: Sequence, - GrantId: Sequence, - DryRun: Rc> - } - } - - impl RevokeGrantRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - RevokeGrantRequest::RevokeGrantRequest{KeyId, GrantId, DryRun, } => KeyId, - } - } - pub fn GrantId(&self) -> &Sequence { - match self { - RevokeGrantRequest::RevokeGrantRequest{KeyId, GrantId, DryRun, } => GrantId, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - RevokeGrantRequest::RevokeGrantRequest{KeyId, GrantId, DryRun, } => DryRun, - } - } - } - - impl Debug - for RevokeGrantRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GenerateDataKeyWithoutPlaintextResponse {} + + impl Hash + for GenerateDataKeyWithoutPlaintextResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse{CiphertextBlob, KeyId, } => { + Hash::hash(CiphertextBlob, _state); + Hash::hash(KeyId, _state) + }, + } + } + } - impl DafnyPrint - for RevokeGrantRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RevokeGrantRequest::RevokeGrantRequest{KeyId, GrantId, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RevokeGrantRequest.RevokeGrantRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GenerateDataKeyWithoutPlaintextResponse { + fn default() -> GenerateDataKeyWithoutPlaintextResponse { + GenerateDataKeyWithoutPlaintextResponse::GenerateDataKeyWithoutPlaintextResponse { + CiphertextBlob: Default::default(), + KeyId: Default::default() + } + } + } - impl Eq - for RevokeGrantRequest {} + impl AsRef + for GenerateDataKeyWithoutPlaintextResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for RevokeGrantRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RevokeGrantRequest::RevokeGrantRequest{KeyId, GrantId, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(GrantId, _state); - Hash::hash(DryRun, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(351,3) + #[derive(PartialEq, Clone)] + pub enum GenerateMacRequest { + GenerateMacRequest { + Message: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, + KeyId: Sequence, + MacAlgorithm: Arc, + GrantTokens: Arc>, + DryRun: Arc> + } + } - impl Default - for RevokeGrantRequest { - fn default() -> RevokeGrantRequest { - RevokeGrantRequest::RevokeGrantRequest { - KeyId: Default::default(), - GrantId: Default::default(), - DryRun: Default::default() - } - } - } + impl GenerateMacRequest { + /// Returns a borrow of the field Message + pub fn Message(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => Message, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => KeyId, + } + } + /// Returns a borrow of the field MacAlgorithm + pub fn MacAlgorithm(&self) -> &Arc { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => MacAlgorithm, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => GrantTokens, + } + } + /// Returns a borrow of the field DryRun + pub fn DryRun(&self) -> &Arc> { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => DryRun, + } + } + } - impl AsRef - for &RevokeGrantRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GenerateMacRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum RotateKeyOnDemandRequest { - RotateKeyOnDemandRequest { - KeyId: Sequence - } - } + impl DafnyPrint + for GenerateMacRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateMacRequest.GenerateMacRequest(")?; + DafnyPrint::fmt_print(Message, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DryRun, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl RotateKeyOnDemandRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - RotateKeyOnDemandRequest::RotateKeyOnDemandRequest{KeyId, } => KeyId, - } - } - } + impl Eq + for GenerateMacRequest {} + + impl Hash + for GenerateMacRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateMacRequest::GenerateMacRequest{Message, KeyId, MacAlgorithm, GrantTokens, DryRun, } => { + Hash::hash(Message, _state); + Hash::hash(KeyId, _state); + Hash::hash(MacAlgorithm, _state); + Hash::hash(GrantTokens, _state); + Hash::hash(DryRun, _state) + }, + } + } + } - impl Debug - for RotateKeyOnDemandRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GenerateMacRequest { + fn default() -> GenerateMacRequest { + GenerateMacRequest::GenerateMacRequest { + Message: Default::default(), + KeyId: Default::default(), + MacAlgorithm: Default::default(), + GrantTokens: Default::default(), + DryRun: Default::default() + } + } + } - impl DafnyPrint - for RotateKeyOnDemandRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RotateKeyOnDemandRequest::RotateKeyOnDemandRequest{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RotateKeyOnDemandRequest.RotateKeyOnDemandRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GenerateMacRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for RotateKeyOnDemandRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(358,3) + #[derive(PartialEq, Clone)] + pub enum GenerateMacResponse { + GenerateMacResponse { + Mac: Arc>, + MacAlgorithm: Arc>>, + KeyId: Arc>> + } + } - impl Hash - for RotateKeyOnDemandRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RotateKeyOnDemandRequest::RotateKeyOnDemandRequest{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + impl GenerateMacResponse { + /// Returns a borrow of the field Mac + pub fn Mac(&self) -> &Arc> { + match self { + GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => Mac, + } + } + /// Returns a borrow of the field MacAlgorithm + pub fn MacAlgorithm(&self) -> &Arc>> { + match self { + GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => MacAlgorithm, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => KeyId, + } + } + } - impl Default - for RotateKeyOnDemandRequest { - fn default() -> RotateKeyOnDemandRequest { - RotateKeyOnDemandRequest::RotateKeyOnDemandRequest { - KeyId: Default::default() - } - } - } + impl Debug + for GenerateMacResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &RotateKeyOnDemandRequest { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GenerateMacResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateMacResponse.GenerateMacResponse(")?; + DafnyPrint::fmt_print(Mac, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum RotateKeyOnDemandResponse { - RotateKeyOnDemandResponse { - KeyId: Rc>> - } - } + impl Eq + for GenerateMacResponse {} + + impl Hash + for GenerateMacResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateMacResponse::GenerateMacResponse{Mac, MacAlgorithm, KeyId, } => { + Hash::hash(Mac, _state); + Hash::hash(MacAlgorithm, _state); + Hash::hash(KeyId, _state) + }, + } + } + } - impl RotateKeyOnDemandResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - RotateKeyOnDemandResponse::RotateKeyOnDemandResponse{KeyId, } => KeyId, - } - } - } + impl Default + for GenerateMacResponse { + fn default() -> GenerateMacResponse { + GenerateMacResponse::GenerateMacResponse { + Mac: Default::default(), + MacAlgorithm: Default::default(), + KeyId: Default::default() + } + } + } - impl Debug - for RotateKeyOnDemandResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GenerateMacResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for RotateKeyOnDemandResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RotateKeyOnDemandResponse::RotateKeyOnDemandResponse{KeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RotateKeyOnDemandResponse.RotateKeyOnDemandResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(363,3) + #[derive(PartialEq, Clone)] + pub enum GenerateRandomRequest { + GenerateRandomRequest { + NumberOfBytes: Arc>, + CustomKeyStoreId: Arc>>, + Recipient: Arc>> + } + } - impl Eq - for RotateKeyOnDemandResponse {} + impl GenerateRandomRequest { + /// Returns a borrow of the field NumberOfBytes + pub fn NumberOfBytes(&self) -> &Arc> { + match self { + GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => NumberOfBytes, + } + } + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => CustomKeyStoreId, + } + } + /// Returns a borrow of the field Recipient + pub fn Recipient(&self) -> &Arc>> { + match self { + GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => Recipient, + } + } + } - impl Hash - for RotateKeyOnDemandResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RotateKeyOnDemandResponse::RotateKeyOnDemandResponse{KeyId, } => { - Hash::hash(KeyId, _state) - }, - } - } - } + impl Debug + for GenerateRandomRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for RotateKeyOnDemandResponse { - fn default() -> RotateKeyOnDemandResponse { - RotateKeyOnDemandResponse::RotateKeyOnDemandResponse { - KeyId: Default::default() - } - } - } + impl DafnyPrint + for GenerateRandomRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateRandomRequest.GenerateRandomRequest(")?; + DafnyPrint::fmt_print(NumberOfBytes, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Recipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl AsRef - for &RotateKeyOnDemandResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Eq + for GenerateRandomRequest {} + + impl Hash + for GenerateRandomRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateRandomRequest::GenerateRandomRequest{NumberOfBytes, CustomKeyStoreId, Recipient, } => { + Hash::hash(NumberOfBytes, _state); + Hash::hash(CustomKeyStoreId, _state); + Hash::hash(Recipient, _state) + }, + } + } + } - pub type RotationPeriodInDaysType = i32; + impl Default + for GenerateRandomRequest { + fn default() -> GenerateRandomRequest { + GenerateRandomRequest::GenerateRandomRequest { + NumberOfBytes: Default::default(), + CustomKeyStoreId: Default::default(), + Recipient: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum RotationsListEntry { - RotationsListEntry { - KeyId: Rc>>, - RotationDate: Rc>>, - RotationType: Rc>> - } - } + impl AsRef + for GenerateRandomRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl RotationsListEntry { - pub fn KeyId(&self) -> &Rc>> { - match self { - RotationsListEntry::RotationsListEntry{KeyId, RotationDate, RotationType, } => KeyId, - } - } - pub fn RotationDate(&self) -> &Rc>> { - match self { - RotationsListEntry::RotationsListEntry{KeyId, RotationDate, RotationType, } => RotationDate, - } - } - pub fn RotationType(&self) -> &Rc>> { - match self { - RotationsListEntry::RotationsListEntry{KeyId, RotationDate, RotationType, } => RotationType, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(368,3) + #[derive(PartialEq, Clone)] + pub enum GenerateRandomResponse { + GenerateRandomResponse { + Plaintext: Arc>, + CiphertextForRecipient: Arc> + } + } - impl Debug - for RotationsListEntry { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GenerateRandomResponse { + /// Returns a borrow of the field Plaintext + pub fn Plaintext(&self) -> &Arc> { + match self { + GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => Plaintext, + } + } + /// Returns a borrow of the field CiphertextForRecipient + pub fn CiphertextForRecipient(&self) -> &Arc> { + match self { + GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => CiphertextForRecipient, + } + } + } - impl DafnyPrint - for RotationsListEntry { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RotationsListEntry::RotationsListEntry{KeyId, RotationDate, RotationType, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RotationsListEntry.RotationsListEntry(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RotationDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RotationType, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GenerateRandomResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for RotationsListEntry {} + impl DafnyPrint + for GenerateRandomResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GenerateRandomResponse.GenerateRandomResponse(")?; + DafnyPrint::fmt_print(Plaintext, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CiphertextForRecipient, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for RotationsListEntry { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RotationsListEntry::RotationsListEntry{KeyId, RotationDate, RotationType, } => { - Hash::hash(KeyId, _state); - Hash::hash(RotationDate, _state); - Hash::hash(RotationType, _state) - }, - } - } - } + impl Eq + for GenerateRandomResponse {} + + impl Hash + for GenerateRandomResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GenerateRandomResponse::GenerateRandomResponse{Plaintext, CiphertextForRecipient, } => { + Hash::hash(Plaintext, _state); + Hash::hash(CiphertextForRecipient, _state) + }, + } + } + } - impl Default - for RotationsListEntry { - fn default() -> RotationsListEntry { - RotationsListEntry::RotationsListEntry { - KeyId: Default::default(), - RotationDate: Default::default(), - RotationType: Default::default() - } - } - } + impl Default + for GenerateRandomResponse { + fn default() -> GenerateRandomResponse { + GenerateRandomResponse::GenerateRandomResponse { + Plaintext: Default::default(), + CiphertextForRecipient: Default::default() + } + } + } - impl AsRef - for &RotationsListEntry { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GenerateRandomResponse { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum RotationType { - AUTOMATIC {}, - ON_DEMAND {} - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(372,3) + #[derive(PartialEq, Clone)] + pub enum GetKeyPolicyRequest { + GetKeyPolicyRequest { + KeyId: Sequence, + PolicyName: Arc>> + } + } - impl RotationType {} + impl GetKeyPolicyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => KeyId, + } + } + /// Returns a borrow of the field PolicyName + pub fn PolicyName(&self) -> &Arc>> { + match self { + GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => PolicyName, + } + } + } - impl Debug - for RotationType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetKeyPolicyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for RotationType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - RotationType::AUTOMATIC{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RotationType.AUTOMATIC")?; - Ok(()) - }, - RotationType::ON_DEMAND{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.RotationType.ON__DEMAND")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetKeyPolicyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyPolicyRequest.GetKeyPolicyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PolicyName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl RotationType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(RotationType::AUTOMATIC {}), Rc::new(RotationType::ON_DEMAND {})].iter() - } - } + impl Eq + for GetKeyPolicyRequest {} + + impl Hash + for GetKeyPolicyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetKeyPolicyRequest::GetKeyPolicyRequest{KeyId, PolicyName, } => { + Hash::hash(KeyId, _state); + Hash::hash(PolicyName, _state) + }, + } + } + } - impl Eq - for RotationType {} + impl Default + for GetKeyPolicyRequest { + fn default() -> GetKeyPolicyRequest { + GetKeyPolicyRequest::GetKeyPolicyRequest { + KeyId: Default::default(), + PolicyName: Default::default() + } + } + } - impl Hash - for RotationType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - RotationType::AUTOMATIC{} => { + impl AsRef + for GetKeyPolicyRequest { + fn as_ref(&self) -> &Self { + self + } + } - }, - RotationType::ON_DEMAND{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(376,3) + #[derive(PartialEq, Clone)] + pub enum GetKeyPolicyResponse { + GetKeyPolicyResponse { + Policy: Arc>>, + PolicyName: Arc>> + } + } - }, - } - } - } + impl GetKeyPolicyResponse { + /// Returns a borrow of the field Policy + pub fn Policy(&self) -> &Arc>> { + match self { + GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => Policy, + } + } + /// Returns a borrow of the field PolicyName + pub fn PolicyName(&self) -> &Arc>> { + match self { + GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => PolicyName, + } + } + } - impl Default - for RotationType { - fn default() -> RotationType { - RotationType::AUTOMATIC {} - } - } + impl Debug + for GetKeyPolicyResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &RotationType { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for GetKeyPolicyResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyPolicyResponse.GetKeyPolicyResponse(")?; + DafnyPrint::fmt_print(Policy, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PolicyName, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - #[derive(PartialEq, Clone)] - pub enum ScheduleKeyDeletionRequest { - ScheduleKeyDeletionRequest { - KeyId: Sequence, - PendingWindowInDays: Rc> - } - } + impl Eq + for GetKeyPolicyResponse {} + + impl Hash + for GetKeyPolicyResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetKeyPolicyResponse::GetKeyPolicyResponse{Policy, PolicyName, } => { + Hash::hash(Policy, _state); + Hash::hash(PolicyName, _state) + }, + } + } + } - impl ScheduleKeyDeletionRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest{KeyId, PendingWindowInDays, } => KeyId, - } - } - pub fn PendingWindowInDays(&self) -> &Rc> { - match self { - ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest{KeyId, PendingWindowInDays, } => PendingWindowInDays, - } - } - } + impl Default + for GetKeyPolicyResponse { + fn default() -> GetKeyPolicyResponse { + GetKeyPolicyResponse::GetKeyPolicyResponse { + Policy: Default::default(), + PolicyName: Default::default() + } + } + } - impl Debug - for ScheduleKeyDeletionRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GetKeyPolicyResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for ScheduleKeyDeletionRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest{KeyId, PendingWindowInDays, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ScheduleKeyDeletionRequest.ScheduleKeyDeletionRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PendingWindowInDays, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(380,3) + #[derive(PartialEq, Clone)] + pub enum GetKeyRotationStatusRequest { + GetKeyRotationStatusRequest { + KeyId: Sequence + } + } - impl Eq - for ScheduleKeyDeletionRequest {} + impl GetKeyRotationStatusRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => KeyId, + } + } + } - impl Hash - for ScheduleKeyDeletionRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest{KeyId, PendingWindowInDays, } => { - Hash::hash(KeyId, _state); - Hash::hash(PendingWindowInDays, _state) - }, - } - } - } - - impl Default - for ScheduleKeyDeletionRequest { - fn default() -> ScheduleKeyDeletionRequest { - ScheduleKeyDeletionRequest::ScheduleKeyDeletionRequest { - KeyId: Default::default(), - PendingWindowInDays: Default::default() - } - } - } - - impl AsRef - for &ScheduleKeyDeletionRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum ScheduleKeyDeletionResponse { - ScheduleKeyDeletionResponse { - KeyId: Rc>>, - DeletionDate: Rc>>, - KeyState: Rc>>, - PendingWindowInDays: Rc> - } - } - - impl ScheduleKeyDeletionResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => KeyId, - } - } - pub fn DeletionDate(&self) -> &Rc>> { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => DeletionDate, - } - } - pub fn KeyState(&self) -> &Rc>> { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => KeyState, - } - } - pub fn PendingWindowInDays(&self) -> &Rc> { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => PendingWindowInDays, - } - } - } - - impl Debug - for ScheduleKeyDeletionResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for GetKeyRotationStatusRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for ScheduleKeyDeletionResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ScheduleKeyDeletionResponse.ScheduleKeyDeletionResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DeletionDate, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyState, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PendingWindowInDays, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for GetKeyRotationStatusRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyRotationStatusRequest.GetKeyRotationStatusRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for ScheduleKeyDeletionResponse {} + impl Eq + for GetKeyRotationStatusRequest {} - impl Hash - for ScheduleKeyDeletionResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse{KeyId, DeletionDate, KeyState, PendingWindowInDays, } => { - Hash::hash(KeyId, _state); - Hash::hash(DeletionDate, _state); - Hash::hash(KeyState, _state); - Hash::hash(PendingWindowInDays, _state) - }, - } - } - } - - impl Default - for ScheduleKeyDeletionResponse { - fn default() -> ScheduleKeyDeletionResponse { - ScheduleKeyDeletionResponse::ScheduleKeyDeletionResponse { - KeyId: Default::default(), - DeletionDate: Default::default(), - KeyState: Default::default(), - PendingWindowInDays: Default::default() - } - } - } - - impl AsRef - for &ScheduleKeyDeletionResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum SigningAlgorithmSpec { - RSASSA_PSS_SHA_256 {}, - RSASSA_PSS_SHA_384 {}, - RSASSA_PSS_SHA_512 {}, - RSASSA_PKCS1_V1_5_SHA_256 {}, - RSASSA_PKCS1_V1_5_SHA_384 {}, - RSASSA_PKCS1_V1_5_SHA_512 {}, - ECDSA_SHA_256 {}, - ECDSA_SHA_384 {}, - ECDSA_SHA_512 {}, - SM2DSA {} - } - - impl SigningAlgorithmSpec {} - - impl Debug - for SigningAlgorithmSpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Hash + for GetKeyRotationStatusRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetKeyRotationStatusRequest::GetKeyRotationStatusRequest{KeyId, } => { + Hash::hash(KeyId, _state) + }, + } + } + } - impl DafnyPrint - for SigningAlgorithmSpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SigningAlgorithmSpec::RSASSA_PSS_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PSS__SHA__256")?; - Ok(()) - }, - SigningAlgorithmSpec::RSASSA_PSS_SHA_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PSS__SHA__384")?; - Ok(()) - }, - SigningAlgorithmSpec::RSASSA_PSS_SHA_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PSS__SHA__512")?; - Ok(()) - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PKCS1__V1__5__SHA__256")?; - Ok(()) - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PKCS1__V1__5__SHA__384")?; - Ok(()) - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.RSASSA__PKCS1__V1__5__SHA__512")?; - Ok(()) - }, - SigningAlgorithmSpec::ECDSA_SHA_256{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.ECDSA__SHA__256")?; - Ok(()) - }, - SigningAlgorithmSpec::ECDSA_SHA_384{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.ECDSA__SHA__384")?; - Ok(()) - }, - SigningAlgorithmSpec::ECDSA_SHA_512{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.ECDSA__SHA__512")?; - Ok(()) - }, - SigningAlgorithmSpec::SM2DSA{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SigningAlgorithmSpec.SM2DSA")?; - Ok(()) - }, - } - } - } + impl Default + for GetKeyRotationStatusRequest { + fn default() -> GetKeyRotationStatusRequest { + GetKeyRotationStatusRequest::GetKeyRotationStatusRequest { + KeyId: Default::default() + } + } + } - impl SigningAlgorithmSpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(SigningAlgorithmSpec::RSASSA_PSS_SHA_256 {}), Rc::new(SigningAlgorithmSpec::RSASSA_PSS_SHA_384 {}), Rc::new(SigningAlgorithmSpec::RSASSA_PSS_SHA_512 {}), Rc::new(SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_256 {}), Rc::new(SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_384 {}), Rc::new(SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_512 {}), Rc::new(SigningAlgorithmSpec::ECDSA_SHA_256 {}), Rc::new(SigningAlgorithmSpec::ECDSA_SHA_384 {}), Rc::new(SigningAlgorithmSpec::ECDSA_SHA_512 {}), Rc::new(SigningAlgorithmSpec::SM2DSA {})].iter() - } - } + impl AsRef + for GetKeyRotationStatusRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for SigningAlgorithmSpec {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(383,3) + #[derive(PartialEq, Clone)] + pub enum GetKeyRotationStatusResponse { + GetKeyRotationStatusResponse { + KeyRotationEnabled: Arc>, + KeyId: Arc>>, + RotationPeriodInDays: Arc>, + NextRotationDate: Arc>>, + OnDemandRotationStartDate: Arc>> + } + } - impl Hash - for SigningAlgorithmSpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SigningAlgorithmSpec::RSASSA_PSS_SHA_256{} => { + impl GetKeyRotationStatusResponse { + /// Returns a borrow of the field KeyRotationEnabled + pub fn KeyRotationEnabled(&self) -> &Arc> { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => KeyRotationEnabled, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => KeyId, + } + } + /// Returns a borrow of the field RotationPeriodInDays + pub fn RotationPeriodInDays(&self) -> &Arc> { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => RotationPeriodInDays, + } + } + /// Returns a borrow of the field NextRotationDate + pub fn NextRotationDate(&self) -> &Arc>> { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => NextRotationDate, + } + } + /// Returns a borrow of the field OnDemandRotationStartDate + pub fn OnDemandRotationStartDate(&self) -> &Arc>> { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => OnDemandRotationStartDate, + } + } + } - }, - SigningAlgorithmSpec::RSASSA_PSS_SHA_384{} => { + impl Debug + for GetKeyRotationStatusResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - SigningAlgorithmSpec::RSASSA_PSS_SHA_512{} => { + impl DafnyPrint + for GetKeyRotationStatusResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetKeyRotationStatusResponse.GetKeyRotationStatusResponse(")?; + DafnyPrint::fmt_print(KeyRotationEnabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RotationPeriodInDays, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(NextRotationDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(OnDemandRotationStartDate, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_256{} => { + impl Eq + for GetKeyRotationStatusResponse {} + + impl Hash + for GetKeyRotationStatusResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse{KeyRotationEnabled, KeyId, RotationPeriodInDays, NextRotationDate, OnDemandRotationStartDate, } => { + Hash::hash(KeyRotationEnabled, _state); + Hash::hash(KeyId, _state); + Hash::hash(RotationPeriodInDays, _state); + Hash::hash(NextRotationDate, _state); + Hash::hash(OnDemandRotationStartDate, _state) + }, + } + } + } - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_384{} => { + impl Default + for GetKeyRotationStatusResponse { + fn default() -> GetKeyRotationStatusResponse { + GetKeyRotationStatusResponse::GetKeyRotationStatusResponse { + KeyRotationEnabled: Default::default(), + KeyId: Default::default(), + RotationPeriodInDays: Default::default(), + NextRotationDate: Default::default(), + OnDemandRotationStartDate: Default::default() + } + } + } - }, - SigningAlgorithmSpec::RSASSA_PKCS1_V1_5_SHA_512{} => { + impl AsRef + for GetKeyRotationStatusResponse { + fn as_ref(&self) -> &Self { + self + } + } - }, - SigningAlgorithmSpec::ECDSA_SHA_256{} => { + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(390,3) + #[derive(PartialEq, Clone)] + pub enum GetParametersForImportRequest { + GetParametersForImportRequest { + KeyId: Sequence, + WrappingAlgorithm: Arc, + WrappingKeySpec: Arc + } + } - }, - SigningAlgorithmSpec::ECDSA_SHA_384{} => { + impl GetParametersForImportRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => KeyId, + } + } + /// Returns a borrow of the field WrappingAlgorithm + pub fn WrappingAlgorithm(&self) -> &Arc { + match self { + GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => WrappingAlgorithm, + } + } + /// Returns a borrow of the field WrappingKeySpec + pub fn WrappingKeySpec(&self) -> &Arc { + match self { + GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => WrappingKeySpec, + } + } + } - }, - SigningAlgorithmSpec::ECDSA_SHA_512{} => { + impl Debug + for GetParametersForImportRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - }, - SigningAlgorithmSpec::SM2DSA{} => { + impl DafnyPrint + for GetParametersForImportRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetParametersForImportRequest.GetParametersForImportRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WrappingAlgorithm, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(WrappingKeySpec, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - }, - } - } - } - - impl Default - for SigningAlgorithmSpec { - fn default() -> SigningAlgorithmSpec { - SigningAlgorithmSpec::RSASSA_PSS_SHA_256 {} - } - } - - impl AsRef - for &SigningAlgorithmSpec { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum SignRequest { - SignRequest { - KeyId: Sequence, - Message: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, - MessageType: Rc>>, - GrantTokens: Rc>, - SigningAlgorithm: Rc, - DryRun: Rc> - } - } - - impl SignRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => KeyId, - } - } - pub fn Message(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => Message, - } - } - pub fn MessageType(&self) -> &Rc>> { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => MessageType, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => GrantTokens, - } - } - pub fn SigningAlgorithm(&self) -> &Rc { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => SigningAlgorithm, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => DryRun, - } - } - } - - impl Debug - for SignRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GetParametersForImportRequest {} + + impl Hash + for GetParametersForImportRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetParametersForImportRequest::GetParametersForImportRequest{KeyId, WrappingAlgorithm, WrappingKeySpec, } => { + Hash::hash(KeyId, _state); + Hash::hash(WrappingAlgorithm, _state); + Hash::hash(WrappingKeySpec, _state) + }, + } + } + } - impl DafnyPrint - for SignRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SignRequest.SignRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MessageType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GetParametersForImportRequest { + fn default() -> GetParametersForImportRequest { + GetParametersForImportRequest::GetParametersForImportRequest { + KeyId: Default::default(), + WrappingAlgorithm: Default::default(), + WrappingKeySpec: Default::default() + } + } + } - impl Eq - for SignRequest {} + impl AsRef + for GetParametersForImportRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for SignRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SignRequest::SignRequest{KeyId, Message, MessageType, GrantTokens, SigningAlgorithm, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(Message, _state); - Hash::hash(MessageType, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(SigningAlgorithm, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for SignRequest { - fn default() -> SignRequest { - SignRequest::SignRequest { - KeyId: Default::default(), - Message: Default::default(), - MessageType: Default::default(), - GrantTokens: Default::default(), - SigningAlgorithm: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &SignRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum SignResponse { - SignResponse { - KeyId: Rc>>, - Signature: Rc>, - SigningAlgorithm: Rc>> - } - } - - impl SignResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - SignResponse::SignResponse{KeyId, Signature, SigningAlgorithm, } => KeyId, - } - } - pub fn Signature(&self) -> &Rc> { - match self { - SignResponse::SignResponse{KeyId, Signature, SigningAlgorithm, } => Signature, - } - } - pub fn SigningAlgorithm(&self) -> &Rc>> { - match self { - SignResponse::SignResponse{KeyId, Signature, SigningAlgorithm, } => SigningAlgorithm, - } - } - } - - impl Debug - for SignResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(395,3) + #[derive(PartialEq, Clone)] + pub enum GetParametersForImportResponse { + GetParametersForImportResponse { + KeyId: Arc>>, + ImportToken: Arc>, + PublicKey: Arc>, + ParametersValidTo: Arc>> + } + } - impl DafnyPrint - for SignResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - SignResponse::SignResponse{KeyId, Signature, SigningAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.SignResponse.SignResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Signature, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl GetParametersForImportResponse { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => KeyId, + } + } + /// Returns a borrow of the field ImportToken + pub fn ImportToken(&self) -> &Arc> { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => ImportToken, + } + } + /// Returns a borrow of the field PublicKey + pub fn PublicKey(&self) -> &Arc> { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => PublicKey, + } + } + /// Returns a borrow of the field ParametersValidTo + pub fn ParametersValidTo(&self) -> &Arc>> { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => ParametersValidTo, + } + } + } - impl Eq - for SignResponse {} + impl Debug + for GetParametersForImportResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for SignResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - SignResponse::SignResponse{KeyId, Signature, SigningAlgorithm, } => { - Hash::hash(KeyId, _state); - Hash::hash(Signature, _state); - Hash::hash(SigningAlgorithm, _state) - }, - } - } - } + impl DafnyPrint + for GetParametersForImportResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetParametersForImportResponse.GetParametersForImportResponse(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ImportToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ParametersValidTo, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Default - for SignResponse { - fn default() -> SignResponse { - SignResponse::SignResponse { - KeyId: Default::default(), - Signature: Default::default(), - SigningAlgorithm: Default::default() - } - } - } + impl Eq + for GetParametersForImportResponse {} + + impl Hash + for GetParametersForImportResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetParametersForImportResponse::GetParametersForImportResponse{KeyId, ImportToken, PublicKey, ParametersValidTo, } => { + Hash::hash(KeyId, _state); + Hash::hash(ImportToken, _state); + Hash::hash(PublicKey, _state); + Hash::hash(ParametersValidTo, _state) + }, + } + } + } - impl AsRef - for &SignResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Default + for GetParametersForImportResponse { + fn default() -> GetParametersForImportResponse { + GetParametersForImportResponse::GetParametersForImportResponse { + KeyId: Default::default(), + ImportToken: Default::default(), + PublicKey: Default::default(), + ParametersValidTo: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Tag { - Tag { - TagKey: Sequence, - TagValue: Sequence - } - } + impl AsRef + for GetParametersForImportResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Tag { - pub fn TagKey(&self) -> &Sequence { - match self { - Tag::Tag{TagKey, TagValue, } => TagKey, - } - } - pub fn TagValue(&self) -> &Sequence { - match self { - Tag::Tag{TagKey, TagValue, } => TagValue, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(401,3) + #[derive(PartialEq, Clone)] + pub enum GetPublicKeyRequest { + GetPublicKeyRequest { + KeyId: Sequence, + GrantTokens: Arc> + } + } - impl Debug - for Tag { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GetPublicKeyRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => KeyId, + } + } + /// Returns a borrow of the field GrantTokens + pub fn GrantTokens(&self) -> &Arc> { + match self { + GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => GrantTokens, + } + } + } - impl DafnyPrint - for Tag { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Tag::Tag{TagKey, TagValue, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Tag.Tag(")?; - DafnyPrint::fmt_print(TagKey, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TagValue, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GetPublicKeyRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for Tag {} + impl DafnyPrint + for GetPublicKeyRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetPublicKeyRequest.GetPublicKeyRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for Tag { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Tag::Tag{TagKey, TagValue, } => { - Hash::hash(TagKey, _state); - Hash::hash(TagValue, _state) - }, - } - } - } + impl Eq + for GetPublicKeyRequest {} + + impl Hash + for GetPublicKeyRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetPublicKeyRequest::GetPublicKeyRequest{KeyId, GrantTokens, } => { + Hash::hash(KeyId, _state); + Hash::hash(GrantTokens, _state) + }, + } + } + } - impl Default - for Tag { - fn default() -> Tag { - Tag::Tag { - TagKey: Default::default(), - TagValue: Default::default() - } - } - } + impl Default + for GetPublicKeyRequest { + fn default() -> GetPublicKeyRequest { + GetPublicKeyRequest::GetPublicKeyRequest { + KeyId: Default::default(), + GrantTokens: Default::default() + } + } + } - impl AsRef - for &Tag { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for GetPublicKeyRequest { + fn as_ref(&self) -> &Self { + self + } + } - pub type TagKeyType = Sequence; + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(405,3) + #[derive(PartialEq, Clone)] + pub enum GetPublicKeyResponse { + GetPublicKeyResponse { + KeyId: Arc>>, + PublicKey: Arc>, + CustomerMasterKeySpec: Arc>>, + KeySpec: Arc>>, + KeyUsage: Arc>>, + EncryptionAlgorithms: Arc>>>, + SigningAlgorithms: Arc>>>, + KeyAgreementAlgorithms: Arc>>> + } + } - #[derive(PartialEq, Clone)] - pub enum TagResourceRequest { - TagResourceRequest { - KeyId: Sequence, - Tags: Sequence> - } - } + impl GetPublicKeyResponse { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyId, + } + } + /// Returns a borrow of the field PublicKey + pub fn PublicKey(&self) -> &Arc> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => PublicKey, + } + } + /// Returns a borrow of the field CustomerMasterKeySpec + pub fn CustomerMasterKeySpec(&self) -> &Arc>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => CustomerMasterKeySpec, + } + } + /// Returns a borrow of the field KeySpec + pub fn KeySpec(&self) -> &Arc>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeySpec, + } + } + /// Returns a borrow of the field KeyUsage + pub fn KeyUsage(&self) -> &Arc>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyUsage, + } + } + /// Returns a borrow of the field EncryptionAlgorithms + pub fn EncryptionAlgorithms(&self) -> &Arc>>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => EncryptionAlgorithms, + } + } + /// Returns a borrow of the field SigningAlgorithms + pub fn SigningAlgorithms(&self) -> &Arc>>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => SigningAlgorithms, + } + } + /// Returns a borrow of the field KeyAgreementAlgorithms + pub fn KeyAgreementAlgorithms(&self) -> &Arc>>> { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => KeyAgreementAlgorithms, + } + } + } - impl TagResourceRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - TagResourceRequest::TagResourceRequest{KeyId, Tags, } => KeyId, - } - } - pub fn Tags(&self) -> &Sequence> { - match self { - TagResourceRequest::TagResourceRequest{KeyId, Tags, } => Tags, - } - } - } + impl Debug + for GetPublicKeyResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Debug - for TagResourceRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl DafnyPrint + for GetPublicKeyResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GetPublicKeyResponse.GetPublicKeyResponse(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PublicKey, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SigningAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyAgreementAlgorithms, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl DafnyPrint - for TagResourceRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - TagResourceRequest::TagResourceRequest{KeyId, Tags, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.TagResourceRequest.TagResourceRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Tags, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Eq + for GetPublicKeyResponse {} + + impl Hash + for GetPublicKeyResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GetPublicKeyResponse::GetPublicKeyResponse{KeyId, PublicKey, CustomerMasterKeySpec, KeySpec, KeyUsage, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, } => { + Hash::hash(KeyId, _state); + Hash::hash(PublicKey, _state); + Hash::hash(CustomerMasterKeySpec, _state); + Hash::hash(KeySpec, _state); + Hash::hash(KeyUsage, _state); + Hash::hash(EncryptionAlgorithms, _state); + Hash::hash(SigningAlgorithms, _state); + Hash::hash(KeyAgreementAlgorithms, _state) + }, + } + } + } - impl Eq - for TagResourceRequest {} + impl Default + for GetPublicKeyResponse { + fn default() -> GetPublicKeyResponse { + GetPublicKeyResponse::GetPublicKeyResponse { + KeyId: Default::default(), + PublicKey: Default::default(), + CustomerMasterKeySpec: Default::default(), + KeySpec: Default::default(), + KeyUsage: Default::default(), + EncryptionAlgorithms: Default::default(), + SigningAlgorithms: Default::default(), + KeyAgreementAlgorithms: Default::default() + } + } + } - impl Hash - for TagResourceRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - TagResourceRequest::TagResourceRequest{KeyId, Tags, } => { - Hash::hash(KeyId, _state); - Hash::hash(Tags, _state) - }, - } - } - } + impl AsRef + for GetPublicKeyResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl Default - for TagResourceRequest { - fn default() -> TagResourceRequest { - TagResourceRequest::TagResourceRequest { - KeyId: Default::default(), - Tags: Default::default() - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(415,3) + #[derive(PartialEq, Clone)] + pub enum GrantConstraints { + GrantConstraints { + EncryptionContextSubset: Arc, Sequence>>>, + EncryptionContextEquals: Arc, Sequence>>> + } + } - impl AsRef - for &TagResourceRequest { - fn as_ref(&self) -> Self { - self - } - } + impl GrantConstraints { + /// Returns a borrow of the field EncryptionContextSubset + pub fn EncryptionContextSubset(&self) -> &Arc, Sequence>>> { + match self { + GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => EncryptionContextSubset, + } + } + /// Returns a borrow of the field EncryptionContextEquals + pub fn EncryptionContextEquals(&self) -> &Arc, Sequence>>> { + match self { + GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => EncryptionContextEquals, + } + } + } - pub type TagValueType = Sequence; + impl Debug + for GrantConstraints { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub struct IKMSClientCallHistory {} + impl DafnyPrint + for GrantConstraints { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantConstraints.GrantConstraints(")?; + DafnyPrint::fmt_print(EncryptionContextSubset, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionContextEquals, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl IKMSClientCallHistory { - pub fn _allocate_object() -> Object { - allocate_object::() - } - } - - impl UpcastObject - for crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::IKMSClientCallHistory { - UpcastObjectFn!(dyn Any); - } - - pub trait IKMSClient: Any + UpcastObject { - fn CancelKeyDeletion(&self, input: &Rc) -> Rc, Rc>>; - fn ConnectCustomKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn CreateAlias(&self, input: &Rc) -> Rc>>; - fn CreateCustomKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn CreateGrant(&self, input: &Rc) -> Rc, Rc>>; - fn CreateKey(&self, input: &Rc) -> Rc, Rc>>; - fn Decrypt(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteAlias(&self, input: &Rc) -> Rc>>; - fn DeleteCustomKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn DeleteImportedKeyMaterial(&self, input: &Rc) -> Rc>>; - fn DeriveSharedSecret(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeCustomKeyStores(&self, input: &Rc) -> Rc, Rc>>; - fn DescribeKey(&self, input: &Rc) -> Rc, Rc>>; - fn DisableKey(&self, input: &Rc) -> Rc>>; - fn DisableKeyRotation(&self, input: &Rc) -> Rc>>; - fn DisconnectCustomKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn EnableKey(&self, input: &Rc) -> Rc>>; - fn EnableKeyRotation(&self, input: &Rc) -> Rc>>; - fn Encrypt(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateDataKey(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateDataKeyPair(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateDataKeyPairWithoutPlaintext(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateDataKeyWithoutPlaintext(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateMac(&self, input: &Rc) -> Rc, Rc>>; - fn GenerateRandom(&self, input: &Rc) -> Rc, Rc>>; - fn GetKeyPolicy(&self, input: &Rc) -> Rc, Rc>>; - fn GetKeyRotationStatus(&self, input: &Rc) -> Rc, Rc>>; - fn GetParametersForImport(&self, input: &Rc) -> Rc, Rc>>; - fn GetPublicKey(&self, input: &Rc) -> Rc, Rc>>; - fn ImportKeyMaterial(&self, input: &Rc) -> Rc, Rc>>; - fn ListAliases(&self, input: &Rc) -> Rc, Rc>>; - fn ListGrants(&self, input: &Rc) -> Rc, Rc>>; - fn ListKeyPolicies(&self, input: &Rc) -> Rc, Rc>>; - fn ListKeyRotations(&self, input: &Rc) -> Rc, Rc>>; - fn ListKeys(&self, input: &Rc) -> Rc, Rc>>; - fn ListResourceTags(&self, input: &Rc) -> Rc, Rc>>; - fn PutKeyPolicy(&self, input: &Rc) -> Rc>>; - fn ReEncrypt(&self, input: &Rc) -> Rc, Rc>>; - fn ReplicateKey(&self, input: &Rc) -> Rc, Rc>>; - fn RetireGrant(&self, input: &Rc) -> Rc>>; - fn RevokeGrant(&self, input: &Rc) -> Rc>>; - fn RotateKeyOnDemand(&self, input: &Rc) -> Rc, Rc>>; - fn ScheduleKeyDeletion(&self, input: &Rc) -> Rc, Rc>>; - fn Sign(&self, input: &Rc) -> Rc, Rc>>; - fn TagResource(&self, input: &Rc) -> Rc>>; - fn UntagResource(&self, input: &Rc) -> Rc>>; - fn UpdateAlias(&self, input: &Rc) -> Rc>>; - fn UpdateCustomKeyStore(&self, input: &Rc) -> Rc, Rc>>; - fn UpdateKeyDescription(&self, input: &Rc) -> Rc>>; - fn UpdatePrimaryRegion(&self, input: &Rc) -> Rc>>; - fn Verify(&self, input: &Rc) -> Rc, Rc>>; - fn VerifyMac(&self, input: &Rc) -> Rc, Rc>>; - } - - pub type TrustAnchorCertificateType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum UntagResourceRequest { - UntagResourceRequest { - KeyId: Sequence, - TagKeys: Sequence> - } - } - - impl UntagResourceRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - UntagResourceRequest::UntagResourceRequest{KeyId, TagKeys, } => KeyId, - } - } - pub fn TagKeys(&self) -> &Sequence> { - match self { - UntagResourceRequest::UntagResourceRequest{KeyId, TagKeys, } => TagKeys, - } - } - } - - impl Debug - for UntagResourceRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for GrantConstraints {} + + impl Hash + for GrantConstraints { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GrantConstraints::GrantConstraints{EncryptionContextSubset, EncryptionContextEquals, } => { + Hash::hash(EncryptionContextSubset, _state); + Hash::hash(EncryptionContextEquals, _state) + }, + } + } + } - impl DafnyPrint - for UntagResourceRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UntagResourceRequest::UntagResourceRequest{KeyId, TagKeys, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UntagResourceRequest.UntagResourceRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TagKeys, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for GrantConstraints { + fn default() -> GrantConstraints { + GrantConstraints::GrantConstraints { + EncryptionContextSubset: Default::default(), + EncryptionContextEquals: Default::default() + } + } + } - impl Eq - for UntagResourceRequest {} + impl AsRef + for GrantConstraints { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for UntagResourceRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UntagResourceRequest::UntagResourceRequest{KeyId, TagKeys, } => { - Hash::hash(KeyId, _state); - Hash::hash(TagKeys, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(419,3) + pub type GrantIdType = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(424,3) + #[derive(PartialEq, Clone)] + pub enum GrantListEntry { + GrantListEntry { + KeyId: Arc>>, + GrantId: Arc>>, + Name: Arc>>, + CreationDate: Arc>>, + GranteePrincipal: Arc>>, + RetiringPrincipal: Arc>>, + IssuingAccount: Arc>>, + Operations: Arc>>>, + Constraints: Arc>> + } + } - impl Default - for UntagResourceRequest { - fn default() -> UntagResourceRequest { - UntagResourceRequest::UntagResourceRequest { - KeyId: Default::default(), - TagKeys: Default::default() - } - } - } + impl GrantListEntry { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => KeyId, + } + } + /// Returns a borrow of the field GrantId + pub fn GrantId(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => GrantId, + } + } + /// Returns a borrow of the field Name + pub fn Name(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Name, + } + } + /// Returns a borrow of the field CreationDate + pub fn CreationDate(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => CreationDate, + } + } + /// Returns a borrow of the field GranteePrincipal + pub fn GranteePrincipal(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => GranteePrincipal, + } + } + /// Returns a borrow of the field RetiringPrincipal + pub fn RetiringPrincipal(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => RetiringPrincipal, + } + } + /// Returns a borrow of the field IssuingAccount + pub fn IssuingAccount(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => IssuingAccount, + } + } + /// Returns a borrow of the field Operations + pub fn Operations(&self) -> &Arc>>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Operations, + } + } + /// Returns a borrow of the field Constraints + pub fn Constraints(&self) -> &Arc>> { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => Constraints, + } + } + } - impl AsRef - for &UntagResourceRequest { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for GrantListEntry { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum UpdateAliasRequest { - UpdateAliasRequest { - AliasName: Sequence, - TargetKeyId: Sequence - } - } + impl DafnyPrint + for GrantListEntry { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantListEntry.GrantListEntry(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GrantId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Name, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(GranteePrincipal, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(RetiringPrincipal, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(IssuingAccount, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Operations, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Constraints, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl UpdateAliasRequest { - pub fn AliasName(&self) -> &Sequence { - match self { - UpdateAliasRequest::UpdateAliasRequest{AliasName, TargetKeyId, } => AliasName, - } - } - pub fn TargetKeyId(&self) -> &Sequence { - match self { - UpdateAliasRequest::UpdateAliasRequest{AliasName, TargetKeyId, } => TargetKeyId, - } - } - } + impl Eq + for GrantListEntry {} + + impl Hash + for GrantListEntry { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GrantListEntry::GrantListEntry{KeyId, GrantId, Name, CreationDate, GranteePrincipal, RetiringPrincipal, IssuingAccount, Operations, Constraints, } => { + Hash::hash(KeyId, _state); + Hash::hash(GrantId, _state); + Hash::hash(Name, _state); + Hash::hash(CreationDate, _state); + Hash::hash(GranteePrincipal, _state); + Hash::hash(RetiringPrincipal, _state); + Hash::hash(IssuingAccount, _state); + Hash::hash(Operations, _state); + Hash::hash(Constraints, _state) + }, + } + } + } - impl Debug - for UpdateAliasRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for GrantListEntry { + fn default() -> GrantListEntry { + GrantListEntry::GrantListEntry { + KeyId: Default::default(), + GrantId: Default::default(), + Name: Default::default(), + CreationDate: Default::default(), + GranteePrincipal: Default::default(), + RetiringPrincipal: Default::default(), + IssuingAccount: Default::default(), + Operations: Default::default(), + Constraints: Default::default() + } + } + } - impl DafnyPrint - for UpdateAliasRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateAliasRequest::UpdateAliasRequest{AliasName, TargetKeyId, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UpdateAliasRequest.UpdateAliasRequest(")?; - DafnyPrint::fmt_print(AliasName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(TargetKeyId, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for GrantListEntry { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for UpdateAliasRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(435,3) + pub type GrantNameType = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(439,3) + #[derive(PartialEq, Clone)] + pub enum GrantOperation { + Decrypt {}, + Encrypt {}, + GenerateDataKey {}, + GenerateDataKeyWithoutPlaintext {}, + ReEncryptFrom {}, + ReEncryptTo {}, + Sign {}, + Verify {}, + GetPublicKey {}, + CreateGrant {}, + RetireGrant {}, + DescribeKey {}, + GenerateDataKeyPair {}, + GenerateDataKeyPairWithoutPlaintext {}, + GenerateMac {}, + VerifyMac {}, + DeriveSharedSecret {} + } - impl Hash - for UpdateAliasRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateAliasRequest::UpdateAliasRequest{AliasName, TargetKeyId, } => { - Hash::hash(AliasName, _state); - Hash::hash(TargetKeyId, _state) - }, - } - } - } - - impl Default - for UpdateAliasRequest { - fn default() -> UpdateAliasRequest { - UpdateAliasRequest::UpdateAliasRequest { - AliasName: Default::default(), - TargetKeyId: Default::default() - } - } - } - - impl AsRef - for &UpdateAliasRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateCustomKeyStoreRequest { - UpdateCustomKeyStoreRequest { - CustomKeyStoreId: Sequence, - NewCustomKeyStoreName: Rc>>, - KeyStorePassword: Rc>>, - CloudHsmClusterId: Rc>>, - XksProxyUriEndpoint: Rc>>, - XksProxyUriPath: Rc>>, - XksProxyVpcEndpointServiceName: Rc>>, - XksProxyAuthenticationCredential: Rc>>, - XksProxyConnectivity: Rc>> - } - } - - impl UpdateCustomKeyStoreRequest { - pub fn CustomKeyStoreId(&self) -> &Sequence { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CustomKeyStoreId, - } - } - pub fn NewCustomKeyStoreName(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => NewCustomKeyStoreName, - } - } - pub fn KeyStorePassword(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => KeyStorePassword, - } - } - pub fn CloudHsmClusterId(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => CloudHsmClusterId, - } - } - pub fn XksProxyUriEndpoint(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriEndpoint, - } - } - pub fn XksProxyUriPath(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyUriPath, - } - } - pub fn XksProxyVpcEndpointServiceName(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyVpcEndpointServiceName, - } - } - pub fn XksProxyAuthenticationCredential(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyAuthenticationCredential, - } - } - pub fn XksProxyConnectivity(&self) -> &Rc>> { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => XksProxyConnectivity, - } - } - } - - impl Debug - for UpdateCustomKeyStoreRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GrantOperation {} - impl DafnyPrint - for UpdateCustomKeyStoreRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UpdateCustomKeyStoreRequest.UpdateCustomKeyStoreRequest(")?; - DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(NewCustomKeyStoreName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyStorePassword, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyUriEndpoint, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyUriPath, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyVpcEndpointServiceName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyAuthenticationCredential, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(XksProxyConnectivity, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for GrantOperation { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for UpdateCustomKeyStoreRequest {} + impl DafnyPrint + for GrantOperation { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + GrantOperation::Decrypt{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Decrypt")?; + Ok(()) + }, + GrantOperation::Encrypt{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Encrypt")?; + Ok(()) + }, + GrantOperation::GenerateDataKey{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKey")?; + Ok(()) + }, + GrantOperation::GenerateDataKeyWithoutPlaintext{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyWithoutPlaintext")?; + Ok(()) + }, + GrantOperation::ReEncryptFrom{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.ReEncryptFrom")?; + Ok(()) + }, + GrantOperation::ReEncryptTo{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.ReEncryptTo")?; + Ok(()) + }, + GrantOperation::Sign{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Sign")?; + Ok(()) + }, + GrantOperation::Verify{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.Verify")?; + Ok(()) + }, + GrantOperation::GetPublicKey{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GetPublicKey")?; + Ok(()) + }, + GrantOperation::CreateGrant{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.CreateGrant")?; + Ok(()) + }, + GrantOperation::RetireGrant{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.RetireGrant")?; + Ok(()) + }, + GrantOperation::DescribeKey{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.DescribeKey")?; + Ok(()) + }, + GrantOperation::GenerateDataKeyPair{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyPair")?; + Ok(()) + }, + GrantOperation::GenerateDataKeyPairWithoutPlaintext{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateDataKeyPairWithoutPlaintext")?; + Ok(()) + }, + GrantOperation::GenerateMac{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.GenerateMac")?; + Ok(()) + }, + GrantOperation::VerifyMac{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.VerifyMac")?; + Ok(()) + }, + GrantOperation::DeriveSharedSecret{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.GrantOperation.DeriveSharedSecret")?; + Ok(()) + }, + } + } + } - impl Hash - for UpdateCustomKeyStoreRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest{CustomKeyStoreId, NewCustomKeyStoreName, KeyStorePassword, CloudHsmClusterId, XksProxyUriEndpoint, XksProxyUriPath, XksProxyVpcEndpointServiceName, XksProxyAuthenticationCredential, XksProxyConnectivity, } => { - Hash::hash(CustomKeyStoreId, _state); - Hash::hash(NewCustomKeyStoreName, _state); - Hash::hash(KeyStorePassword, _state); - Hash::hash(CloudHsmClusterId, _state); - Hash::hash(XksProxyUriEndpoint, _state); - Hash::hash(XksProxyUriPath, _state); - Hash::hash(XksProxyVpcEndpointServiceName, _state); - Hash::hash(XksProxyAuthenticationCredential, _state); - Hash::hash(XksProxyConnectivity, _state) - }, - } - } - } - - impl Default - for UpdateCustomKeyStoreRequest { - fn default() -> UpdateCustomKeyStoreRequest { - UpdateCustomKeyStoreRequest::UpdateCustomKeyStoreRequest { - CustomKeyStoreId: Default::default(), - NewCustomKeyStoreName: Default::default(), - KeyStorePassword: Default::default(), - CloudHsmClusterId: Default::default(), - XksProxyUriEndpoint: Default::default(), - XksProxyUriPath: Default::default(), - XksProxyVpcEndpointServiceName: Default::default(), - XksProxyAuthenticationCredential: Default::default(), - XksProxyConnectivity: Default::default() - } - } - } - - impl AsRef - for &UpdateCustomKeyStoreRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum UpdateCustomKeyStoreResponse { - UpdateCustomKeyStoreResponse {} - } - - impl UpdateCustomKeyStoreResponse {} - - impl Debug - for UpdateCustomKeyStoreResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl GrantOperation { + /// Enumerates all possible values of GrantOperation + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(GrantOperation::Decrypt {}), Arc::new(GrantOperation::Encrypt {}), Arc::new(GrantOperation::GenerateDataKey {}), Arc::new(GrantOperation::GenerateDataKeyWithoutPlaintext {}), Arc::new(GrantOperation::ReEncryptFrom {}), Arc::new(GrantOperation::ReEncryptTo {}), Arc::new(GrantOperation::Sign {}), Arc::new(GrantOperation::Verify {}), Arc::new(GrantOperation::GetPublicKey {}), Arc::new(GrantOperation::CreateGrant {}), Arc::new(GrantOperation::RetireGrant {}), Arc::new(GrantOperation::DescribeKey {}), Arc::new(GrantOperation::GenerateDataKeyPair {}), Arc::new(GrantOperation::GenerateDataKeyPairWithoutPlaintext {}), Arc::new(GrantOperation::GenerateMac {}), Arc::new(GrantOperation::VerifyMac {}), Arc::new(GrantOperation::DeriveSharedSecret {})].iter() + } + } - impl DafnyPrint - for UpdateCustomKeyStoreResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UpdateCustomKeyStoreResponse.UpdateCustomKeyStoreResponse")?; - Ok(()) - }, - } - } - } + impl Eq + for GrantOperation {} - impl UpdateCustomKeyStoreResponse { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse {})].iter() - } - } + impl Hash + for GrantOperation { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + GrantOperation::Decrypt{} => { - impl Eq - for UpdateCustomKeyStoreResponse {} + }, + GrantOperation::Encrypt{} => { - impl Hash - for UpdateCustomKeyStoreResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse{} => { + }, + GrantOperation::GenerateDataKey{} => { - }, - } - } - } + }, + GrantOperation::GenerateDataKeyWithoutPlaintext{} => { - impl Default - for UpdateCustomKeyStoreResponse { - fn default() -> UpdateCustomKeyStoreResponse { - UpdateCustomKeyStoreResponse::UpdateCustomKeyStoreResponse {} - } - } + }, + GrantOperation::ReEncryptFrom{} => { - impl AsRef - for &UpdateCustomKeyStoreResponse { - fn as_ref(&self) -> Self { - self - } - } + }, + GrantOperation::ReEncryptTo{} => { - #[derive(PartialEq, Clone)] - pub enum UpdateKeyDescriptionRequest { - UpdateKeyDescriptionRequest { - KeyId: Sequence, - Description: Sequence - } - } + }, + GrantOperation::Sign{} => { - impl UpdateKeyDescriptionRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest{KeyId, Description, } => KeyId, - } - } - pub fn Description(&self) -> &Sequence { - match self { - UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest{KeyId, Description, } => Description, - } - } - } + }, + GrantOperation::Verify{} => { - impl Debug - for UpdateKeyDescriptionRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + GrantOperation::GetPublicKey{} => { - impl DafnyPrint - for UpdateKeyDescriptionRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest{KeyId, Description, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UpdateKeyDescriptionRequest.UpdateKeyDescriptionRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Description, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + GrantOperation::CreateGrant{} => { - impl Eq - for UpdateKeyDescriptionRequest {} + }, + GrantOperation::RetireGrant{} => { - impl Hash - for UpdateKeyDescriptionRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest{KeyId, Description, } => { - Hash::hash(KeyId, _state); - Hash::hash(Description, _state) - }, - } - } - } + }, + GrantOperation::DescribeKey{} => { - impl Default - for UpdateKeyDescriptionRequest { - fn default() -> UpdateKeyDescriptionRequest { - UpdateKeyDescriptionRequest::UpdateKeyDescriptionRequest { - KeyId: Default::default(), - Description: Default::default() - } - } - } + }, + GrantOperation::GenerateDataKeyPair{} => { - impl AsRef - for &UpdateKeyDescriptionRequest { - fn as_ref(&self) -> Self { - self - } - } + }, + GrantOperation::GenerateDataKeyPairWithoutPlaintext{} => { - #[derive(PartialEq, Clone)] - pub enum UpdatePrimaryRegionRequest { - UpdatePrimaryRegionRequest { - KeyId: Sequence, - PrimaryRegion: Sequence - } - } + }, + GrantOperation::GenerateMac{} => { - impl UpdatePrimaryRegionRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest{KeyId, PrimaryRegion, } => KeyId, - } - } - pub fn PrimaryRegion(&self) -> &Sequence { - match self { - UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest{KeyId, PrimaryRegion, } => PrimaryRegion, - } - } - } + }, + GrantOperation::VerifyMac{} => { - impl Debug - for UpdatePrimaryRegionRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + }, + GrantOperation::DeriveSharedSecret{} => { - impl DafnyPrint - for UpdatePrimaryRegionRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest{KeyId, PrimaryRegion, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.UpdatePrimaryRegionRequest.UpdatePrimaryRegionRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(PrimaryRegion, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + } + } + } - impl Eq - for UpdatePrimaryRegionRequest {} + impl Default + for GrantOperation { + fn default() -> GrantOperation { + GrantOperation::Decrypt {} + } + } - impl Hash - for UpdatePrimaryRegionRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest{KeyId, PrimaryRegion, } => { - Hash::hash(KeyId, _state); - Hash::hash(PrimaryRegion, _state) - }, - } - } - } - - impl Default - for UpdatePrimaryRegionRequest { - fn default() -> UpdatePrimaryRegionRequest { - UpdatePrimaryRegionRequest::UpdatePrimaryRegionRequest { - KeyId: Default::default(), - PrimaryRegion: Default::default() - } - } - } - - impl AsRef - for &UpdatePrimaryRegionRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum VerifyMacRequest { - VerifyMacRequest { - Message: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, - KeyId: Sequence, - MacAlgorithm: Rc, - Mac: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl VerifyMacRequest { - pub fn Message(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => Message, - } - } - pub fn KeyId(&self) -> &Sequence { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => KeyId, - } - } - pub fn MacAlgorithm(&self) -> &Rc { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => MacAlgorithm, - } - } - pub fn Mac(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => Mac, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for VerifyMacRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for GrantOperation { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for VerifyMacRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.VerifyMacRequest.VerifyMacRequest(")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Mac, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(458,3) + pub type GrantTokenList = Sequence>; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(462,3) + pub type GrantTokenType = Sequence; + + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(466,3) + #[derive(PartialEq, Clone)] + pub enum ImportKeyMaterialRequest { + ImportKeyMaterialRequest { + KeyId: Sequence, + ImportToken: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, + EncryptedKeyMaterial: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, + ValidTo: Arc>>, + ExpirationModel: Arc>> + } + } - impl Eq - for VerifyMacRequest {} + impl ImportKeyMaterialRequest { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => KeyId, + } + } + /// Returns a borrow of the field ImportToken + pub fn ImportToken(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ImportToken, + } + } + /// Returns a borrow of the field EncryptedKeyMaterial + pub fn EncryptedKeyMaterial(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => EncryptedKeyMaterial, + } + } + /// Returns a borrow of the field ValidTo + pub fn ValidTo(&self) -> &Arc>> { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ValidTo, + } + } + /// Returns a borrow of the field ExpirationModel + pub fn ExpirationModel(&self) -> &Arc>> { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => ExpirationModel, + } + } + } - impl Hash - for VerifyMacRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VerifyMacRequest::VerifyMacRequest{Message, KeyId, MacAlgorithm, Mac, GrantTokens, DryRun, } => { - Hash::hash(Message, _state); - Hash::hash(KeyId, _state); - Hash::hash(MacAlgorithm, _state); - Hash::hash(Mac, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for VerifyMacRequest { - fn default() -> VerifyMacRequest { - VerifyMacRequest::VerifyMacRequest { - Message: Default::default(), - KeyId: Default::default(), - MacAlgorithm: Default::default(), - Mac: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &VerifyMacRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum VerifyMacResponse { - VerifyMacResponse { - KeyId: Rc>>, - MacValid: Rc>, - MacAlgorithm: Rc>> - } - } - - impl VerifyMacResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - VerifyMacResponse::VerifyMacResponse{KeyId, MacValid, MacAlgorithm, } => KeyId, - } - } - pub fn MacValid(&self) -> &Rc> { - match self { - VerifyMacResponse::VerifyMacResponse{KeyId, MacValid, MacAlgorithm, } => MacValid, - } - } - pub fn MacAlgorithm(&self) -> &Rc>> { - match self { - VerifyMacResponse::VerifyMacResponse{KeyId, MacValid, MacAlgorithm, } => MacAlgorithm, - } - } - } - - impl Debug - for VerifyMacResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for ImportKeyMaterialRequest { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for VerifyMacResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VerifyMacResponse::VerifyMacResponse{KeyId, MacValid, MacAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.VerifyMacResponse.VerifyMacResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacValid, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MacAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for ImportKeyMaterialRequest { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ImportKeyMaterialRequest.ImportKeyMaterialRequest(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ImportToken, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptedKeyMaterial, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ValidTo, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpirationModel, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Eq - for VerifyMacResponse {} + impl Eq + for ImportKeyMaterialRequest {} + + impl Hash + for ImportKeyMaterialRequest { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportKeyMaterialRequest::ImportKeyMaterialRequest{KeyId, ImportToken, EncryptedKeyMaterial, ValidTo, ExpirationModel, } => { + Hash::hash(KeyId, _state); + Hash::hash(ImportToken, _state); + Hash::hash(EncryptedKeyMaterial, _state); + Hash::hash(ValidTo, _state); + Hash::hash(ExpirationModel, _state) + }, + } + } + } - impl Hash - for VerifyMacResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VerifyMacResponse::VerifyMacResponse{KeyId, MacValid, MacAlgorithm, } => { - Hash::hash(KeyId, _state); - Hash::hash(MacValid, _state); - Hash::hash(MacAlgorithm, _state) - }, - } - } - } - - impl Default - for VerifyMacResponse { - fn default() -> VerifyMacResponse { - VerifyMacResponse::VerifyMacResponse { - KeyId: Default::default(), - MacValid: Default::default(), - MacAlgorithm: Default::default() - } - } - } - - impl AsRef - for &VerifyMacResponse { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum VerifyRequest { - VerifyRequest { - KeyId: Sequence, - Message: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType, - MessageType: Rc>>, - Signature: crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType, - SigningAlgorithm: Rc, - GrantTokens: Rc>, - DryRun: Rc> - } - } - - impl VerifyRequest { - pub fn KeyId(&self) -> &Sequence { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => KeyId, - } - } - pub fn Message(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::PlaintextType { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => Message, - } - } - pub fn MessageType(&self) -> &Rc>> { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => MessageType, - } - } - pub fn Signature(&self) -> &crate::implementation_from_dafny::software::amazon::cryptography::services::kms::internaldafny::types::CiphertextType { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => Signature, - } - } - pub fn SigningAlgorithm(&self) -> &Rc { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => SigningAlgorithm, - } - } - pub fn GrantTokens(&self) -> &Rc> { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => GrantTokens, - } - } - pub fn DryRun(&self) -> &Rc> { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => DryRun, - } - } - } - - impl Debug - for VerifyRequest { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Default + for ImportKeyMaterialRequest { + fn default() -> ImportKeyMaterialRequest { + ImportKeyMaterialRequest::ImportKeyMaterialRequest { + KeyId: Default::default(), + ImportToken: Default::default(), + EncryptedKeyMaterial: Default::default(), + ValidTo: Default::default(), + ExpirationModel: Default::default() + } + } + } - impl DafnyPrint - for VerifyRequest { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.VerifyRequest.VerifyRequest(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Message, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(MessageType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(Signature, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(GrantTokens, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(DryRun, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl AsRef + for ImportKeyMaterialRequest { + fn as_ref(&self) -> &Self { + self + } + } - impl Eq - for VerifyRequest {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(473,3) + #[derive(PartialEq, Clone)] + pub enum ImportKeyMaterialResponse { + ImportKeyMaterialResponse {} + } - impl Hash - for VerifyRequest { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VerifyRequest::VerifyRequest{KeyId, Message, MessageType, Signature, SigningAlgorithm, GrantTokens, DryRun, } => { - Hash::hash(KeyId, _state); - Hash::hash(Message, _state); - Hash::hash(MessageType, _state); - Hash::hash(Signature, _state); - Hash::hash(SigningAlgorithm, _state); - Hash::hash(GrantTokens, _state); - Hash::hash(DryRun, _state) - }, - } - } - } - - impl Default - for VerifyRequest { - fn default() -> VerifyRequest { - VerifyRequest::VerifyRequest { - KeyId: Default::default(), - Message: Default::default(), - MessageType: Default::default(), - Signature: Default::default(), - SigningAlgorithm: Default::default(), - GrantTokens: Default::default(), - DryRun: Default::default() - } - } - } - - impl AsRef - for &VerifyRequest { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum VerifyResponse { - VerifyResponse { - KeyId: Rc>>, - SignatureValid: Rc>, - SigningAlgorithm: Rc>> - } - } - - impl VerifyResponse { - pub fn KeyId(&self) -> &Rc>> { - match self { - VerifyResponse::VerifyResponse{KeyId, SignatureValid, SigningAlgorithm, } => KeyId, - } - } - pub fn SignatureValid(&self) -> &Rc> { - match self { - VerifyResponse::VerifyResponse{KeyId, SignatureValid, SigningAlgorithm, } => SignatureValid, - } - } - pub fn SigningAlgorithm(&self) -> &Rc>> { - match self { - VerifyResponse::VerifyResponse{KeyId, SignatureValid, SigningAlgorithm, } => SigningAlgorithm, - } - } - } - - impl Debug - for VerifyResponse { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl ImportKeyMaterialResponse {} - impl DafnyPrint - for VerifyResponse { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - VerifyResponse::VerifyResponse{KeyId, SignatureValid, SigningAlgorithm, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.VerifyResponse.VerifyResponse(")?; - DafnyPrint::fmt_print(KeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SignatureValid, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(SigningAlgorithm, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for ImportKeyMaterialResponse { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for VerifyResponse {} + impl DafnyPrint + for ImportKeyMaterialResponse { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + ImportKeyMaterialResponse::ImportKeyMaterialResponse{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.ImportKeyMaterialResponse.ImportKeyMaterialResponse")?; + Ok(()) + }, + } + } + } - impl Hash - for VerifyResponse { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - VerifyResponse::VerifyResponse{KeyId, SignatureValid, SigningAlgorithm, } => { - Hash::hash(KeyId, _state); - Hash::hash(SignatureValid, _state); - Hash::hash(SigningAlgorithm, _state) - }, - } - } - } + impl ImportKeyMaterialResponse { + /// Enumerates all possible values of ImportKeyMaterialResponse + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(ImportKeyMaterialResponse::ImportKeyMaterialResponse {})].iter() + } + } - impl Default - for VerifyResponse { - fn default() -> VerifyResponse { - VerifyResponse::VerifyResponse { - KeyId: Default::default(), - SignatureValid: Default::default(), - SigningAlgorithm: Default::default() - } - } - } + impl Eq + for ImportKeyMaterialResponse {} - impl AsRef - for &VerifyResponse { - fn as_ref(&self) -> Self { - self - } - } + impl Hash + for ImportKeyMaterialResponse { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + ImportKeyMaterialResponse::ImportKeyMaterialResponse{} => { - #[derive(PartialEq, Clone)] - pub enum WrappingKeySpec { - RSA_2048 {}, - RSA_3072 {}, - RSA_4096 {}, - SM2 {} - } + }, + } + } + } - impl WrappingKeySpec {} + impl Default + for ImportKeyMaterialResponse { + fn default() -> ImportKeyMaterialResponse { + ImportKeyMaterialResponse::ImportKeyMaterialResponse {} + } + } - impl Debug - for WrappingKeySpec { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for ImportKeyMaterialResponse { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for WrappingKeySpec { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - WrappingKeySpec::RSA_2048{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.WrappingKeySpec.RSA__2048")?; - Ok(()) - }, - WrappingKeySpec::RSA_3072{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.WrappingKeySpec.RSA__3072")?; - Ok(()) - }, - WrappingKeySpec::RSA_4096{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.WrappingKeySpec.RSA__4096")?; - Ok(()) - }, - WrappingKeySpec::SM2{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.WrappingKeySpec.SM2")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(476,3) + #[derive(PartialEq, Clone)] + pub enum KeyAgreementAlgorithmSpec { + ECDH {} + } - impl WrappingKeySpec { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(WrappingKeySpec::RSA_2048 {}), Rc::new(WrappingKeySpec::RSA_3072 {}), Rc::new(WrappingKeySpec::RSA_4096 {}), Rc::new(WrappingKeySpec::SM2 {})].iter() - } - } + impl KeyAgreementAlgorithmSpec {} - impl Eq - for WrappingKeySpec {} + impl Debug + for KeyAgreementAlgorithmSpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Hash - for WrappingKeySpec { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - WrappingKeySpec::RSA_2048{} => { + impl DafnyPrint + for KeyAgreementAlgorithmSpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyAgreementAlgorithmSpec::ECDH{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyAgreementAlgorithmSpec.ECDH")?; + Ok(()) + }, + } + } + } - }, - WrappingKeySpec::RSA_3072{} => { + impl KeyAgreementAlgorithmSpec { + /// Enumerates all possible values of KeyAgreementAlgorithmSpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeyAgreementAlgorithmSpec::ECDH {})].iter() + } + } - }, - WrappingKeySpec::RSA_4096{} => { + impl Eq + for KeyAgreementAlgorithmSpec {} - }, - WrappingKeySpec::SM2{} => { + impl Hash + for KeyAgreementAlgorithmSpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyAgreementAlgorithmSpec::ECDH{} => { - }, - } - } - } + }, + } + } + } - impl Default - for WrappingKeySpec { - fn default() -> WrappingKeySpec { - WrappingKeySpec::RSA_2048 {} - } - } + impl Default + for KeyAgreementAlgorithmSpec { + fn default() -> KeyAgreementAlgorithmSpec { + KeyAgreementAlgorithmSpec::ECDH {} + } + } - impl AsRef - for &WrappingKeySpec { - fn as_ref(&self) -> Self { - self - } - } + impl AsRef + for KeyAgreementAlgorithmSpec { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum XksKeyConfigurationType { - XksKeyConfigurationType { - Id: Rc>> - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(479,3) + #[derive(PartialEq, Clone)] + pub enum KeyEncryptionMechanism { + RSAES_OAEP_SHA_256 {} + } - impl XksKeyConfigurationType { - pub fn Id(&self) -> &Rc>> { - match self { - XksKeyConfigurationType::XksKeyConfigurationType{Id, } => Id, - } - } - } + impl KeyEncryptionMechanism {} - impl Debug - for XksKeyConfigurationType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Debug + for KeyEncryptionMechanism { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl DafnyPrint - for XksKeyConfigurationType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - XksKeyConfigurationType::XksKeyConfigurationType{Id, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.XksKeyConfigurationType.XksKeyConfigurationType(")?; - DafnyPrint::fmt_print(Id, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl DafnyPrint + for KeyEncryptionMechanism { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyEncryptionMechanism::RSAES_OAEP_SHA_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyEncryptionMechanism.RSAES__OAEP__SHA__256")?; + Ok(()) + }, + } + } + } - impl Eq - for XksKeyConfigurationType {} + impl KeyEncryptionMechanism { + /// Enumerates all possible values of KeyEncryptionMechanism + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeyEncryptionMechanism::RSAES_OAEP_SHA_256 {})].iter() + } + } - impl Hash - for XksKeyConfigurationType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - XksKeyConfigurationType::XksKeyConfigurationType{Id, } => { - Hash::hash(Id, _state) - }, - } - } - } + impl Eq + for KeyEncryptionMechanism {} - impl Default - for XksKeyConfigurationType { - fn default() -> XksKeyConfigurationType { - XksKeyConfigurationType::XksKeyConfigurationType { - Id: Default::default() - } - } - } + impl Hash + for KeyEncryptionMechanism { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyEncryptionMechanism::RSAES_OAEP_SHA_256{} => { - impl AsRef - for &XksKeyConfigurationType { - fn as_ref(&self) -> Self { - self - } - } + }, + } + } + } - pub type XksKeyIdType = Sequence; + impl Default + for KeyEncryptionMechanism { + fn default() -> KeyEncryptionMechanism { + KeyEncryptionMechanism::RSAES_OAEP_SHA_256 {} + } + } - pub type XksProxyAuthenticationAccessKeyIdType = Sequence; + impl AsRef + for KeyEncryptionMechanism { + fn as_ref(&self) -> &Self { + self + } + } - #[derive(PartialEq, Clone)] - pub enum XksProxyAuthenticationCredentialType { - XksProxyAuthenticationCredentialType { - AccessKeyId: Sequence, - RawSecretAccessKey: Sequence - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(481,3) + pub type KeyIdType = Sequence; - impl XksProxyAuthenticationCredentialType { - pub fn AccessKeyId(&self) -> &Sequence { - match self { - XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType{AccessKeyId, RawSecretAccessKey, } => AccessKeyId, - } - } - pub fn RawSecretAccessKey(&self) -> &Sequence { - match self { - XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType{AccessKeyId, RawSecretAccessKey, } => RawSecretAccessKey, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(486,3) + #[derive(PartialEq, Clone)] + pub enum KeyListEntry { + KeyListEntry { + KeyId: Arc>>, + KeyArn: Arc>> + } + } - impl Debug - for XksProxyAuthenticationCredentialType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl KeyListEntry { + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Arc>> { + match self { + KeyListEntry::KeyListEntry{KeyId, KeyArn, } => KeyId, + } + } + /// Returns a borrow of the field KeyArn + pub fn KeyArn(&self) -> &Arc>> { + match self { + KeyListEntry::KeyListEntry{KeyId, KeyArn, } => KeyArn, + } + } + } - impl DafnyPrint - for XksProxyAuthenticationCredentialType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType{AccessKeyId, RawSecretAccessKey, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.XksProxyAuthenticationCredentialType.XksProxyAuthenticationCredentialType(")?; - DafnyPrint::fmt_print(AccessKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(RawSecretAccessKey, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Debug + for KeyListEntry { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Eq - for XksProxyAuthenticationCredentialType {} + impl DafnyPrint + for KeyListEntry { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyListEntry::KeyListEntry{KeyId, KeyArn, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyListEntry.KeyListEntry(")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyArn, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - impl Hash - for XksProxyAuthenticationCredentialType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType{AccessKeyId, RawSecretAccessKey, } => { - Hash::hash(AccessKeyId, _state); - Hash::hash(RawSecretAccessKey, _state) - }, - } - } - } - - impl Default - for XksProxyAuthenticationCredentialType { - fn default() -> XksProxyAuthenticationCredentialType { - XksProxyAuthenticationCredentialType::XksProxyAuthenticationCredentialType { - AccessKeyId: Default::default(), - RawSecretAccessKey: Default::default() - } - } - } - - impl AsRef - for &XksProxyAuthenticationCredentialType { - fn as_ref(&self) -> Self { - self - } - } - - pub type XksProxyAuthenticationRawSecretAccessKeyType = Sequence; - - #[derive(PartialEq, Clone)] - pub enum XksProxyConfigurationType { - XksProxyConfigurationType { - Connectivity: Rc>>, - AccessKeyId: Rc>>, - UriEndpoint: Rc>>, - UriPath: Rc>>, - VpcEndpointServiceName: Rc>> - } - } - - impl XksProxyConfigurationType { - pub fn Connectivity(&self) -> &Rc>> { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => Connectivity, - } - } - pub fn AccessKeyId(&self) -> &Rc>> { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => AccessKeyId, - } - } - pub fn UriEndpoint(&self) -> &Rc>> { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => UriEndpoint, - } - } - pub fn UriPath(&self) -> &Rc>> { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => UriPath, - } - } - pub fn VpcEndpointServiceName(&self) -> &Rc>> { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => VpcEndpointServiceName, - } - } - } - - impl Debug - for XksProxyConfigurationType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for KeyListEntry {} + + impl Hash + for KeyListEntry { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyListEntry::KeyListEntry{KeyId, KeyArn, } => { + Hash::hash(KeyId, _state); + Hash::hash(KeyArn, _state) + }, + } + } + } - impl DafnyPrint - for XksProxyConfigurationType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.XksProxyConfigurationType.XksProxyConfigurationType(")?; - DafnyPrint::fmt_print(Connectivity, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(AccessKeyId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UriEndpoint, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(UriPath, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(VpcEndpointServiceName, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + impl Default + for KeyListEntry { + fn default() -> KeyListEntry { + KeyListEntry::KeyListEntry { + KeyId: Default::default(), + KeyArn: Default::default() + } + } + } - impl Eq - for XksProxyConfigurationType {} + impl AsRef + for KeyListEntry { + fn as_ref(&self) -> &Self { + self + } + } - impl Hash - for XksProxyConfigurationType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - XksProxyConfigurationType::XksProxyConfigurationType{Connectivity, AccessKeyId, UriEndpoint, UriPath, VpcEndpointServiceName, } => { - Hash::hash(Connectivity, _state); - Hash::hash(AccessKeyId, _state); - Hash::hash(UriEndpoint, _state); - Hash::hash(UriPath, _state); - Hash::hash(VpcEndpointServiceName, _state) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(490,3) + #[derive(PartialEq, Clone)] + pub enum KeyManagerType { + AWS {}, + CUSTOMER {} + } - impl Default - for XksProxyConfigurationType { - fn default() -> XksProxyConfigurationType { - XksProxyConfigurationType::XksProxyConfigurationType { - Connectivity: Default::default(), - AccessKeyId: Default::default(), - UriEndpoint: Default::default(), - UriPath: Default::default(), - VpcEndpointServiceName: Default::default() - } - } - } + impl KeyManagerType {} - impl AsRef - for &XksProxyConfigurationType { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for KeyManagerType { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - #[derive(PartialEq, Clone)] - pub enum XksProxyConnectivityType { - PUBLIC_ENDPOINT {}, - VPC_ENDPOINT_SERVICE {} - } + impl DafnyPrint + for KeyManagerType { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyManagerType::AWS{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyManagerType.AWS")?; + Ok(()) + }, + KeyManagerType::CUSTOMER{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyManagerType.CUSTOMER")?; + Ok(()) + }, + } + } + } - impl XksProxyConnectivityType {} + impl KeyManagerType { + /// Enumerates all possible values of KeyManagerType + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeyManagerType::AWS {}), Arc::new(KeyManagerType::CUSTOMER {})].iter() + } + } - impl Debug - for XksProxyConnectivityType { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl Eq + for KeyManagerType {} - impl DafnyPrint - for XksProxyConnectivityType { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - XksProxyConnectivityType::PUBLIC_ENDPOINT{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.XksProxyConnectivityType.PUBLIC__ENDPOINT")?; - Ok(()) - }, - XksProxyConnectivityType::VPC_ENDPOINT_SERVICE{} => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.XksProxyConnectivityType.VPC__ENDPOINT__SERVICE")?; - Ok(()) - }, - } - } - } + impl Hash + for KeyManagerType { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyManagerType::AWS{} => { - impl XksProxyConnectivityType { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(XksProxyConnectivityType::PUBLIC_ENDPOINT {}), Rc::new(XksProxyConnectivityType::VPC_ENDPOINT_SERVICE {})].iter() - } - } + }, + KeyManagerType::CUSTOMER{} => { - impl Eq - for XksProxyConnectivityType {} + }, + } + } + } - impl Hash - for XksProxyConnectivityType { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - XksProxyConnectivityType::PUBLIC_ENDPOINT{} => { + impl Default + for KeyManagerType { + fn default() -> KeyManagerType { + KeyManagerType::AWS {} + } + } - }, - XksProxyConnectivityType::VPC_ENDPOINT_SERVICE{} => { + impl AsRef + for KeyManagerType { + fn as_ref(&self) -> &Self { + self + } + } - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(493,3) + #[derive(PartialEq, Clone)] + pub enum KeyMetadata { + KeyMetadata { + AWSAccountId: Arc>>, + KeyId: Sequence, + Arn: Arc>>, + CreationDate: Arc>>, + Enabled: Arc>, + Description: Arc>>, + KeyUsage: Arc>>, + KeyState: Arc>>, + DeletionDate: Arc>>, + ValidTo: Arc>>, + Origin: Arc>>, + CustomKeyStoreId: Arc>>, + CloudHsmClusterId: Arc>>, + ExpirationModel: Arc>>, + KeyManager: Arc>>, + CustomerMasterKeySpec: Arc>>, + KeySpec: Arc>>, + EncryptionAlgorithms: Arc>>>, + SigningAlgorithms: Arc>>>, + KeyAgreementAlgorithms: Arc>>>, + MultiRegion: Arc>, + MultiRegionConfiguration: Arc>>, + PendingDeletionWindowInDays: Arc>, + MacAlgorithms: Arc>>>, + XksKeyConfiguration: Arc>> + } + } - impl Default - for XksProxyConnectivityType { - fn default() -> XksProxyConnectivityType { - XksProxyConnectivityType::PUBLIC_ENDPOINT {} - } - } + impl KeyMetadata { + /// Returns a borrow of the field AWSAccountId + pub fn AWSAccountId(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => AWSAccountId, + } + } + /// Returns a borrow of the field KeyId + pub fn KeyId(&self) -> &Sequence { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyId, + } + } + /// Returns a borrow of the field Arn + pub fn Arn(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Arn, + } + } + /// Returns a borrow of the field CreationDate + pub fn CreationDate(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CreationDate, + } + } + /// Returns a borrow of the field Enabled + pub fn Enabled(&self) -> &Arc> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Enabled, + } + } + /// Returns a borrow of the field Description + pub fn Description(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Description, + } + } + /// Returns a borrow of the field KeyUsage + pub fn KeyUsage(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyUsage, + } + } + /// Returns a borrow of the field KeyState + pub fn KeyState(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyState, + } + } + /// Returns a borrow of the field DeletionDate + pub fn DeletionDate(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => DeletionDate, + } + } + /// Returns a borrow of the field ValidTo + pub fn ValidTo(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => ValidTo, + } + } + /// Returns a borrow of the field Origin + pub fn Origin(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => Origin, + } + } + /// Returns a borrow of the field CustomKeyStoreId + pub fn CustomKeyStoreId(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CustomKeyStoreId, + } + } + /// Returns a borrow of the field CloudHsmClusterId + pub fn CloudHsmClusterId(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CloudHsmClusterId, + } + } + /// Returns a borrow of the field ExpirationModel + pub fn ExpirationModel(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => ExpirationModel, + } + } + /// Returns a borrow of the field KeyManager + pub fn KeyManager(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyManager, + } + } + /// Returns a borrow of the field CustomerMasterKeySpec + pub fn CustomerMasterKeySpec(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => CustomerMasterKeySpec, + } + } + /// Returns a borrow of the field KeySpec + pub fn KeySpec(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeySpec, + } + } + /// Returns a borrow of the field EncryptionAlgorithms + pub fn EncryptionAlgorithms(&self) -> &Arc>>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => EncryptionAlgorithms, + } + } + /// Returns a borrow of the field SigningAlgorithms + pub fn SigningAlgorithms(&self) -> &Arc>>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => SigningAlgorithms, + } + } + /// Returns a borrow of the field KeyAgreementAlgorithms + pub fn KeyAgreementAlgorithms(&self) -> &Arc>>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => KeyAgreementAlgorithms, + } + } + /// Returns a borrow of the field MultiRegion + pub fn MultiRegion(&self) -> &Arc> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MultiRegion, + } + } + /// Returns a borrow of the field MultiRegionConfiguration + pub fn MultiRegionConfiguration(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MultiRegionConfiguration, + } + } + /// Returns a borrow of the field PendingDeletionWindowInDays + pub fn PendingDeletionWindowInDays(&self) -> &Arc> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => PendingDeletionWindowInDays, + } + } + /// Returns a borrow of the field MacAlgorithms + pub fn MacAlgorithms(&self) -> &Arc>>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => MacAlgorithms, + } + } + /// Returns a borrow of the field XksKeyConfiguration + pub fn XksKeyConfiguration(&self) -> &Arc>> { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => XksKeyConfiguration, + } + } + } - impl AsRef - for &XksProxyConnectivityType { - fn as_ref(&self) -> Self { - self - } - } + impl Debug + for KeyMetadata { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - pub type XksProxyUriEndpointType = Sequence; + impl DafnyPrint + for KeyMetadata { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyMetadata.KeyMetadata(")?; + DafnyPrint::fmt_print(AWSAccountId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Arn, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CreationDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Enabled, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Description, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyUsage, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyState, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(DeletionDate, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ValidTo, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(Origin, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomKeyStoreId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CloudHsmClusterId, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(ExpirationModel, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyManager, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(CustomerMasterKeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeySpec, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(EncryptionAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(SigningAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(KeyAgreementAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MultiRegion, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MultiRegionConfiguration, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(PendingDeletionWindowInDays, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(MacAlgorithms, _formatter, false)?; + write!(_formatter, ", ")?; + DafnyPrint::fmt_print(XksKeyConfiguration, _formatter, false)?; + write!(_formatter, ")")?; + Ok(()) + }, + } + } + } - pub type XksProxyUriPathType = Sequence; + impl Eq + for KeyMetadata {} + + impl Hash + for KeyMetadata { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyMetadata::KeyMetadata{AWSAccountId, KeyId, Arn, CreationDate, Enabled, Description, KeyUsage, KeyState, DeletionDate, ValidTo, Origin, CustomKeyStoreId, CloudHsmClusterId, ExpirationModel, KeyManager, CustomerMasterKeySpec, KeySpec, EncryptionAlgorithms, SigningAlgorithms, KeyAgreementAlgorithms, MultiRegion, MultiRegionConfiguration, PendingDeletionWindowInDays, MacAlgorithms, XksKeyConfiguration, } => { + Hash::hash(AWSAccountId, _state); + Hash::hash(KeyId, _state); + Hash::hash(Arn, _state); + Hash::hash(CreationDate, _state); + Hash::hash(Enabled, _state); + Hash::hash(Description, _state); + Hash::hash(KeyUsage, _state); + Hash::hash(KeyState, _state); + Hash::hash(DeletionDate, _state); + Hash::hash(ValidTo, _state); + Hash::hash(Origin, _state); + Hash::hash(CustomKeyStoreId, _state); + Hash::hash(CloudHsmClusterId, _state); + Hash::hash(ExpirationModel, _state); + Hash::hash(KeyManager, _state); + Hash::hash(CustomerMasterKeySpec, _state); + Hash::hash(KeySpec, _state); + Hash::hash(EncryptionAlgorithms, _state); + Hash::hash(SigningAlgorithms, _state); + Hash::hash(KeyAgreementAlgorithms, _state); + Hash::hash(MultiRegion, _state); + Hash::hash(MultiRegionConfiguration, _state); + Hash::hash(PendingDeletionWindowInDays, _state); + Hash::hash(MacAlgorithms, _state); + Hash::hash(XksKeyConfiguration, _state) + }, + } + } + } - pub type XksProxyVpcEndpointServiceNameType = Sequence; + impl Default + for KeyMetadata { + fn default() -> KeyMetadata { + KeyMetadata::KeyMetadata { + AWSAccountId: Default::default(), + KeyId: Default::default(), + Arn: Default::default(), + CreationDate: Default::default(), + Enabled: Default::default(), + Description: Default::default(), + KeyUsage: Default::default(), + KeyState: Default::default(), + DeletionDate: Default::default(), + ValidTo: Default::default(), + Origin: Default::default(), + CustomKeyStoreId: Default::default(), + CloudHsmClusterId: Default::default(), + ExpirationModel: Default::default(), + KeyManager: Default::default(), + CustomerMasterKeySpec: Default::default(), + KeySpec: Default::default(), + EncryptionAlgorithms: Default::default(), + SigningAlgorithms: Default::default(), + KeyAgreementAlgorithms: Default::default(), + MultiRegion: Default::default(), + MultiRegionConfiguration: Default::default(), + PendingDeletionWindowInDays: Default::default(), + MacAlgorithms: Default::default(), + XksKeyConfiguration: Default::default() + } + } + } - #[derive(PartialEq, Clone)] - pub enum Error { - AlreadyExistsException { - message: Rc>> - }, - CloudHsmClusterInUseException { - message: Rc>> - }, - CloudHsmClusterInvalidConfigurationException { - message: Rc>> - }, - CloudHsmClusterNotActiveException { - message: Rc>> - }, - CloudHsmClusterNotFoundException { - message: Rc>> - }, - CloudHsmClusterNotRelatedException { - message: Rc>> - }, - ConflictException { - message: Rc>> - }, - CustomKeyStoreHasCMKsException { - message: Rc>> - }, - CustomKeyStoreInvalidStateException { - message: Rc>> - }, - CustomKeyStoreNameInUseException { - message: Rc>> - }, - CustomKeyStoreNotFoundException { - message: Rc>> - }, - DependencyTimeoutException { - message: Rc>> - }, - DisabledException { - message: Rc>> - }, - DryRunOperationException { - message: Rc>> - }, - ExpiredImportTokenException { - message: Rc>> - }, - IncorrectKeyException { - message: Rc>> - }, - IncorrectKeyMaterialException { - message: Rc>> - }, - IncorrectTrustAnchorException { - message: Rc>> - }, - InvalidAliasNameException { - message: Rc>> - }, - InvalidArnException { - message: Rc>> - }, - InvalidCiphertextException { - message: Rc>> - }, - InvalidGrantIdException { - message: Rc>> - }, - InvalidGrantTokenException { - message: Rc>> - }, - InvalidImportTokenException { - message: Rc>> - }, - InvalidKeyUsageException { - message: Rc>> - }, - InvalidMarkerException { - message: Rc>> - }, - KeyUnavailableException { - message: Rc>> - }, - KMSInternalException { - message: Rc>> - }, - KMSInvalidMacException { - message: Rc>> - }, - KMSInvalidSignatureException { - message: Rc>> - }, - KMSInvalidStateException { - message: Rc>> - }, - LimitExceededException { - message: Rc>> - }, - MalformedPolicyDocumentException { - message: Rc>> - }, - NotFoundException { - message: Rc>> - }, - TagException { - message: Rc>> - }, - UnsupportedOperationException { - message: Rc>> - }, - XksKeyAlreadyInUseException { - message: Rc>> - }, - XksKeyInvalidConfigurationException { - message: Rc>> - }, - XksKeyNotFoundException { - message: Rc>> - }, - XksProxyIncorrectAuthenticationCredentialException { - message: Rc>> - }, - XksProxyInvalidConfigurationException { - message: Rc>> - }, - XksProxyInvalidResponseException { - message: Rc>> - }, - XksProxyUriEndpointInUseException { - message: Rc>> - }, - XksProxyUriInUseException { - message: Rc>> - }, - XksProxyUriUnreachableException { - message: Rc>> - }, - XksProxyVpcEndpointServiceInUseException { - message: Rc>> - }, - XksProxyVpcEndpointServiceInvalidConfigurationException { - message: Rc>> - }, - XksProxyVpcEndpointServiceNotFoundException { - message: Rc>> - }, - Opaque { - obj: Object - }, - OpaqueWithText { - obj: Object, - objMessage: Sequence - } - } - - impl Error { - pub fn message(&self) -> &Rc>> { - match self { - Error::AlreadyExistsException{message, } => message, - Error::CloudHsmClusterInUseException{message, } => message, - Error::CloudHsmClusterInvalidConfigurationException{message, } => message, - Error::CloudHsmClusterNotActiveException{message, } => message, - Error::CloudHsmClusterNotFoundException{message, } => message, - Error::CloudHsmClusterNotRelatedException{message, } => message, - Error::ConflictException{message, } => message, - Error::CustomKeyStoreHasCMKsException{message, } => message, - Error::CustomKeyStoreInvalidStateException{message, } => message, - Error::CustomKeyStoreNameInUseException{message, } => message, - Error::CustomKeyStoreNotFoundException{message, } => message, - Error::DependencyTimeoutException{message, } => message, - Error::DisabledException{message, } => message, - Error::DryRunOperationException{message, } => message, - Error::ExpiredImportTokenException{message, } => message, - Error::IncorrectKeyException{message, } => message, - Error::IncorrectKeyMaterialException{message, } => message, - Error::IncorrectTrustAnchorException{message, } => message, - Error::InvalidAliasNameException{message, } => message, - Error::InvalidArnException{message, } => message, - Error::InvalidCiphertextException{message, } => message, - Error::InvalidGrantIdException{message, } => message, - Error::InvalidGrantTokenException{message, } => message, - Error::InvalidImportTokenException{message, } => message, - Error::InvalidKeyUsageException{message, } => message, - Error::InvalidMarkerException{message, } => message, - Error::KeyUnavailableException{message, } => message, - Error::KMSInternalException{message, } => message, - Error::KMSInvalidMacException{message, } => message, - Error::KMSInvalidSignatureException{message, } => message, - Error::KMSInvalidStateException{message, } => message, - Error::LimitExceededException{message, } => message, - Error::MalformedPolicyDocumentException{message, } => message, - Error::NotFoundException{message, } => message, - Error::TagException{message, } => message, - Error::UnsupportedOperationException{message, } => message, - Error::XksKeyAlreadyInUseException{message, } => message, - Error::XksKeyInvalidConfigurationException{message, } => message, - Error::XksKeyNotFoundException{message, } => message, - Error::XksProxyIncorrectAuthenticationCredentialException{message, } => message, - Error::XksProxyInvalidConfigurationException{message, } => message, - Error::XksProxyInvalidResponseException{message, } => message, - Error::XksProxyUriEndpointInUseException{message, } => message, - Error::XksProxyUriInUseException{message, } => message, - Error::XksProxyUriUnreachableException{message, } => message, - Error::XksProxyVpcEndpointServiceInUseException{message, } => message, - Error::XksProxyVpcEndpointServiceInvalidConfigurationException{message, } => message, - Error::XksProxyVpcEndpointServiceNotFoundException{message, } => message, - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => panic!("field does not exist on this variant"), - } - } - pub fn obj(&self) -> &Object { - match self { - Error::AlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterInUseException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotActiveException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotRelatedException{message, } => panic!("field does not exist on this variant"), - Error::ConflictException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreHasCMKsException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreInvalidStateException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreNameInUseException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::DependencyTimeoutException{message, } => panic!("field does not exist on this variant"), - Error::DisabledException{message, } => panic!("field does not exist on this variant"), - Error::DryRunOperationException{message, } => panic!("field does not exist on this variant"), - Error::ExpiredImportTokenException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectKeyException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectKeyMaterialException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectTrustAnchorException{message, } => panic!("field does not exist on this variant"), - Error::InvalidAliasNameException{message, } => panic!("field does not exist on this variant"), - Error::InvalidArnException{message, } => panic!("field does not exist on this variant"), - Error::InvalidCiphertextException{message, } => panic!("field does not exist on this variant"), - Error::InvalidGrantIdException{message, } => panic!("field does not exist on this variant"), - Error::InvalidGrantTokenException{message, } => panic!("field does not exist on this variant"), - Error::InvalidImportTokenException{message, } => panic!("field does not exist on this variant"), - Error::InvalidKeyUsageException{message, } => panic!("field does not exist on this variant"), - Error::InvalidMarkerException{message, } => panic!("field does not exist on this variant"), - Error::KeyUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::KMSInternalException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidMacException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidSignatureException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidStateException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::MalformedPolicyDocumentException{message, } => panic!("field does not exist on this variant"), - Error::NotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TagException{message, } => panic!("field does not exist on this variant"), - Error::UnsupportedOperationException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyAlreadyInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyIncorrectAuthenticationCredentialException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyInvalidResponseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriEndpointInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriUnreachableException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => obj, - Error::OpaqueWithText{obj, objMessage, } => obj, - } - } - pub fn objMessage(&self) -> &Sequence { - match self { - Error::AlreadyExistsException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterInUseException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotActiveException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::CloudHsmClusterNotRelatedException{message, } => panic!("field does not exist on this variant"), - Error::ConflictException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreHasCMKsException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreInvalidStateException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreNameInUseException{message, } => panic!("field does not exist on this variant"), - Error::CustomKeyStoreNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::DependencyTimeoutException{message, } => panic!("field does not exist on this variant"), - Error::DisabledException{message, } => panic!("field does not exist on this variant"), - Error::DryRunOperationException{message, } => panic!("field does not exist on this variant"), - Error::ExpiredImportTokenException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectKeyException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectKeyMaterialException{message, } => panic!("field does not exist on this variant"), - Error::IncorrectTrustAnchorException{message, } => panic!("field does not exist on this variant"), - Error::InvalidAliasNameException{message, } => panic!("field does not exist on this variant"), - Error::InvalidArnException{message, } => panic!("field does not exist on this variant"), - Error::InvalidCiphertextException{message, } => panic!("field does not exist on this variant"), - Error::InvalidGrantIdException{message, } => panic!("field does not exist on this variant"), - Error::InvalidGrantTokenException{message, } => panic!("field does not exist on this variant"), - Error::InvalidImportTokenException{message, } => panic!("field does not exist on this variant"), - Error::InvalidKeyUsageException{message, } => panic!("field does not exist on this variant"), - Error::InvalidMarkerException{message, } => panic!("field does not exist on this variant"), - Error::KeyUnavailableException{message, } => panic!("field does not exist on this variant"), - Error::KMSInternalException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidMacException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidSignatureException{message, } => panic!("field does not exist on this variant"), - Error::KMSInvalidStateException{message, } => panic!("field does not exist on this variant"), - Error::LimitExceededException{message, } => panic!("field does not exist on this variant"), - Error::MalformedPolicyDocumentException{message, } => panic!("field does not exist on this variant"), - Error::NotFoundException{message, } => panic!("field does not exist on this variant"), - Error::TagException{message, } => panic!("field does not exist on this variant"), - Error::UnsupportedOperationException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyAlreadyInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksKeyNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyIncorrectAuthenticationCredentialException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyInvalidResponseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriEndpointInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyUriUnreachableException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceInUseException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceInvalidConfigurationException{message, } => panic!("field does not exist on this variant"), - Error::XksProxyVpcEndpointServiceNotFoundException{message, } => panic!("field does not exist on this variant"), - Error::Opaque{obj, } => panic!("field does not exist on this variant"), - Error::OpaqueWithText{obj, objMessage, } => objMessage, - } - } - } - - impl Debug - for Error { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for KeyMetadata { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for Error { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Error::AlreadyExistsException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.AlreadyExistsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CloudHsmClusterInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CloudHsmClusterInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CloudHsmClusterInvalidConfigurationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CloudHsmClusterInvalidConfigurationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CloudHsmClusterNotActiveException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CloudHsmClusterNotActiveException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CloudHsmClusterNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CloudHsmClusterNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CloudHsmClusterNotRelatedException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CloudHsmClusterNotRelatedException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ConflictException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.ConflictException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CustomKeyStoreHasCMKsException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CustomKeyStoreHasCMKsException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CustomKeyStoreInvalidStateException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CustomKeyStoreInvalidStateException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CustomKeyStoreNameInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CustomKeyStoreNameInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::CustomKeyStoreNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.CustomKeyStoreNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::DependencyTimeoutException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.DependencyTimeoutException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::DisabledException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.DisabledException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::DryRunOperationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.DryRunOperationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::ExpiredImportTokenException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.ExpiredImportTokenException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::IncorrectKeyException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.IncorrectKeyException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::IncorrectKeyMaterialException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.IncorrectKeyMaterialException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::IncorrectTrustAnchorException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.IncorrectTrustAnchorException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidAliasNameException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidAliasNameException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidArnException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidArnException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidCiphertextException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidCiphertextException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidGrantIdException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidGrantIdException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidGrantTokenException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidGrantTokenException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidImportTokenException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidImportTokenException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidKeyUsageException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidKeyUsageException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::InvalidMarkerException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.InvalidMarkerException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::KeyUnavailableException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.KeyUnavailableException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::KMSInternalException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.KMSInternalException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::KMSInvalidMacException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.KMSInvalidMacException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::KMSInvalidSignatureException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.KMSInvalidSignatureException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::KMSInvalidStateException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.KMSInvalidStateException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::LimitExceededException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.LimitExceededException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::MalformedPolicyDocumentException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.MalformedPolicyDocumentException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::NotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.NotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::TagException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.TagException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::UnsupportedOperationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.UnsupportedOperationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksKeyAlreadyInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksKeyAlreadyInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksKeyInvalidConfigurationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksKeyInvalidConfigurationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksKeyNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksKeyNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyIncorrectAuthenticationCredentialException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyIncorrectAuthenticationCredentialException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyInvalidConfigurationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyInvalidConfigurationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyInvalidResponseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyInvalidResponseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyUriEndpointInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyUriEndpointInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyUriInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyUriInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyUriUnreachableException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyUriUnreachableException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyVpcEndpointServiceInUseException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyVpcEndpointServiceInUseException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyVpcEndpointServiceInvalidConfigurationException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyVpcEndpointServiceInvalidConfigurationException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::XksProxyVpcEndpointServiceNotFoundException{message, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.XksProxyVpcEndpointServiceNotFoundException(")?; - DafnyPrint::fmt_print(message, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::Opaque{obj, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.Opaque(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - Error::OpaqueWithText{obj, objMessage, } => { - write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.Error.OpaqueWithText(")?; - DafnyPrint::fmt_print(obj, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(objMessage, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for Error {} + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(520,3) + #[derive(PartialEq, Clone)] + pub enum KeySpec { + RSA_2048 {}, + RSA_3072 {}, + RSA_4096 {}, + ECC_NIST_P256 {}, + ECC_NIST_P384 {}, + ECC_NIST_P521 {}, + ECC_SECG_P256K1 {}, + SYMMETRIC_DEFAULT {}, + HMAC_224 {}, + HMAC_256 {}, + HMAC_384 {}, + HMAC_512 {}, + SM2 {} + } - impl Hash - for Error { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Error::AlreadyExistsException{message, } => { - Hash::hash(message, _state) - }, - Error::CloudHsmClusterInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::CloudHsmClusterInvalidConfigurationException{message, } => { - Hash::hash(message, _state) - }, - Error::CloudHsmClusterNotActiveException{message, } => { - Hash::hash(message, _state) - }, - Error::CloudHsmClusterNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::CloudHsmClusterNotRelatedException{message, } => { - Hash::hash(message, _state) - }, - Error::ConflictException{message, } => { - Hash::hash(message, _state) - }, - Error::CustomKeyStoreHasCMKsException{message, } => { - Hash::hash(message, _state) - }, - Error::CustomKeyStoreInvalidStateException{message, } => { - Hash::hash(message, _state) - }, - Error::CustomKeyStoreNameInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::CustomKeyStoreNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::DependencyTimeoutException{message, } => { - Hash::hash(message, _state) - }, - Error::DisabledException{message, } => { - Hash::hash(message, _state) - }, - Error::DryRunOperationException{message, } => { - Hash::hash(message, _state) - }, - Error::ExpiredImportTokenException{message, } => { - Hash::hash(message, _state) - }, - Error::IncorrectKeyException{message, } => { - Hash::hash(message, _state) - }, - Error::IncorrectKeyMaterialException{message, } => { - Hash::hash(message, _state) - }, - Error::IncorrectTrustAnchorException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidAliasNameException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidArnException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidCiphertextException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidGrantIdException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidGrantTokenException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidImportTokenException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidKeyUsageException{message, } => { - Hash::hash(message, _state) - }, - Error::InvalidMarkerException{message, } => { - Hash::hash(message, _state) - }, - Error::KeyUnavailableException{message, } => { - Hash::hash(message, _state) - }, - Error::KMSInternalException{message, } => { - Hash::hash(message, _state) - }, - Error::KMSInvalidMacException{message, } => { - Hash::hash(message, _state) - }, - Error::KMSInvalidSignatureException{message, } => { - Hash::hash(message, _state) - }, - Error::KMSInvalidStateException{message, } => { - Hash::hash(message, _state) - }, - Error::LimitExceededException{message, } => { - Hash::hash(message, _state) - }, - Error::MalformedPolicyDocumentException{message, } => { - Hash::hash(message, _state) - }, - Error::NotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::TagException{message, } => { - Hash::hash(message, _state) - }, - Error::UnsupportedOperationException{message, } => { - Hash::hash(message, _state) - }, - Error::XksKeyAlreadyInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::XksKeyInvalidConfigurationException{message, } => { - Hash::hash(message, _state) - }, - Error::XksKeyNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyIncorrectAuthenticationCredentialException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyInvalidConfigurationException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyInvalidResponseException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyUriEndpointInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyUriInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyUriUnreachableException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyVpcEndpointServiceInUseException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyVpcEndpointServiceInvalidConfigurationException{message, } => { - Hash::hash(message, _state) - }, - Error::XksProxyVpcEndpointServiceNotFoundException{message, } => { - Hash::hash(message, _state) - }, - Error::Opaque{obj, } => { - Hash::hash(obj, _state) - }, - Error::OpaqueWithText{obj, objMessage, } => { - Hash::hash(obj, _state); - Hash::hash(objMessage, _state) - }, - } - } - } + impl KeySpec {} - impl Default - for Error { - fn default() -> Error { - Error::AlreadyExistsException { - message: Default::default() - } - } - } + impl Debug + for KeySpec { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl AsRef - for &Error { - fn as_ref(&self) -> Self { - self - } - } + impl DafnyPrint + for KeySpec { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeySpec::RSA_2048{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__2048")?; + Ok(()) + }, + KeySpec::RSA_3072{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__3072")?; + Ok(()) + }, + KeySpec::RSA_4096{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.RSA__4096")?; + Ok(()) + }, + KeySpec::ECC_NIST_P256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P256")?; + Ok(()) + }, + KeySpec::ECC_NIST_P384{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P384")?; + Ok(()) + }, + KeySpec::ECC_NIST_P521{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__NIST__P521")?; + Ok(()) + }, + KeySpec::ECC_SECG_P256K1{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.ECC__SECG__P256K1")?; + Ok(()) + }, + KeySpec::SYMMETRIC_DEFAULT{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.SYMMETRIC__DEFAULT")?; + Ok(()) + }, + KeySpec::HMAC_224{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__224")?; + Ok(()) + }, + KeySpec::HMAC_256{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__256")?; + Ok(()) + }, + KeySpec::HMAC_384{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__384")?; + Ok(()) + }, + KeySpec::HMAC_512{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.HMAC__512")?; + Ok(()) + }, + KeySpec::SM2{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeySpec.SM2")?; + Ok(()) + }, + } + } + } - pub type OpaqueError = Rc; + impl KeySpec { + /// Enumerates all possible values of KeySpec + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeySpec::RSA_2048 {}), Arc::new(KeySpec::RSA_3072 {}), Arc::new(KeySpec::RSA_4096 {}), Arc::new(KeySpec::ECC_NIST_P256 {}), Arc::new(KeySpec::ECC_NIST_P384 {}), Arc::new(KeySpec::ECC_NIST_P521 {}), Arc::new(KeySpec::ECC_SECG_P256K1 {}), Arc::new(KeySpec::SYMMETRIC_DEFAULT {}), Arc::new(KeySpec::HMAC_224 {}), Arc::new(KeySpec::HMAC_256 {}), Arc::new(KeySpec::HMAC_384 {}), Arc::new(KeySpec::HMAC_512 {}), Arc::new(KeySpec::SM2 {})].iter() + } + } - pub type DummySubsetType = DafnyInt; + impl Eq + for KeySpec {} - pub fn r#__init_DummySubsetType() -> DafnyInt { - int!(1) - } - } - } - } - } + impl Hash + for KeySpec { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeySpec::RSA_2048{} => { - pub mod internaldafny { - pub mod StormTrackingCMC { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::GetCacheEntryOutput; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error; - pub use crate::implementation_from_dafny::_dafny_externs::software::amazon::cryptography::internaldafny::StormTrackingCMC::*; + }, + KeySpec::RSA_3072{} => { - pub struct _default {} + }, + KeySpec::RSA_4096{} => { - impl _default { - pub fn CreateGetCacheEntrySuccess(output: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Success { - value: output.clone() - }) - } - pub fn CreateGetCacheEntryFailure(error: &Rc) -> Rc, Rc>> { - Rc::new(Result::, Rc>::Failure { - error: error.clone() - }) - } - } - } + }, + KeySpec::ECC_NIST_P256{} => { - pub mod SynchronizedLocalCMC { - pub use crate::implementation_from_dafny::_dafny_externs::software::amazon::cryptography::internaldafny::SynchronizedLocalCMC::*; - } - } - } - } -} -pub mod r#_AttributeResolver_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use ::dafny_runtime::map; - pub use crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::TableConfig; - pub use ::dafny_runtime::Map; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - - pub struct _default {} - - impl _default { - pub fn Resolve(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - if !config.tableEncryptionConfigs().contains(input.TableName()) || matches!(config.tableEncryptionConfigs().get(input.TableName()).search().as_ref(), None{ .. }) { - output = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: Rc::new(ResolveAttributesOutput::ResolveAttributesOutput { - VirtualFields: map![], - CompoundBeacons: map![] - }) - })); - return output.read(); - } else { - let mut tableConfig: Rc = config.tableEncryptionConfigs().get(input.TableName()); - let mut valueOrError0 = MaybePlacebo::, Sequence>, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Sequence>, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoDbMiddlewareSupport_Compile::_default::GetVirtualFields(tableConfig.search().value(), input.Item(), input.Version())); - valueOrError0 = MaybePlacebo::from(_out0.read()); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut vf: Map, Sequence> = valueOrError0.read().Extract(); - let mut valueOrError1 = MaybePlacebo::, Sequence>, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Sequence>, Rc>>>::new(); - _out1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoDbMiddlewareSupport_Compile::_default::GetCompoundBeacons(tableConfig.search().value(), input.Item(), input.Version())); - valueOrError1 = MaybePlacebo::from(_out1.read()); - if valueOrError1.read().IsFailure() { - output = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return output.read(); - }; - let mut cb: Map, Sequence> = valueOrError1.read().Extract(); - output = MaybePlacebo::from(Rc::new(Result::, Rc>::Success { - value: Rc::new(ResolveAttributesOutput::ResolveAttributesOutput { - VirtualFields: vf.clone(), - CompoundBeacons: cb.clone() - }) - })); - return output.read(); - }; - return output.read(); - } - } -} -pub mod r#_AwsArnParsing_Compile { - pub use ::std::rc::Rc; - pub use ::dafny_runtime::string_utf16_of; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use crate::implementation_from_dafny::r#_AwsArnParsing_Compile::AwsKmsIdentifier::AwsKmsArnIdentifier; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::Error; - pub use ::dafny_runtime::DafnyInt; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use ::dafny_runtime::seq; - - pub struct _default {} - - impl _default { - pub fn ValidAwsKmsResource(resource: &Rc) -> bool { - resource.Valid() && (resource.resourceType().clone() == string_utf16_of("key") || resource.resourceType().clone() == string_utf16_of("alias")) - } - pub fn ValidAwsKmsArn(arn: &Rc) -> bool { - arn.Valid() && arn.service().clone() == string_utf16_of("kms") && _default::ValidAwsKmsResource(arn.resource()) - } - pub fn ParseAwsKmsRawResources(identifier: &Sequence) -> Rc>> { - let mut info: Sequence> = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Split::(identifier, &DafnyCharUTF16(47 as u16)); - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(info.get(&int!(0)) != string_utf16_of("key"), &string_utf16_of("Malformed raw key id: ").concat(identifier)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::() - } else { - if info.cardinality() == int!(1) { - _default::ParseAwsKmsResources(&string_utf16_of("key/").concat(identifier)) - } else { - _default::ParseAwsKmsResources(identifier) - } - } - } - pub fn ParseAwsKmsResources(identifier: &Sequence) -> Rc>> { - let mut info: Sequence> = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Split::(identifier, &DafnyCharUTF16(47 as u16)); - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(int!(1) < info.cardinality(), &string_utf16_of("Malformed resource: ").concat(identifier)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut resourceType: Sequence = info.get(&int!(0)); - let mut value: Sequence = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Join::(&info.drop(&int!(1)), &string_utf16_of("/")); - let mut resource: Rc = Rc::new(AwsResource::AwsResource { - resourceType: resourceType.clone(), - value: value.clone() - }); - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::ValidAwsKmsResource(&resource), &string_utf16_of("Malformed resource: ").concat(identifier)); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: resource.clone() - }) - } - } - } - pub fn ValidAmazonDynamodbResource(resource: &Rc) -> bool { - resource.Valid() && resource.resourceType().clone() == string_utf16_of("table") - } - pub fn ValidAmazonDynamodbArn(arn: &Rc) -> bool { - arn.Valid() && arn.service().clone() == string_utf16_of("dynamodb") && _default::ValidAmazonDynamodbResource(arn.resource()) - } - pub fn ParseAmazonDynamodbResources(identifier: &Sequence) -> Rc>> { - let mut info: Rc, Sequence)>> = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::r#_SplitOnce_q::(identifier, &DafnyCharUTF16(47 as u16)); - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(matches!((&info).as_ref(), Some{ .. }), &string_utf16_of("Malformed resource: ").concat(identifier)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut resourceType: Sequence = info.value().0.clone(); - let mut value: Sequence = info.value().1.clone(); - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_TableName(&value), &string_utf16_of("Table Name invalid: ").concat(identifier)); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut resource: Rc = Rc::new(AwsResource::AwsResource { - resourceType: resourceType.clone(), - value: value.clone() - }); - let mut valueOrError2: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::ValidAmazonDynamodbResource(&resource), &string_utf16_of("Malformed resource: ").concat(identifier)); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: resource.clone() - }) - } - } - } - } - pub fn ParseAwsKmsArn(identifier: &Sequence) -> Rc>> { - let mut components: Sequence> = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Split::(identifier, &DafnyCharUTF16(58 as u16)); - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(int!(6) == components.cardinality(), &string_utf16_of("Malformed arn: ").concat(identifier)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut valueOrError1: Rc>> = _default::ParseAwsKmsResources(&components.get(&int!(5))); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut resource: AwsKmsResource = valueOrError1.Extract(); - let mut arn: Rc = Rc::new(AwsArn::AwsArn { - arnLiteral: components.get(&int!(0)), - partition: components.get(&int!(1)), - service: components.get(&int!(2)), - region: components.get(&int!(3)), - account: components.get(&int!(4)), - resource: resource.clone() - }); - let mut valueOrError2: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::ValidAwsKmsArn(&arn), &string_utf16_of("Malformed Arn:").concat(identifier)); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: arn.clone() - }) - } - } - } - } - pub fn ParseAmazonDynamodbTableArn(identifier: &Sequence) -> Rc>> { - let mut components: Sequence> = crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Split::(identifier, &DafnyCharUTF16(58 as u16)); - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(int!(6) == components.cardinality(), &string_utf16_of("Malformed arn: ").concat(identifier)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut valueOrError1: Rc>> = _default::ParseAmazonDynamodbResources(&components.get(&int!(5))); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut resource: AmazonDynamodbResource = valueOrError1.Extract(); - let mut arn: Rc = Rc::new(AwsArn::AwsArn { - arnLiteral: components.get(&int!(0)), - partition: components.get(&int!(1)), - service: components.get(&int!(2)), - region: components.get(&int!(3)), - account: components.get(&int!(4)), - resource: resource.clone() - }); - let mut valueOrError2: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::ValidAmazonDynamodbArn(&arn), &string_utf16_of("Malformed Arn:").concat(identifier)); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: arn.clone() - }) - } - } - } - } - pub fn ParseAwsKmsIdentifier(identifier: &Sequence) -> Rc, Sequence>> { - if string_utf16_of("arn:") <= identifier.clone() { - let mut valueOrError0: Rc>> = _default::ParseAwsKmsArn(identifier); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut arn: AwsKmsArn = valueOrError0.Extract(); - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: Rc::new(AwsKmsIdentifier::AwsKmsArnIdentifier { - a: arn.clone() - }) - }) - } - } else { - let mut valueOrError1: Rc>> = _default::ParseAwsKmsRawResources(identifier); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut r: AwsKmsResource = valueOrError1.Extract(); - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: Rc::new(AwsKmsIdentifier::AwsKmsRawResourceIdentifier { - r: r.clone() - }) - }) - } - } - } - pub fn ParseAmazonDynamodbTableName(identifier: &Sequence) -> Rc, Sequence>> { - let mut valueOrError0: Rc>> = _default::ParseAmazonDynamodbTableArn(identifier); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut arn: AmazonDynamodbTableArn = valueOrError0.Extract(); - let mut tableArn: Rc = Rc::new(AmazonDynamodbTableName::AmazonDynamodbTableArn { - a: arn.clone() - }); - let mut tableName: Sequence = tableArn.GetTableName(); - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: tableName.clone() - }) - } - } - pub fn IsMultiRegionAwsKmsArn(arn: &AwsKmsArn) -> bool { - _default::IsMultiRegionAwsKmsResource(arn.resource()) - } - pub fn IsMultiRegionAwsKmsIdentifier(identifier: &Rc) -> bool { - let mut _source0: Rc = identifier.clone(); - if matches!((&_source0).as_ref(), AwsKmsArnIdentifier{ .. }) { - let mut r#___mcc_h0: AwsKmsArn = _source0.a().clone(); - let mut arn: AwsKmsArn = r#___mcc_h0.clone(); - _default::IsMultiRegionAwsKmsArn(&arn) - } else { - let mut r#___mcc_h1: AwsKmsResource = _source0.r().clone(); - let mut r: AwsKmsResource = r#___mcc_h1.clone(); - _default::IsMultiRegionAwsKmsResource(&r) - } - } - pub fn IsMultiRegionAwsKmsResource(resource: &AwsKmsResource) -> bool { - resource.resourceType().clone() == string_utf16_of("key") && string_utf16_of("mrk-") <= resource.value().clone() - } - pub fn GetRegion(identifier: &Rc) -> Rc>> { - let mut _source0: Rc = identifier.clone(); - if matches!((&_source0).as_ref(), AwsKmsArnIdentifier{ .. }) { - let mut r#___mcc_h0: AwsKmsArn = _source0.a().clone(); - let mut a: AwsKmsArn = r#___mcc_h0.clone(); - Rc::new(Option::>::Some { - value: a.region().clone() - }) - } else { - let mut r#___mcc_h1: AwsKmsResource = _source0.r().clone(); - Rc::new(Option::>::None {}) - } - } - pub fn IsAwsKmsIdentifierString(s: &Sequence) -> Rc, Sequence>> { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::UTF8::_default::IsASCIIString(s), &string_utf16_of("Not a valid ASCII string.")); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(int!(0) < s.cardinality() && s.cardinality() <= _default::MAX_AWS_KMS_IDENTIFIER_LENGTH(), &string_utf16_of("Identifier exceeds maximum length.")); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - _default::ParseAwsKmsIdentifier(s) - } - } - } - pub fn Error(s: &Sequence) -> Rc { - Rc::new(Error::AwsCryptographicMaterialProvidersException { - message: s.clone() - }) - } - pub fn ValidateDdbTableArn(tableArn: &Sequence) -> Rc>> { - let mut valueOrError0: Rc, Rc>> = _default::ParseAmazonDynamodbTableName(tableArn).MapFailure::>(&(Rc::new(move |x0: &Sequence| _default::Error(x0)) as Rc _>)); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::<()>() - } else { - let mut _v1: Sequence = valueOrError0.Extract(); - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::UTF8::_default::IsASCIIString(tableArn), &Rc::new(Error::AwsCryptographicMaterialProvidersException { - message: string_utf16_of("Table Arn is not ASCII") - })); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::<()>() - } else { - let mut valueOrError2: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_TableName(_default::ParseAmazonDynamodbTableName(tableArn).value()), &Rc::new(Error::AwsCryptographicMaterialProvidersException { - message: string_utf16_of("Table Name is too long") - })); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::<()>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::<(), Rc>::Success { - value: () - }) - } - } - } - } - pub fn MAX_AWS_KMS_IDENTIFIER_LENGTH() -> DafnyInt { - int!(2048) - } - } - - #[derive(PartialEq, Clone)] - pub enum AwsResource { - AwsResource { - resourceType: Sequence, - value: Sequence - } - } - - impl AwsResource { - pub fn Valid(self: &Rc) -> bool { - true && int!(0) < self.value().cardinality() - } - pub fn ToString(self: &Rc) -> Sequence { - self.resourceType().concat(&string_utf16_of("/")).concat(self.value()) - } - pub fn resourceType(&self) -> &Sequence { - match self { - AwsResource::AwsResource{resourceType, value, } => resourceType, - } - } - pub fn value(&self) -> &Sequence { - match self { - AwsResource::AwsResource{resourceType, value, } => value, - } - } - } - - impl Debug - for AwsResource { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for AwsResource { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AwsResource::AwsResource{resourceType, value, } => { - write!(_formatter, "AwsArnParsing_Compile.AwsResource.AwsResource(")?; - DafnyPrint::fmt_print(resourceType, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(value, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + KeySpec::ECC_NIST_P384{} => { - impl Eq - for AwsResource {} + }, + KeySpec::ECC_NIST_P521{} => { - impl Hash - for AwsResource { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AwsResource::AwsResource{resourceType, value, } => { - Hash::hash(resourceType, _state); - Hash::hash(value, _state) - }, - } - } - } - - impl Default - for AwsResource { - fn default() -> AwsResource { - AwsResource::AwsResource { - resourceType: Default::default(), - value: Default::default() - } - } - } - - impl AsRef - for &AwsResource { - fn as_ref(&self) -> Self { - self - } - } - - #[derive(PartialEq, Clone)] - pub enum AwsArn { - AwsArn { - arnLiteral: Sequence, - partition: Sequence, - service: Sequence, - region: Sequence, - account: Sequence, - resource: Rc - } - } - - impl AwsArn { - pub fn Valid(self: &Rc) -> bool { - self.arnLiteral().clone() == string_utf16_of("arn") && int!(0) < self.partition().cardinality() && int!(0) < self.service().cardinality() && int!(0) < self.region().cardinality() && int!(0) < self.account().cardinality() && self.resource().Valid() - } - pub fn ToString(self: &Rc) -> Sequence { - self.ToArnString(&Rc::new(Option::>::None {})) - } - pub fn ToArnString(self: &Rc, customRegion: &Rc>>) -> Sequence { - let mut _this = self.clone(); - let mut _r0 = customRegion.clone(); - 'TAIL_CALL_START: loop { - let customRegion = _r0; - let mut _source0: Rc>> = customRegion.clone(); - if matches!((&_source0).as_ref(), None{ .. }) { - let mut _in0: Rc = _this.clone(); - let mut _in1: Rc>> = Rc::new(Option::>::Some { - value: _this.region().clone() - }); - _this = _in0.clone(); - _r0 = _in1.clone(); - continue 'TAIL_CALL_START; - } else { - let mut r#___mcc_h0: Sequence = _source0.value().clone(); - let mut customRegion: Sequence = r#___mcc_h0.clone(); - return crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Join::(&seq![_this.arnLiteral().clone(), _this.partition().clone(), _this.service().clone(), customRegion.clone(), _this.account().clone(), _this.resource().ToString()], &string_utf16_of(":")); - } - } - } - pub fn arnLiteral(&self) -> &Sequence { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => arnLiteral, - } - } - pub fn partition(&self) -> &Sequence { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => partition, - } - } - pub fn service(&self) -> &Sequence { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => service, - } - } - pub fn region(&self) -> &Sequence { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => region, - } - } - pub fn account(&self) -> &Sequence { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => account, - } - } - pub fn resource(&self) -> &Rc { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => resource, - } - } - } - - impl Debug - for AwsArn { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for AwsArn { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => { - write!(_formatter, "AwsArnParsing_Compile.AwsArn.AwsArn(")?; - DafnyPrint::fmt_print(arnLiteral, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partition, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(service, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(region, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(account, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(resource, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for AwsArn {} - - impl Hash - for AwsArn { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AwsArn::AwsArn{arnLiteral, partition, service, region, account, resource, } => { - Hash::hash(arnLiteral, _state); - Hash::hash(partition, _state); - Hash::hash(service, _state); - Hash::hash(region, _state); - Hash::hash(account, _state); - Hash::hash(resource, _state) - }, - } - } - } - - impl Default - for AwsArn { - fn default() -> AwsArn { - AwsArn::AwsArn { - arnLiteral: Default::default(), - partition: Default::default(), - service: Default::default(), - region: Default::default(), - account: Default::default(), - resource: Default::default() - } - } - } - - impl AsRef - for &AwsArn { - fn as_ref(&self) -> Self { - self - } - } - - pub type AwsKmsArn = Rc; - - pub type AwsKmsResource = Rc; - - #[derive(PartialEq, Clone)] - pub enum AwsKmsIdentifier { - AwsKmsArnIdentifier { - a: AwsKmsArn - }, - AwsKmsRawResourceIdentifier { - r: AwsKmsResource - } - } - - impl AwsKmsIdentifier { - pub fn ToString(self: &Rc) -> Sequence { - let mut _source0: Rc = self.clone(); - if matches!((&_source0).as_ref(), AwsKmsArnIdentifier{ .. }) { - let mut r#___mcc_h0: AwsKmsArn = _source0.a().clone(); - let mut a: AwsKmsArn = r#___mcc_h0.clone(); - AwsArn::ToString(&a) - } else { - let mut r#___mcc_h1: AwsKmsResource = _source0.r().clone(); - let mut r: AwsKmsResource = r#___mcc_h1.clone(); - AwsResource::ToString(&r) - } - } - pub fn a(&self) -> &AwsKmsArn { - match self { - AwsKmsIdentifier::AwsKmsArnIdentifier{a, } => a, - AwsKmsIdentifier::AwsKmsRawResourceIdentifier{r, } => panic!("field does not exist on this variant"), - } - } - pub fn r(&self) -> &AwsKmsResource { - match self { - AwsKmsIdentifier::AwsKmsArnIdentifier{a, } => panic!("field does not exist on this variant"), - AwsKmsIdentifier::AwsKmsRawResourceIdentifier{r, } => r, - } - } - } - - impl Debug - for AwsKmsIdentifier { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for AwsKmsIdentifier { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AwsKmsIdentifier::AwsKmsArnIdentifier{a, } => { - write!(_formatter, "AwsArnParsing_Compile.AwsKmsIdentifier.AwsKmsArnIdentifier(")?; - DafnyPrint::fmt_print(a, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - AwsKmsIdentifier::AwsKmsRawResourceIdentifier{r, } => { - write!(_formatter, "AwsArnParsing_Compile.AwsKmsIdentifier.AwsKmsRawResourceIdentifier(")?; - DafnyPrint::fmt_print(r, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + }, + KeySpec::ECC_SECG_P256K1{} => { - impl Eq - for AwsKmsIdentifier {} + }, + KeySpec::SYMMETRIC_DEFAULT{} => { - impl Hash - for AwsKmsIdentifier { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AwsKmsIdentifier::AwsKmsArnIdentifier{a, } => { - Hash::hash(a, _state) - }, - AwsKmsIdentifier::AwsKmsRawResourceIdentifier{r, } => { - Hash::hash(r, _state) - }, - } - } - } + }, + KeySpec::HMAC_224{} => { - impl Default - for AwsKmsIdentifier { - fn default() -> AwsKmsIdentifier { - AwsKmsIdentifier::AwsKmsArnIdentifier { - a: Default::default() - } - } - } + }, + KeySpec::HMAC_256{} => { - impl AsRef - for &AwsKmsIdentifier { - fn as_ref(&self) -> Self { - self - } - } + }, + KeySpec::HMAC_384{} => { - pub type AmazonDynamodbTableArn = Rc; + }, + KeySpec::HMAC_512{} => { - pub type AmazonDynamodbResource = Rc; + }, + KeySpec::SM2{} => { - #[derive(PartialEq, Clone)] - pub enum AmazonDynamodbTableName { - AmazonDynamodbTableArn { - a: AmazonDynamodbTableArn - } - } + }, + } + } + } - impl AmazonDynamodbTableName { - pub fn GetTableName(self: &Rc) -> Sequence { - let mut _source0: Rc = self.clone(); - let mut r#___mcc_h0: AmazonDynamodbTableArn = _source0.a().clone(); - let mut a: AmazonDynamodbTableArn = r#___mcc_h0.clone(); - a.resource().value().clone() - } - pub fn a(&self) -> &AmazonDynamodbTableArn { - match self { - AmazonDynamodbTableName::AmazonDynamodbTableArn{a, } => a, - } - } - } + impl Default + for KeySpec { + fn default() -> KeySpec { + KeySpec::RSA_2048 {} + } + } - impl Debug - for AmazonDynamodbTableName { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } + impl AsRef + for KeySpec { + fn as_ref(&self) -> &Self { + self + } + } - impl DafnyPrint - for AmazonDynamodbTableName { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - AmazonDynamodbTableName::AmazonDynamodbTableArn{a, } => { - write!(_formatter, "AwsArnParsing_Compile.AmazonDynamodbTableName.AmazonDynamodbTableArn(")?; - DafnyPrint::fmt_print(a, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } + /// ../submodules/MaterialProviders/ComAmazonawsKms/Model/ComAmazonawsKmsTypes.dfy(534,3) + #[derive(PartialEq, Clone)] + pub enum KeyState { + Creating {}, + Enabled {}, + Disabled {}, + PendingDeletion {}, + PendingImport {}, + PendingReplicaDeletion {}, + Unavailable {}, + Updating {} + } - impl Eq - for AmazonDynamodbTableName {} + impl KeyState {} - impl Hash - for AmazonDynamodbTableName { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - AmazonDynamodbTableName::AmazonDynamodbTableArn{a, } => { - Hash::hash(a, _state) - }, - } - } - } + impl Debug + for KeyState { + fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { + DafnyPrint::fmt_print(self, f, true) + } + } - impl Default - for AmazonDynamodbTableName { - fn default() -> AmazonDynamodbTableName { - AmazonDynamodbTableName::AmazonDynamodbTableArn { - a: Default::default() - } - } - } + impl DafnyPrint + for KeyState { + fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { + match self { + KeyState::Creating{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Creating")?; + Ok(()) + }, + KeyState::Enabled{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Enabled")?; + Ok(()) + }, + KeyState::Disabled{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Disabled")?; + Ok(()) + }, + KeyState::PendingDeletion{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingDeletion")?; + Ok(()) + }, + KeyState::PendingImport{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingImport")?; + Ok(()) + }, + KeyState::PendingReplicaDeletion{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.PendingReplicaDeletion")?; + Ok(()) + }, + KeyState::Unavailable{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Unavailable")?; + Ok(()) + }, + KeyState::Updating{} => { + write!(_formatter, "software.amazon.cryptography.services.kms.internaldafny.types.KeyState.Updating")?; + Ok(()) + }, + } + } + } - impl AsRef - for &AmazonDynamodbTableName { - fn as_ref(&self) -> Self { - self - } - } + impl KeyState { + /// Enumerates all possible values of KeyState + pub fn _AllSingletonConstructors() -> SequenceIter> { + seq![Arc::new(KeyState::Creating {}), Arc::new(KeyState::Enabled {}), Arc::new(KeyState::Disabled {}), Arc::new(KeyState::PendingDeletion {}), Arc::new(KeyState::PendingImport {}), Arc::new(KeyState::PendingReplicaDeletion {}), Arc::new(KeyState::Unavailable {}), Arc::new(KeyState::Updating {})].iter() + } + } - pub type AwsKmsIdentifierString = Sequence; -} -pub mod r#_AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeNameList; - pub use ::dafny_runtime::Sequence; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use ::dafny_runtime::set; - pub use ::dafny_runtime::map; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::Version; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthenticateAction; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; - pub use ::dafny_runtime::MapBuilder; - pub use ::dafny_runtime::Set; - pub use ::dafny_runtime::SetBuilder; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::EncryptItemOutput; - pub use ::dafny_runtime::MaybePlacebo; - pub use ::dafny_runtime::rd; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::LegacyPolicy::FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride::FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::ParsedHeader; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; - pub use ::dafny_runtime::md; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::IStructuredEncryptionClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::DecryptItemOutput; - pub use ::dafny_runtime::DafnyInt; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride::FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue::B; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::StructuredEncryptionClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::PlaintextOverride; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::legacy::InternalLegacyOverride; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - - pub struct _default {} - - impl _default { - pub fn AllowedUnsigned(unauthenticatedAttributes: &Rc>, unauthenticatedPrefix: &Rc>>, attr: &Sequence) -> bool { - matches!(unauthenticatedAttributes.as_ref(), Some{ .. }) && unauthenticatedAttributes.value().contains(attr) || matches!(unauthenticatedPrefix.as_ref(), Some{ .. }) && unauthenticatedPrefix.value().clone() <= attr.clone() || crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ReservedPrefix() <= attr.clone() - } - pub fn ForwardCompatibleAttributeAction(attribute: &Sequence, action: &Rc, unauthenticatedAttributes: &Rc>, unauthenticatedPrefix: &Rc>>) -> bool { - if action.clone() == Rc::new(CryptoAction::DO_NOTHING {}) { - _default::AllowedUnsigned(unauthenticatedAttributes, unauthenticatedPrefix, attribute) - } else { - !_default::AllowedUnsigned(unauthenticatedAttributes, unauthenticatedPrefix, attribute) - } - } - pub fn CryptoActionString(action: &Rc) -> Sequence { - if action.clone() == Rc::new(CryptoAction::DO_NOTHING {}) { - string_utf16_of("DO_NOTHING") - } else { - if action.clone() == Rc::new(CryptoAction::SIGN_ONLY {}) { - string_utf16_of("SIGN_ONLY") - } else { - if action.clone() == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) { - string_utf16_of("SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT") - } else { - if action.clone() == Rc::new(CryptoAction::ENCRYPT_AND_SIGN {}) { - string_utf16_of("ENCRYPT_AND_SIGN") - } else { - string_utf16_of("internal error") - } - } - } - } - } - pub fn ExplainNotForwardCompatible(attr: &Sequence, action: &Rc, unauthenticatedAttributes: &Rc>, unauthenticatedPrefix: &Rc>>) -> Sequence { - string_utf16_of("Attribute ").concat(attr).concat(&string_utf16_of(" is configured as ")).concat(&_default::CryptoActionString(action)).concat(&string_utf16_of(" but ")).concat(&(if action.clone() == Rc::new(CryptoAction::DO_NOTHING {}) { - string_utf16_of("it must also be in unauthenticatedAttributes or begin with the unauthenticatedPrefix.") - } else { - if matches!(unauthenticatedAttributes.as_ref(), Some{ .. }) && unauthenticatedAttributes.value().contains(attr) { - string_utf16_of("it is also in unauthenticatedAttributes.") - } else { - if matches!(unauthenticatedPrefix.as_ref(), Some{ .. }) && unauthenticatedPrefix.value().clone() <= attr.clone() { - string_utf16_of("it also begins with the unauthenticatedPrefix.") - } else { - string_utf16_of("it also begins with the reserved prefix.") - } - } - })) - } - pub fn UnknownAttribute(config: &Rc, attr: &Sequence) -> bool { - _default::InSignatureScope(config, attr) && !config.attributeActionsOnEncrypt().contains(attr) - } - pub fn InSignatureScope(config: &Rc, attr: &Sequence) -> bool { - !_default::AllowedUnsigned(config.allowedUnsignedAttributes(), config.allowedUnsignedAttributePrefix(), attr) - } - pub fn EncodeName(k: &Sequence) -> Rc>> { - _default::DDBEncode(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ATTR_PREFIX().concat(k)) - } - pub fn MakeEncryptionContextForEncrypt(config: &Rc, item: &Map, Rc>) -> Rc, Rc>> { - if config.version().clone() == 2 { - _default::MakeEncryptionContextV2(config, item) - } else { - _default::MakeEncryptionContextV1(config, item) - } - } - pub fn MakeEncryptionContextForDecrypt(config: &Rc, header: &Sequence, item: &Map, Rc>) -> Rc, Rc>> { - if header.get(&int!(0)) == 2 { - _default::MakeEncryptionContextV2(config, item) - } else { - if header.get(&int!(0)) == 1 { - _default::MakeEncryptionContextV1(config, item) - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Header attribute has unexpected version number")) - }) - } - } - } - pub fn MakeEncryptionContextV1(config: &Rc, item: &Map, Rc>) -> Rc, Rc>> { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(item.contains(config.partitionKeyName()), &_default::DDBError(&string_utf16_of("Partition key ").concat(config.partitionKeyName()).concat(&string_utf16_of(" not found in Item to be encrypted or decrypted")))); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut valueOrError1: Rc>> = _default::DDBEncode(config.logicalTableName()); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut logicalTableName: ValidUTF8Bytes = valueOrError1.Extract(); - let mut valueOrError2: Rc>> = _default::DDBEncode(config.partitionKeyName()); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::>() - } else { - let mut partitionName: ValidUTF8Bytes = valueOrError2.Extract(); - let mut valueOrError3: Rc>> = _default::EncodeName(config.partitionKeyName()); - if valueOrError3.IsFailure() { - valueOrError3.PropagateFailure::>() - } else { - let mut partitionKeyName: ValidUTF8Bytes = valueOrError3.Extract(); - let mut partitionKeyValue: ValidUTF8Bytes = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::EncodeTerminal(&item.get(config.partitionKeyName())); - if matches!(config.sortKeyName().as_ref(), None{ .. }) { - let mut valueOrError4: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(set!{crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME(), crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME(), crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::SORT_NAME(), partitionKeyName.clone()}.cardinality() == int!(4), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Internal Error"))); - if valueOrError4.IsFailure() { - valueOrError4.PropagateFailure::>() - } else { - let mut ec: Map = map![(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME()) => (logicalTableName.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME()) => (partitionName.clone()), (partitionKeyName.clone()) => (partitionKeyValue.clone())]; - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: ec.clone() - }) - } - } else { - let mut valueOrError5: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(item.contains(config.sortKeyName().value()), &_default::DDBError(&string_utf16_of("Sort key ").concat(config.sortKeyName().value()).concat(&string_utf16_of(" not found in Item to be encrypted or decrypted")))); - if valueOrError5.IsFailure() { - valueOrError5.PropagateFailure::>() - } else { - let mut valueOrError6: Rc>> = _default::DDBEncode(config.sortKeyName().value()); - if valueOrError6.IsFailure() { - valueOrError6.PropagateFailure::>() - } else { - let mut sortName: ValidUTF8Bytes = valueOrError6.Extract(); - let mut valueOrError7: Rc>> = _default::EncodeName(config.sortKeyName().value()); - if valueOrError7.IsFailure() { - valueOrError7.PropagateFailure::>() - } else { - let mut sortKeyName: ValidUTF8Bytes = valueOrError7.Extract(); - let mut sortKeyValue: ValidUTF8Bytes = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::EncodeTerminal(&item.get(config.sortKeyName().value())); - let mut valueOrError8: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(set!{crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME(), crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME(), partitionKeyName.clone(), crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::SORT_NAME(), sortKeyName.clone()}.cardinality() == int!(5), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Internal Error"))); - if valueOrError8.IsFailure() { - valueOrError8.PropagateFailure::>() - } else { - let mut ec: Map = map![(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME()) => (logicalTableName.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME()) => (partitionName.clone()), (partitionKeyName.clone()) => (partitionKeyValue.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::SORT_NAME()) => (sortName.clone()), (sortKeyName.clone()) => (sortKeyValue.clone())]; - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: ec.clone() - }) - } - } - } - } - } - } - } - } - } - } - pub fn MakeEncryptionContextV2(config: &Rc, item: &Map, Rc>) -> Rc, Rc>> { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(item.contains(config.partitionKeyName()), &_default::DDBError(&string_utf16_of("Partition key ").concat(config.partitionKeyName()).concat(&string_utf16_of(" not found in Item to be encrypted or decrypted")))); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::>() - } else { - let mut valueOrError1: Rc>> = _default::DDBEncode(config.logicalTableName()); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::>() - } else { - let mut logicalTableName: ValidUTF8Bytes = valueOrError1.Extract(); - let mut valueOrError2: Rc>> = _default::DDBEncode(config.partitionKeyName()); - if valueOrError2.IsFailure() { - valueOrError2.PropagateFailure::>() - } else { - let mut partitionName: ValidUTF8Bytes = valueOrError2.Extract(); - let mut valueOrError3: Rc>> = _default::EncodeName(config.partitionKeyName()); - if valueOrError3.IsFailure() { - valueOrError3.PropagateFailure::>() - } else { - let mut partitionKeyName: ValidUTF8Bytes = valueOrError3.Extract(); - if matches!(config.sortKeyName().as_ref(), None{ .. }) { - let mut ec: Map = map![(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME()) => (logicalTableName.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME()) => (partitionName.clone())]; - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: ec.clone() - }) - } else { - let mut valueOrError4: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(item.contains(config.sortKeyName().value()), &_default::DDBError(&string_utf16_of("Sort key ").concat(config.sortKeyName().value()).concat(&string_utf16_of(" not found in Item to be encrypted or decrypted")))); - if valueOrError4.IsFailure() { - valueOrError4.PropagateFailure::>() - } else { - let mut valueOrError5: Rc>> = _default::DDBEncode(config.sortKeyName().value()); - if valueOrError5.IsFailure() { - valueOrError5.PropagateFailure::>() - } else { - let mut sortName: ValidUTF8Bytes = valueOrError5.Extract(); - let mut valueOrError6: Rc>> = _default::EncodeName(config.sortKeyName().value()); - if valueOrError6.IsFailure() { - valueOrError6.PropagateFailure::>() - } else { - let mut sortKeyName: ValidUTF8Bytes = valueOrError6.Extract(); - let mut ec: Map = map![(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::TABLE_NAME()) => (logicalTableName.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::PARTITION_NAME()) => (partitionName.clone()), (crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::SORT_NAME()) => (sortName.clone())]; - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: ec.clone() - }) - } - } - } - } - } - } - } - } - } - pub fn DDBError(s: &Sequence) -> Rc { - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: s.clone() - }) - } - pub fn DDBEncode(s: &Sequence) -> Rc>> { - crate::implementation_from_dafny::UTF8::_default::Encode(s).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - _default::DDBError(e) - }) - })) - } - pub fn IsVersion2Schema(actions: &Map, Rc>) -> bool { - actions.keys().iter().any(({ - let mut actions = actions.clone(); - Rc::new(move |r#__exists_var_0: &Sequence| -> bool{ - let mut x: Sequence = r#__exists_var_0.clone(); - actions.contains(&x) && actions.get(&x) == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) - }) - }).as_ref()) - } - pub fn VersionFromActions(actions: &Map, Rc>) -> Version { - if _default::IsVersion2Schema(actions) { - 2 - } else { - 1 - } - } - pub fn KeyActionFromVersion(version: Version) -> Rc { - if version == 2 { - Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) - } else { - Rc::new(CryptoAction::SIGN_ONLY {}) - } - } - pub fn KeyActionStringFromVersion(version: Version) -> Sequence { - if version == 2 { - string_utf16_of("SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT") - } else { - string_utf16_of("SIGN_ONLY") - } - } - pub fn GetCryptoSchemaActionInner(config: &Rc, attr: &Sequence) -> Rc, Sequence>> { - if config.attributeActionsOnEncrypt().contains(attr) { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: config.attributeActionsOnEncrypt().get(attr) - }) - } else { - if !_default::InSignatureScope(config, attr) { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Success { - value: Rc::new(CryptoAction::DO_NOTHING {}) - }) - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Sequence>::Failure { - error: string_utf16_of("No Crypto Action configured for attribute ").concat(attr) - }) - } - } - } - pub fn GetCryptoSchemaAction(config: &Rc, attr: &Sequence) -> Rc, Sequence>> { - _default::GetCryptoSchemaActionInner(config, attr) - } - pub fn GetAuthenticateSchemaAction(config: &Rc, attr: &Sequence) -> Rc { - if _default::InSignatureScope(config, attr) { - Rc::new(AuthenticateAction::SIGN {}) - } else { - Rc::new(AuthenticateAction::DO_NOT_SIGN {}) - } - } - pub fn ConfigToCryptoSchema(config: &Rc, item: &Map, Rc>) -> Rc, Rc>, Rc>> { - let mut schema: Map, Rc, Sequence>>> = (&({ - let mut item = item.clone(); - let mut config = config.clone(); - Rc::new(move || -> Map, Rc, Sequence>>>{ - let mut _coll0: MapBuilder, Rc, Sequence>>> = MapBuilder::, Rc, Sequence>>>::new(); - for r#__compr_0 in (&item).keys().iter().cloned() { - let mut k: Sequence = r#__compr_0.clone(); - if item.contains(&k) { - _coll0.add(&k, &_default::GetCryptoSchemaAction(&config, &k)) - } - } - _coll0.build() - }) - }))(); - let mut actionMapRes: Rc, Rc>, Sequence>> = crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::SimplifyMapValue::, Rc>(&schema); - crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::MapError::, Rc>>(&actionMapRes) - } - pub fn ConfigToAuthenticateSchema(config: &Rc, item: &Map, Rc>) -> Map, Rc> { - (&({ - let mut item = item.clone(); - let mut config = config.clone(); - Rc::new(move || -> Map, Rc>{ - let mut _coll0: MapBuilder, Rc> = MapBuilder::, Rc>::new(); - for r#__compr_0 in (&item).keys().iter().cloned() { - let mut k: Sequence = r#__compr_0.clone(); - if { - let x: Sequence = k.clone(); - crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&x) - } { - if item.contains(&k) { - _coll0.add(&k, &_default::GetAuthenticateSchemaAction(&config, &k)) - } - } - } - _coll0.build() - }) - }))() - } - pub fn IsPlaintextItem(ddbItem: &Map, Rc>) -> bool { - !ddbItem.contains(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderField()) && !ddbItem.contains(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::FooterField()) - } - pub fn ConvertCryptoSchemaToAttributeActions(config: &ValidConfig, schema: &Map, Rc>) -> Rc, Rc>, Rc>> { - let mut valueOrError0: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(schema.keys().iter().all(({ - let mut config = config.clone(); - let mut schema = schema.clone(); - Rc::new(move |r#__forall_var_0: &Sequence| -> bool{ - if true { - let mut k: Sequence = r#__forall_var_0.clone(); - if { - let x: Sequence = k.clone(); - crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&x) - } { - !schema.contains(&k) || _default::InSignatureScope(&config, &k) - } else { - true - } - } else { - true - } - }) - }).as_ref()), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Received unexpected Crypto Schema: mismatch with signature scope") - })); - if valueOrError0.IsFailure() { - valueOrError0.PropagateFailure::, Rc>>() - } else { - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(schema.keys().iter().all(({ - let mut schema = schema.clone(); - Rc::new(move |r#__forall_var_1: &Sequence| -> bool{ - let mut k: Sequence = r#__forall_var_1.clone(); - !schema.contains(&k) || crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&k) - }) - }).as_ref()), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Received unexpected Crypto Schema: Invalid attribute names") - })); - if valueOrError1.IsFailure() { - valueOrError1.PropagateFailure::, Rc>>() - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>, Rc>::Success { - value: schema.clone() - }) - } - } - } - pub fn GetItemNames(item: &Map, Rc>) -> Sequence { - let mut keys: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&item.keys(), &(Rc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::CharLess(x0, x1)) as Rc _>)); - if keys.cardinality() == int!(0) { - string_utf16_of("item is empty") - } else { - crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Join::(&keys, &string_utf16_of(" ")) - } - } - pub fn KeyMissingMsg(config: &Rc, item: &Map, Rc>, tag: &Sequence) -> Sequence { - string_utf16_of("On ").concat(tag).concat(&string_utf16_of(" : ")).concat(&(if !item.contains(config.partitionKeyName()) { - string_utf16_of("Partition key '").concat(config.partitionKeyName()).concat(&string_utf16_of("' does not exist in item. ")) - } else { - string_utf16_of("") - })).concat(&(if matches!(config.sortKeyName().as_ref(), Some{ .. }) && !item.contains(config.sortKeyName().value()) { - string_utf16_of("Sort key '").concat(config.sortKeyName().value()).concat(&string_utf16_of("' does not exist in item. ")) - } else { - string_utf16_of("") - })).concat(&string_utf16_of("Item contains these attributes : ")).concat(&_default::GetItemNames(item)).concat(&string_utf16_of(".")) - } - pub fn ContextAttrsExist(actions: &Map, Rc>, item: &Map, Rc>) -> bool { - actions.keys().iter().all(({ - let mut item = item.clone(); - let mut actions = actions.clone(); - Rc::new(move |r#__forall_var_0: &Sequence| -> bool{ - let mut k: Sequence = r#__forall_var_0.clone(); - !actions.contains(&k) || (!(actions.get(&k) == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {})) || item.contains(&k)) - }) - }).as_ref()) - } - pub fn ContextMissingMsg(actions: &Map, Rc>, item: &Map, Rc>) -> Sequence { - let mut s: Set> = (&({ - let mut item = item.clone(); - let mut actions = actions.clone(); - Rc::new(move || -> Set>{ - let mut _coll0: SetBuilder> = SetBuilder::>::new(); - for r#__compr_0 in (&actions).keys().iter().cloned() { - let mut k: Sequence = r#__compr_0.clone(); - if actions.contains(&k) && actions.get(&k) == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) && !item.contains(&k) { - _coll0.add(&k) - } - } - _coll0.build() - }) - }))(); - let mut missing: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&s, &(Rc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::CharLess(x0, x1)) as Rc _>)); - if missing.cardinality() == int!(0) { - string_utf16_of("No missing SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT attributes.") - } else { - if missing.cardinality() == int!(1) { - string_utf16_of("Attribute ").concat(&missing.get(&int!(0))).concat(&string_utf16_of(" was configured with SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT but was not present in item to be encrypted.")) - } else { - string_utf16_of("These attributes were configured with SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT but were not present in item to be encrypted.").concat(&crate::implementation_from_dafny::r#_StandardLibrary_Compile::_default::Join::(&missing, &string_utf16_of(","))) - } - } - } - pub fn EncryptItem(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.plaintextItem().contains(config.partitionKeyName()) && (matches!(config.sortKeyName().as_ref(), None{ .. }) || input.plaintextItem().contains(config.sortKeyName().value())), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&_default::KeyMissingMsg(config, input.plaintextItem(), &string_utf16_of("Encrypt"))))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError1 = MaybePlacebo::>>>::new(); - valueOrError1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(_default::ContextAttrsExist(config.attributeActionsOnEncrypt(), input.plaintextItem()), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&_default::ContextMissingMsg(config.attributeActionsOnEncrypt(), input.plaintextItem())))); - if valueOrError1.read().IsFailure() { - output = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return output.read(); - }; - if crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::MAX_ATTRIBUTE_COUNT() < input.plaintextItem().cardinality() { - let mut actCount: Sequence = crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_String_Compile::_default::Base10Int2String(&input.plaintextItem().cardinality()); - let mut maxCount: Sequence = crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_String_Compile::_default::Base10Int2String(&crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::MAX_ATTRIBUTE_COUNT()); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Item to encrypt had ").concat(&actCount).concat(&string_utf16_of(" attributes, but maximum allowed is ")).concat(&maxCount)) - })); - return output.read(); - }; - if matches!(config.internalLegacyOverride().as_ref(), Some{ .. }) && matches!((&rd!(config.internalLegacyOverride().value().clone()).policy().clone()).as_ref(), FORCE_LEGACY_ENCRYPT_ALLOW_LEGACY_DECRYPT{ .. }) { - let mut valueOrError2 = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(rd!(config.internalLegacyOverride().value()).EncryptItem(input)); - valueOrError2 = MaybePlacebo::from(_out0.read()); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut encryptItemOutput: Rc = valueOrError2.read().Extract(); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: encryptItemOutput.clone() - })); - return output.read(); - }; - if matches!(config.plaintextOverride().as_ref(), FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{ .. }) { - let mut passthroughOutput: Rc = Rc::new(EncryptItemOutput::EncryptItemOutput { - encryptedItem: input.plaintextItem().clone(), - parsedHeader: Rc::new(Option::>::None {}) - }); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: passthroughOutput.clone() - })); - return output.read(); - }; - let mut valueOrError3 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::ItemToStructured(input.plaintextItem()).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut plaintextStructure: Map, Rc> = valueOrError3.read().Extract(); - let mut valueOrError4 = MaybePlacebo::, Rc>>>::new(); - valueOrError4 = MaybePlacebo::from(_default::MakeEncryptionContextForEncrypt(config, &plaintextStructure)); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut context: Map = valueOrError4.read().Extract(); - let mut valueOrError5 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError5 = MaybePlacebo::from(_default::ConfigToCryptoSchema(config, input.plaintextItem()).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - let mut cryptoSchema: Map, Rc> = valueOrError5.read().Extract(); - let mut contextKeysX: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&context.keys(), &(Rc::new(move |x0: &u8,x1: &u8| crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ByteLess(x0.clone(), x1.clone())) as Rc _>)); - let mut contextKeys: Sequence = contextKeysX.clone(); - let mut reqCMMR = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(IAwsCryptographicMaterialProvidersClient::CreateRequiredEncryptionContextCMM(md!(config.cmpClient().clone()), &Rc::new(CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: Rc::new(Option::>::Some { - value: config.cmm().clone() - }), - keyring: Rc::new(Option::>::None {}), - requiredEncryptionContextKeys: contextKeys.clone() - }))); - reqCMMR = MaybePlacebo::from(_out1.read()); - let mut valueOrError6: Rc, Rc>> = reqCMMR.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError6.IsFailure() { - output = MaybePlacebo::from(valueOrError6.PropagateFailure::>()); - return output.read(); - }; - let mut reqCMM: Object = valueOrError6.Extract(); - let mut encryptRes = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(IStructuredEncryptionClient::EncryptStructure(md!(config.structuredEncryption().clone()), &Rc::new(EncryptStructureInput::EncryptStructureInput { - tableName: config.logicalTableName().clone(), - plaintextStructure: plaintextStructure.clone(), - cryptoSchema: cryptoSchema.clone(), - cmm: reqCMM.clone(), - algorithmSuiteId: config.algorithmSuiteId().clone(), - encryptionContext: Rc::new(Option::>::Some { - value: context.clone() - }) - }))); - encryptRes = MaybePlacebo::from(_out2.read()); - let mut valueOrError7 = MaybePlacebo::, Rc>>>::new(); - valueOrError7 = MaybePlacebo::from(encryptRes.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: e.clone() - }) - }) - }) - }))); - if valueOrError7.read().IsFailure() { - output = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return output.read(); - }; - let mut encryptVal: Rc = valueOrError7.read().Extract(); - let mut encryptedData: Map, Rc> = encryptVal.encryptedStructure().clone(); - let mut valueOrError8 = MaybePlacebo::>>>::new(); - valueOrError8 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>((&encryptedData).keys().iter().all(({ - let mut encryptedData = encryptedData.clone(); - Rc::new(move |r#__forall_var_0: &Sequence| -> bool{ - let mut k: Sequence = r#__forall_var_0.clone(); - !encryptedData.contains(&k) || crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&k) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("")))); - if valueOrError8.read().IsFailure() { - output = MaybePlacebo::from(valueOrError8.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError9 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError9 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::StructuredToItem(&encryptedData).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError9.read().IsFailure() { - output = MaybePlacebo::from(valueOrError9.read().PropagateFailure::>()); - return output.read(); - }; - let mut ddbKey: Map, Rc> = valueOrError9.read().Extract(); - let mut valueOrError10 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError10 = MaybePlacebo::from(_default::ConvertCryptoSchemaToAttributeActions(config, encryptVal.cryptoSchema())); - if valueOrError10.read().IsFailure() { - output = MaybePlacebo::from(valueOrError10.read().PropagateFailure::>()); - return output.read(); - }; - let mut parsedActions: Map, Rc> = valueOrError10.read().Extract(); - let mut selectorContextR: Rc, Rc>, Sequence>> = crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ConvertContextForSelector(encryptVal.parsedHeader().encryptionContext()); - let mut valueOrError11 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError11 = MaybePlacebo::from(selectorContextR.MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(e) - }) - }))); - if valueOrError11.read().IsFailure() { - output = MaybePlacebo::from(valueOrError11.read().PropagateFailure::>()); - return output.read(); - }; - let mut selectorContext: Map, Rc> = valueOrError11.read().Extract(); - let mut parsedHeader: Rc = Rc::new(ParsedHeader::ParsedHeader { - attributeActionsOnEncrypt: parsedActions.clone(), - algorithmSuiteId: encryptVal.parsedHeader().algorithmSuiteId().clone(), - encryptedDataKeys: encryptVal.parsedHeader().encryptedDataKeys().clone(), - storedEncryptionContext: encryptVal.parsedHeader().storedEncryptionContext().clone(), - encryptionContext: encryptVal.parsedHeader().encryptionContext().clone(), - selectorContext: selectorContext.clone() - }); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: Rc::new(EncryptItemOutput::EncryptItemOutput { - encryptedItem: ddbKey.clone(), - parsedHeader: Rc::new(Option::>::Some { - value: parsedHeader.clone() - }) - }) - })); - return output.read(); - } - pub fn DecryptItem(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut realCount: DafnyInt = (&({ - let mut input = input.clone(); - Rc::new(move || -> Set>{ - let mut _coll0: SetBuilder> = SetBuilder::>::new(); - for r#__compr_0 in input.encryptedItem().keys().iter().cloned() { - let mut k: Sequence = r#__compr_0.clone(); - if input.encryptedItem().contains(&k) && !(crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ReservedPrefix() <= k.clone()) { - _coll0.add(&k) - } - } - _coll0.build() - }) - }))().cardinality(); - if crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::MAX_ATTRIBUTE_COUNT() < realCount.clone() { - let mut actCount: Sequence = crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_String_Compile::_default::Base10Int2String(&realCount); - let mut maxCount: Sequence = crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_String_Compile::_default::Base10Int2String(&crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::MAX_ATTRIBUTE_COUNT()); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Item to decrypt had ").concat(&actCount).concat(&string_utf16_of(" attributes, but maximum allowed is ")).concat(&maxCount)) - })); - return output.read(); - }; - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.encryptedItem().contains(config.partitionKeyName()) && (matches!(config.sortKeyName().as_ref(), None{ .. }) || input.encryptedItem().contains(config.sortKeyName().value())), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: _default::KeyMissingMsg(config, input.encryptedItem(), &string_utf16_of("Decrypt")) - }))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - if matches!(config.internalLegacyOverride().as_ref(), Some{ .. }) && rd!(config.internalLegacyOverride().value()).IsLegacyInput(input) { - let mut valueOrError1 = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(rd!(config.internalLegacyOverride().value()).DecryptItem(input)); - valueOrError1 = MaybePlacebo::from(_out0.read()); - if valueOrError1.read().IsFailure() { - output = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return output.read(); - }; - let mut decryptItemOutput: Rc = valueOrError1.read().Extract(); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: decryptItemOutput.clone() - })); - return output.read(); - }; - if (matches!(config.plaintextOverride().as_ref(), FORCE_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{ .. }) || matches!(config.plaintextOverride().as_ref(), FORBID_PLAINTEXT_WRITE_ALLOW_PLAINTEXT_READ{ .. })) && _default::IsPlaintextItem(input.encryptedItem()) { - let mut passthroughOutput: Rc = Rc::new(DecryptItemOutput::DecryptItemOutput { - plaintextItem: input.encryptedItem().clone(), - parsedHeader: Rc::new(Option::>::None {}) - }); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: passthroughOutput.clone() - })); - return output.read(); - }; - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(!_default::IsPlaintextItem(input.encryptedItem()), &Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::DynamoDbItemEncryptorException { - message: string_utf16_of("Encrypted item missing expected header and footer attributes") - }))); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError3 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::ItemToStructured(input.encryptedItem()).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut encryptedStructure: Map, Rc> = valueOrError3.read().Extract(); - let mut valueOrError4 = MaybePlacebo::>>>::new(); - valueOrError4 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.encryptedItem().contains(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderField()), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Header field, \"aws_dbe_head\", not in item.")))); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut header: Rc = input.encryptedItem().get(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderField()); - let mut valueOrError5 = MaybePlacebo::>>>::new(); - valueOrError5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(matches!((&header).as_ref(), B{ .. }), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Header field, \"aws_dbe_head\", not binary")))); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError6 = MaybePlacebo::>>>::new(); - valueOrError6 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(int!(0) < header.B().cardinality(), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("Unexpected empty header field.")))); - if valueOrError6.read().IsFailure() { - output = MaybePlacebo::from(valueOrError6.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError7 = MaybePlacebo::, Rc>>>::new(); - valueOrError7 = MaybePlacebo::from(_default::MakeEncryptionContextForDecrypt(config, header.B(), &encryptedStructure)); - if valueOrError7.read().IsFailure() { - output = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return output.read(); - }; - let mut context: Map = valueOrError7.read().Extract(); - let mut authenticateSchema: Map, Rc> = _default::ConfigToAuthenticateSchema(config, input.encryptedItem()); - let mut reqCMMR = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(IAwsCryptographicMaterialProvidersClient::CreateRequiredEncryptionContextCMM(md!(config.cmpClient().clone()), &Rc::new(CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: Rc::new(Option::>::Some { - value: config.cmm().clone() - }), - keyring: Rc::new(Option::>::None {}), - requiredEncryptionContextKeys: crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&context.keys(), &(Rc::new(move |x0: &u8,x1: &u8| crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ByteLess(x0.clone(), x1.clone())) as Rc _>)) - }))); - reqCMMR = MaybePlacebo::from(_out1.read()); - let mut valueOrError8: Rc, Rc>> = reqCMMR.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError8.IsFailure() { - output = MaybePlacebo::from(valueOrError8.PropagateFailure::>()); - return output.read(); - }; - let mut reqCMM: Object = valueOrError8.Extract(); - let mut decryptRes = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(IStructuredEncryptionClient::DecryptStructure(md!(config.structuredEncryption().clone()), &Rc::new(DecryptStructureInput::DecryptStructureInput { - tableName: config.logicalTableName().clone(), - encryptedStructure: encryptedStructure.clone(), - authenticateSchema: authenticateSchema.clone(), - cmm: reqCMM.clone(), - encryptionContext: Rc::new(Option::>::Some { - value: context.clone() - }) - }))); - decryptRes = MaybePlacebo::from(_out2.read()); - let mut valueOrError9 = MaybePlacebo::, Rc>>>::new(); - valueOrError9 = MaybePlacebo::from(decryptRes.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: e.clone() - }) - }) - }) - }))); - if valueOrError9.read().IsFailure() { - output = MaybePlacebo::from(valueOrError9.read().PropagateFailure::>()); - return output.read(); - }; - let mut decryptVal: Rc = valueOrError9.read().Extract(); - let mut decryptedData: Map, Rc> = decryptVal.plaintextStructure().clone(); - let mut valueOrError10 = MaybePlacebo::>>>::new(); - valueOrError10 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>((&decryptedData).keys().iter().all(({ - let mut decryptedData = decryptedData.clone(); - Rc::new(move |r#__forall_var_0: &Sequence| -> bool{ - let mut k: Sequence = r#__forall_var_0.clone(); - !decryptedData.contains(&k) || crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::_default::IsValid_AttributeName(&k) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(&string_utf16_of("")))); - if valueOrError10.read().IsFailure() { - output = MaybePlacebo::from(valueOrError10.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError11 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError11 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DynamoToStruct_Compile::_default::StructuredToItem(&decryptedData).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::itemencryptor::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkDynamoDb { - AwsCryptographyDbEncryptionSdkDynamoDb: e.clone() - }) - }) - }))); - if valueOrError11.read().IsFailure() { - output = MaybePlacebo::from(valueOrError11.read().PropagateFailure::>()); - return output.read(); - }; - let mut ddbItem: Map, Rc> = valueOrError11.read().Extract(); - let mut schemaToConvert: Map, Rc> = decryptVal.cryptoSchema().clone(); - let mut valueOrError12 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError12 = MaybePlacebo::from(_default::ConvertCryptoSchemaToAttributeActions(config, &schemaToConvert)); - if valueOrError12.read().IsFailure() { - output = MaybePlacebo::from(valueOrError12.read().PropagateFailure::>()); - return output.read(); - }; - let mut parsedAuthActions: Map, Rc> = valueOrError12.read().Extract(); - let mut selectorContextR: Rc, Rc>, Sequence>> = crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::ConvertContextForSelector(decryptVal.parsedHeader().encryptionContext()); - let mut valueOrError13 = MaybePlacebo::, Rc>, Rc>>>::new(); - valueOrError13 = MaybePlacebo::from(selectorContextR.MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_DynamoDbItemEncryptorUtil_Compile::_default::E(e) - }) - }))); - if valueOrError13.read().IsFailure() { - output = MaybePlacebo::from(valueOrError13.read().PropagateFailure::>()); - return output.read(); - }; - let mut selectorContext: Map, Rc> = valueOrError13.read().Extract(); - let mut parsedHeader: Rc = Rc::new(ParsedHeader::ParsedHeader { - attributeActionsOnEncrypt: parsedAuthActions.clone(), - algorithmSuiteId: decryptVal.parsedHeader().algorithmSuiteId().clone(), - encryptedDataKeys: decryptVal.parsedHeader().encryptedDataKeys().clone(), - storedEncryptionContext: decryptVal.parsedHeader().storedEncryptionContext().clone(), - encryptionContext: decryptVal.parsedHeader().encryptionContext().clone(), - selectorContext: selectorContext.clone() - }); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: Rc::new(DecryptItemOutput::DecryptItemOutput { - plaintextItem: ddbItem.clone(), - parsedHeader: Rc::new(Option::>::Some { - value: parsedHeader.clone() - }) - }) - })); - return output.read(); - } - } - - #[derive(PartialEq, Clone)] - pub enum Config { - Config { - version: Version, - cmpClient: Object, - logicalTableName: Sequence, - partitionKeyName: Sequence, - sortKeyName: Rc>>, - cmm: Object, - attributeActionsOnEncrypt: Map, Rc>, - allowedUnsignedAttributes: Rc>, - allowedUnsignedAttributePrefix: Rc>>, - algorithmSuiteId: Rc>>, - structuredEncryption: Object, - plaintextOverride: Rc, - internalLegacyOverride: Rc>> - } - } - - impl Config { - pub fn version(&self) -> &Version { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => version, - } - } - pub fn cmpClient(&self) -> &Object { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => cmpClient, - } - } - pub fn logicalTableName(&self) -> &Sequence { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => logicalTableName, - } - } - pub fn partitionKeyName(&self) -> &Sequence { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => partitionKeyName, - } - } - pub fn sortKeyName(&self) -> &Rc>> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => sortKeyName, - } - } - pub fn cmm(&self) -> &Object { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => cmm, - } - } - pub fn attributeActionsOnEncrypt(&self) -> &Map, Rc> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => attributeActionsOnEncrypt, - } - } - pub fn allowedUnsignedAttributes(&self) -> &Rc> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => allowedUnsignedAttributes, - } - } - pub fn allowedUnsignedAttributePrefix(&self) -> &Rc>> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => allowedUnsignedAttributePrefix, - } - } - pub fn algorithmSuiteId(&self) -> &Rc>> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => algorithmSuiteId, - } - } - pub fn structuredEncryption(&self) -> &Object { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => structuredEncryption, - } - } - pub fn plaintextOverride(&self) -> &Rc { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => plaintextOverride, - } - } - pub fn internalLegacyOverride(&self) -> &Rc>> { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => internalLegacyOverride, - } - } - } - - impl Debug - for Config { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for Config { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => { - write!(_formatter, "AwsCryptographyDbEncryptionSdkDynamoDbItemEncryptorOperations_Compile.Config.Config(")?; - DafnyPrint::fmt_print(version, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmpClient, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(logicalTableName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(partitionKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(sortKeyName, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(cmm, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(attributeActionsOnEncrypt, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributes, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(allowedUnsignedAttributePrefix, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(algorithmSuiteId, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(structuredEncryption, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(plaintextOverride, _formatter, false)?; - write!(_formatter, ", ")?; - DafnyPrint::fmt_print(internalLegacyOverride, _formatter, false)?; - write!(_formatter, ")")?; - Ok(()) - }, - } - } - } - - impl Eq - for Config {} - - impl Hash - for Config { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Config::Config{version, cmpClient, logicalTableName, partitionKeyName, sortKeyName, cmm, attributeActionsOnEncrypt, allowedUnsignedAttributes, allowedUnsignedAttributePrefix, algorithmSuiteId, structuredEncryption, plaintextOverride, internalLegacyOverride, } => { - Hash::hash(version, _state); - Hash::hash(cmpClient, _state); - Hash::hash(logicalTableName, _state); - Hash::hash(partitionKeyName, _state); - Hash::hash(sortKeyName, _state); - Hash::hash(cmm, _state); - Hash::hash(attributeActionsOnEncrypt, _state); - Hash::hash(allowedUnsignedAttributes, _state); - Hash::hash(allowedUnsignedAttributePrefix, _state); - Hash::hash(algorithmSuiteId, _state); - Hash::hash(structuredEncryption, _state); - Hash::hash(plaintextOverride, _state); - Hash::hash(internalLegacyOverride, _state) - }, - } - } - } - - impl Default - for Config { - fn default() -> Config { - Config::Config { - version: Default::default(), - cmpClient: Default::default(), - logicalTableName: Default::default(), - partitionKeyName: Default::default(), - sortKeyName: Default::default(), - cmm: Default::default(), - attributeActionsOnEncrypt: Default::default(), - allowedUnsignedAttributes: Default::default(), - allowedUnsignedAttributePrefix: Default::default(), - algorithmSuiteId: Default::default(), - structuredEncryption: Default::default(), - plaintextOverride: Default::default(), - internalLegacyOverride: Default::default() - } - } - } - - impl AsRef - for &Config { - fn as_ref(&self) -> Self { - self - } - } - - pub type ValidConfig = Rc; -} -pub mod r#_AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput; - pub use ::dafny_runtime::MaybePlacebo; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::r#_DynamoDbEncryptionBranchKeyIdSupplier_Compile::DynamoDbEncryptionBranchKeyIdSupplier; - pub use ::dafny_runtime::upcast_object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IBranchKeyIdSupplier; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionOutput; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::GetEncryptedDataKeyDescriptionUnion::header; - pub use ::dafny_runtime::Map; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::software::amazon::cryptography::services::dynamodb::internaldafny::types::AttributeValue::B; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::PartialHeader; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::CMPEncryptedDataKeyList; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::EncryptedDataKeyDescription; - pub use ::dafny_runtime::seq; - pub use ::dafny_runtime::DafnyInt; - pub use ::dafny_runtime::integer_range; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::r#_AlgorithmSuites_Compile::AlgorithmSuite; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::dafny_runtime::SequenceIter; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - - pub struct _default {} - - impl _default { - pub fn CreateDynamoDbEncryptionBranchKeyIdSupplier(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut supplier = MaybePlacebo::>::new(); - let mut _nw0: Object = DynamoDbEncryptionBranchKeyIdSupplier::_allocate_object(); - DynamoDbEncryptionBranchKeyIdSupplier::_ctor(&_nw0, input.ddbKeyBranchKeyIdSupplier()); - supplier = MaybePlacebo::from(_nw0.clone()); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: Rc::new(CreateDynamoDbEncryptionBranchKeyIdSupplierOutput::CreateDynamoDbEncryptionBranchKeyIdSupplierOutput { - branchKeyIdSupplier: upcast_object::()(supplier.read()) - }) - })); - return output.read(); - } - pub fn GetEncryptedDataKeyDescription(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut header = MaybePlacebo::>::new(); - let mut _source0: Rc = input.input().clone(); - if matches!((&_source0).as_ref(), header{ .. }) { - let mut r#___mcc_h0: Sequence = _source0.header().clone(); - let mut headerItem: Sequence = r#___mcc_h0.clone(); - header = MaybePlacebo::from(headerItem.clone()); - } else { - let mut r#___mcc_h1: Map, Rc> = _source0.item().clone(); - let mut item: Map, Rc> = r#___mcc_h1.clone(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(item.contains(&string_utf16_of("aws_dbe_head")) && matches!((&item.get(&string_utf16_of("aws_dbe_head"))).as_ref(), B{ .. }), &crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(&string_utf16_of("Header not found in the DynamoDB item.")))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - header = MaybePlacebo::from(item.get(&string_utf16_of("aws_dbe_head")).B().clone()); - }; - let mut valueOrError1: Rc, Rc>> = crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::_default::PartialDeserialize(&header.read()).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyDbEncryptionSdkStructuredEncryption { - AwsCryptographyDbEncryptionSdkStructuredEncryption: e.clone() - }) - }) - })); - if valueOrError1.IsFailure() { - output = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); - return output.read(); - }; - let mut deserializedHeader: Rc = valueOrError1.Extract(); - let mut datakeys: CMPEncryptedDataKeyList = deserializedHeader.dataKeys().clone(); - let mut list: Sequence> = seq![] as Sequence>; - let mut _hi0: DafnyInt = datakeys.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut valueOrError2 = MaybePlacebo::, Rc>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::UTF8::_default::Decode(datakeys.get(&i).keyProviderId()).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(e) - }) - }))); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut extractedKeyProviderId: Sequence = valueOrError2.read().Extract(); - let mut extractedKeyProviderIdInfo: Rc>> = Rc::new(Option::>::None {}); - let mut expectedBranchKeyVersion: Rc>> = Rc::new(Option::>::None {}); - if string_utf16_of("aws-kms") <= extractedKeyProviderId.clone() { - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(deserializedHeader.flavor().clone() == 0 || deserializedHeader.flavor().clone() == 1, &crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(&string_utf16_of("Invalid format flavor.")))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut algorithmSuite = MaybePlacebo::::new(); - if deserializedHeader.flavor().clone() == 0 { - algorithmSuite = MaybePlacebo::from(crate::implementation_from_dafny::r#_AlgorithmSuites_Compile::_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_SYMSIG_HMAC_SHA384()); - } else { - algorithmSuite = MaybePlacebo::from(crate::implementation_from_dafny::r#_AlgorithmSuites_Compile::_default::DBE_ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384()); - }; - let mut valueOrError4 = MaybePlacebo::, Rc>>>::new(); - valueOrError4 = MaybePlacebo::from(crate::implementation_from_dafny::UTF8::_default::Decode(datakeys.get(&i).keyProviderInfo()).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(e) - }) - }))); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut maybeKeyProviderIdInfo: Sequence = valueOrError4.read().Extract(); - extractedKeyProviderIdInfo = Rc::new(Option::>::Some { - value: maybeKeyProviderIdInfo.clone() - }); - if extractedKeyProviderId.clone() == string_utf16_of("aws-kms-hierarchy") { - let mut valueOrError5 = MaybePlacebo::, Rc>>>::new(); - valueOrError5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_EdkWrapping_Compile::_default::GetProviderWrappedMaterial(datakeys.get(&i).ciphertext(), &algorithmSuite.read()).MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - }))); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - let mut providerWrappedMaterial: Sequence = valueOrError5.read().Extract(); - let mut EDK_CIPHERTEXT_BRANCH_KEY_VERSION_INDEX: DafnyInt = _default::SALT_LENGTH() + _default::IV_LENGTH(); - let mut EDK_CIPHERTEXT_VERSION_INDEX: DafnyInt = EDK_CIPHERTEXT_BRANCH_KEY_VERSION_INDEX.clone() + _default::VERSION_LENGTH(); - let mut valueOrError6 = MaybePlacebo::>>>::new(); - valueOrError6 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(EDK_CIPHERTEXT_BRANCH_KEY_VERSION_INDEX.clone() < EDK_CIPHERTEXT_VERSION_INDEX.clone(), &crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(&string_utf16_of("Wrong branch key version index.")))); - if valueOrError6.read().IsFailure() { - output = MaybePlacebo::from(valueOrError6.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError7 = MaybePlacebo::>>>::new(); - valueOrError7 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(providerWrappedMaterial.cardinality() >= EDK_CIPHERTEXT_VERSION_INDEX.clone(), &crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(&string_utf16_of("Incorrect ciphertext structure length.")))); - if valueOrError7.read().IsFailure() { - output = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return output.read(); - }; - let mut branchKeyVersionUuid: Sequence = providerWrappedMaterial.slice(&EDK_CIPHERTEXT_BRANCH_KEY_VERSION_INDEX, &EDK_CIPHERTEXT_VERSION_INDEX); - let mut valueOrError8 = MaybePlacebo::, Rc>>>::new(); - valueOrError8 = MaybePlacebo::from(crate::implementation_from_dafny::UUID::_default::FromByteArray(&branchKeyVersionUuid).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_DynamoDbEncryptionUtil_Compile::_default::E(e) - }) - }))); - if valueOrError8.read().IsFailure() { - output = MaybePlacebo::from(valueOrError8.read().PropagateFailure::>()); - return output.read(); - }; - let mut maybeBranchKeyVersion: Sequence = valueOrError8.read().Extract(); - expectedBranchKeyVersion = Rc::new(Option::>::Some { - value: maybeBranchKeyVersion.clone() - }); - } - }; - let mut singleDataKeyOutput: Rc = Rc::new(EncryptedDataKeyDescription::EncryptedDataKeyDescription { - keyProviderId: extractedKeyProviderId.clone(), - keyProviderInfo: extractedKeyProviderIdInfo.clone(), - branchKeyId: extractedKeyProviderIdInfo.clone(), - branchKeyVersion: expectedBranchKeyVersion.clone() - }); - list = list.concat(&seq![singleDataKeyOutput.clone()]); - } - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: Rc::new(GetEncryptedDataKeyDescriptionOutput::GetEncryptedDataKeyDescriptionOutput { - EncryptedDataKeyDescriptionOutput: list.clone() - }) - })); - return output.read(); - } - pub fn SALT_LENGTH() -> DafnyInt { - int!(16) - } - pub fn IV_LENGTH() -> DafnyInt { - int!(12) - } - pub fn VERSION_LENGTH() -> DafnyInt { - int!(16) - } - } - - #[derive(PartialEq, Clone)] - pub enum Config { - Config {} - } - - impl Config {} - - impl Debug - for Config { - fn fmt(&self, f: &mut Formatter) -> ::std::fmt::Result { - DafnyPrint::fmt_print(self, f, true) - } - } - - impl DafnyPrint - for Config { - fn fmt_print(&self, _formatter: &mut Formatter, _in_seq: bool) -> std::fmt::Result { - match self { - Config::Config{} => { - write!(_formatter, "AwsCryptographyDbEncryptionSdkDynamoDbOperations_Compile.Config.Config")?; - Ok(()) - }, - } - } - } + impl Eq + for KeyState {} - impl Config { - pub fn _AllSingletonConstructors() -> SequenceIter> { - seq![Rc::new(Config::Config {})].iter() - } - } + impl Hash + for KeyState { + fn hash<_H: Hasher>(&self, _state: &mut _H) { + match self { + KeyState::Creating{} => { - impl Eq - for Config {} + }, + KeyState::Enabled{} => { - impl Hash - for Config { - fn hash<_H: Hasher>(&self, _state: &mut _H) { - match self { - Config::Config{} => { + }, + KeyState::Disabled{} => { - }, - } - } - } + }, + KeyState::PendingDeletion{} => { - impl Default - for Config { - fn default() -> Config { - Config::Config {} - } - } + }, + KeyState::PendingImport{} => { - impl AsRef - for &Config { - fn as_ref(&self) -> Self { - self - } - } -} -pub mod r#_AwsCryptographyDbEncryptionSdkDynamoDbTransformsOperations_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::r#_DdbMiddlewareConfig_Compile::Config; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformInput; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::Error; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::PutItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::GetItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::UpdateItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchWriteItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactWriteItemsOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchGetItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ScanOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::QueryOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::TransactGetItemsOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::DeleteItemOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteStatementOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::BatchExecuteStatementOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionInputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ExecuteTransactionOutputTransformOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::dynamodb::transforms::internaldafny::types::ResolveAttributesOutput; - - pub struct _default {} - - impl _default { - pub fn PutItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_PutItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn PutItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_PutItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn GetItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_GetItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn GetItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_GetItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn UpdateItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_UpdateItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn UpdateItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_UpdateItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchWriteItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchWriteItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchWriteItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchWriteItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn TransactWriteItemsInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_TransactWriteItemsTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn TransactWriteItemsOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_TransactWriteItemsTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchGetItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchGetItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchGetItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchGetItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ScanInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ScanTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ScanOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ScanTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn QueryInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_QueryTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn QueryOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_QueryTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn TransactGetItemsInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_TransactGetItemsTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn TransactGetItemsOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_TransactGetItemsTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn DeleteItemInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DeleteItemTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn DeleteItemOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_DeleteItemTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ExecuteStatementInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ExecuteStatementTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ExecuteStatementOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ExecuteStatementTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchExecuteStatementInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchExecuteStatementTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn BatchExecuteStatementOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_BatchExecuteStatementTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ExecuteTransactionInputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ExecuteTransactionTransform_Compile::_default::Input(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ExecuteTransactionOutputTransform(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_ExecuteTransactionTransform_Compile::_default::Output(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn ResolveAttributes(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_AttributeResolver_Compile::_default::Resolve(config, input)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - } -} -pub mod r#_AwsCryptographyDbEncryptionSdkStructuredEncryptionOperations_Compile { - pub use ::std::rc::Rc; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ResolveAuthActionsOutput; - pub use ::dafny_runtime::MaybePlacebo; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Outcome; - pub use ::dafny_runtime::string_utf16_of; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::PartialHeader; - pub use ::dafny_runtime::itertools::Itertools; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthItem; - pub use ::dafny_runtime::Sequence; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::CanonCryptoItem; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::PathSegment; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::StructuredDataTerminal; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::None; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::AuthenticateAction; - pub use ::dafny_runtime::_System::nat; - pub use ::dafny_runtime::int; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoAction; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBEAlgorithmSuiteId; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteId; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Option::Some; - pub use ::dafny_runtime::Object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::ICryptographicMaterialsManager; - pub use ::dafny_runtime::Map; - pub use crate::implementation_from_dafny::UTF8::ValidUTF8Bytes; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::EncryptionMaterials; - pub use ::dafny_runtime::DafnyInt; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsOutput; - pub use ::dafny_runtime::md; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::GetEncryptionMaterialsInput; - pub use ::dafny_runtime::map; - pub use ::dafny_runtime::truncate; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::AlgorithmSuiteInfo; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::Key; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::CryptoItem; - pub use ::dafny_runtime::integer_range; - pub use ::dafny_runtime::DafnyCharUTF16; - pub use ::dafny_runtime::seq; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::EncryptPathStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IAwsCryptographicMaterialProvidersClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CreateRequiredEncryptionContextCMMInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::IKeyring; - pub use ::dafny_runtime::upcast_object; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::AtomicPrimitivesClient; - pub use crate::implementation_from_dafny::software::amazon::cryptography::primitives::internaldafny::types::IAwsCryptographicPrimitivesClient; - pub use ::dafny_runtime; - pub use crate::implementation_from_dafny::r#_StructuredEncryptionFooter_Compile::Footer; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::ParsedHeader; - pub use crate::implementation_from_dafny::r#_Wrappers_Compile::Result::Success; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::DecryptPathStructureOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsOutput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DecryptMaterialsInput; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DecryptionMaterials; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::SignatureAlgorithm::ECDSA; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::CommitmentPolicy; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::types::DBECommitmentPolicy; - pub use crate::implementation_from_dafny::software::amazon::cryptography::materialproviders::internaldafny::MaterialProvidersClient; - pub use ::std::fmt::Debug; - pub use ::std::fmt::Formatter; - pub use ::dafny_runtime::DafnyPrint; - pub use ::std::cmp::Eq; - pub use ::std::hash::Hash; - pub use ::std::hash::Hasher; - pub use ::std::default::Default; - pub use ::std::convert::AsRef; - - pub struct _default {} - - impl _default { - pub fn ResolveAuthActions(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::AuthListHasNoDuplicatesFromSet(input.authActions()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Duplicate Paths")))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError1: Rc, Rc>> = crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::_default::PartialDeserialize(input.headerBytes()); - if valueOrError1.IsFailure() { - output = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); - return output.read(); - }; - let mut head: Rc = valueOrError1.Extract(); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ValidString(input.tableName()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Bad Table Name")))); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(Itertools::unique(input.authActions().iter()).any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_0: Rc| -> bool{ - let mut x: Rc = r#__exists_var_0.clone(); - input.authActions().contains(&x) && x.key().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderPath() - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Header Required")))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError4 = MaybePlacebo::>>>::new(); - valueOrError4 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(Itertools::unique(input.authActions().iter()).any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_1: Rc| -> bool{ - let mut x: Rc = r#__exists_var_1.clone(); - input.authActions().contains(&x) && x.key().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::FooterPath() - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Footer Required")))); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError5 = MaybePlacebo::>, Rc>>>::new(); - valueOrError5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Canonize_Compile::_default::ForDecrypt(input.tableName(), input.authActions(), head.legend())); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - let mut canonData: Sequence> = valueOrError5.read().Extract(); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: Rc::new(ResolveAuthActionsOutput::ResolveAuthActionsOutput { - cryptoActions: crate::implementation_from_dafny::r#_Canonize_Compile::_default::UnCanon(&canonData) - }) - })); - return output.read(); - } - pub fn GetBinary(data: &Sequence>, path: &Sequence>) -> Rc, Rc>> { - let mut data: Rc>> = _default::FindAuth(data, path); - if matches!((&data).as_ref(), None{ .. }) { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("The field name ").concat(&crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::PathToString(path)).concat(&string_utf16_of(" is required."))) - }) - } else { - if data.value().data().typeId().clone() != crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::BYTES_TYPE_ID() { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::PathToString(path).concat(&string_utf16_of(" must be a binary Terminal."))) - }) - } else { - if data.value().action().clone() != Rc::new(AuthenticateAction::DO_NOT_SIGN {}) { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::PathToString(path).concat(&string_utf16_of(" must be DO_NOT_SIGN."))) - }) - } else { - Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: data.value().data().clone() - }) - } - } - } - } - pub fn SumValueSize(fields: &Sequence>) -> nat { - let mut _accumulator: nat = int!(0); - let mut _r0 = fields.clone(); - 'TAIL_CALL_START: loop { - let fields = _r0; - if fields.cardinality() == int!(0) { - return int!(0) + _accumulator.clone(); - } else { - if fields.get(&int!(0)).action().clone() == Rc::new(CryptoAction::ENCRYPT_AND_SIGN {}) { - _accumulator = _accumulator.clone() + fields.get(&int!(0)).data().value().cardinality(); - let mut _in0: Sequence> = fields.drop(&int!(1)); - _r0 = _in0.clone(); - continue 'TAIL_CALL_START; - } else { - let mut _in1: Sequence> = fields.drop(&int!(1)); - _r0 = _in1.clone(); - continue 'TAIL_CALL_START; - } - } - } - } - pub fn GetAlgorithmSuiteId(alg: &Rc>>) -> Rc { - if matches!(alg.as_ref(), Some{ .. }) { - Rc::new(AlgorithmSuiteId::DBE { - DBE: alg.value().clone() - }) - } else { - Rc::new(AlgorithmSuiteId::DBE { - DBE: Rc::new(DBEAlgorithmSuiteId::ALG_AES_256_GCM_HKDF_SHA512_COMMIT_KEY_ECDSA_P384_SYMSIG_HMAC_SHA384 {}) - }) - } - } - pub fn GetStructuredEncryptionMaterials(cmm: &Object, encryptionContext: &Rc>>, algorithmSuiteId: &Rc>>, encryptedTerminalDataNum: &nat, totalEncryptedTerminalValuesSize: &nat) -> Rc, Rc>> { - let mut ret = MaybePlacebo::, Rc>>>::new(); - let mut maxLength: DafnyInt = encryptedTerminalDataNum.clone() * int!(2) + totalEncryptedTerminalValuesSize.clone(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(maxLength.clone() < crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_UInt_Compile::_default::INT64_MAX_LIMIT(), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Encrypted Size too long.")))); - if valueOrError0.read().IsFailure() { - ret = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return ret.read(); - }; - let mut algId: Rc = _default::GetAlgorithmSuiteId(algorithmSuiteId); - let mut matR = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(ICryptographicMaterialsManager::GetEncryptionMaterials(md!(cmm.clone()), &Rc::new(GetEncryptionMaterialsInput::GetEncryptionMaterialsInput { - encryptionContext: encryptionContext.UnwrapOr(&map![]), - commitmentPolicy: _default::DBE_COMMITMENT_POLICY(), - algorithmSuiteId: Rc::new(Option::>::Some { - value: algId.clone() - }), - maxPlaintextLength: Rc::new(Option::::Some { - value: truncate!(maxLength.clone(), i64) - }), - requiredEncryptionContextKeys: Rc::new(Option::>::None {}) - }))); - matR = MaybePlacebo::from(_out0.read()); - let mut valueOrError1: Rc, Rc>> = matR.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError1.IsFailure() { - ret = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); - return ret.read(); - }; - let mut matOutput: Rc = valueOrError1.Extract(); - let mut mat: Rc = matOutput.encryptionMaterials().clone(); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_Materials_Compile::_default::EncryptionMaterialsHasPlaintextDataKey(&mat), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Encryption material has no key")))); - if valueOrError2.read().IsFailure() { - ret = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return ret.read(); - }; - let mut alg: Rc = mat.algorithmSuite().clone(); - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ValidSuite(&alg), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Invalid Algorithm Suite")))); - if valueOrError3.read().IsFailure() { - ret = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return ret.read(); - }; - let mut key: Key = mat.plaintextDataKey().value().clone(); - ret = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: mat.clone() - })); - return ret.read(); - } - pub fn GetV2EncryptionContextCanon(schema: &Sequence>) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut canonAttrs: Sequence> = crate::implementation_from_dafny::r#_Seq_Compile::_default::Filter::>(&({ - Rc::new(move |s: &Rc| -> bool{ - s.action().clone() == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) - }) - }), schema); - let mut contextAttrs: Sequence> = crate::implementation_from_dafny::r#_Seq_Compile::_default::Map::, Rc>(&({ - Rc::new(move |s: &Rc| -> Rc{ - Rc::new(CryptoItem::CryptoItem { - key: s.origKey().clone(), - data: s.data().clone(), - action: s.action().clone() - }) - }) - }), &canonAttrs); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(_default::GetV2EncryptionContext2(&contextAttrs)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn GetV2EncryptionContext(schema: &Sequence>) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut contextAttrs: Sequence> = crate::implementation_from_dafny::r#_Seq_Compile::_default::Filter::>(&({ - Rc::new(move |s: &Rc| -> bool{ - s.action().clone() == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) - }) - }), schema); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(_default::GetV2EncryptionContext2(&contextAttrs)); - output = MaybePlacebo::from(_out0.read()); - return output.read(); - } - pub fn Find(haystack: &Sequence>, needle: &Sequence>) -> Rc, Rc>> { - let mut _r0 = haystack.clone(); - let mut _r1 = needle.clone(); - 'TAIL_CALL_START: loop { - let haystack = _r0; - let needle = _r1; - if haystack.cardinality() == int!(0) { - return Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Not Found")) - }); - } else { - if haystack.get(&int!(0)).key().clone() == needle.clone() { - return Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: haystack.get(&int!(0)) - }); - } else { - let mut _in0: Sequence> = haystack.drop(&int!(1)); - let mut _in1: Sequence> = needle.clone(); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - continue 'TAIL_CALL_START; - } - } - } - } - pub fn FindAuth(haystack: &Sequence>, needle: &Sequence>) -> Rc>> { - let mut _r0 = haystack.clone(); - let mut _r1 = needle.clone(); - 'TAIL_CALL_START: loop { - let haystack = _r0; - let needle = _r1; - if haystack.cardinality() == int!(0) { - return Rc::new(Option::>::None {}); - } else { - if haystack.get(&int!(0)).key().clone() == needle.clone() { - return Rc::new(Option::>::Some { - value: haystack.get(&int!(0)) - }); - } else { - let mut _in0: Sequence> = haystack.drop(&int!(1)); - let mut _in1: Sequence> = needle.clone(); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - continue 'TAIL_CALL_START; - } - } - } - } - pub fn CountEncrypted(list: &Sequence>) -> nat { - let mut _accumulator: nat = int!(0); - let mut _r0 = list.clone(); - 'TAIL_CALL_START: loop { - let list = _r0; - if list.cardinality() == int!(0) { - return int!(0) + _accumulator.clone(); - } else { - if list.get(&int!(0)).action().clone() == Rc::new(CryptoAction::ENCRYPT_AND_SIGN {}) { - _accumulator = _accumulator.clone() + int!(1); - let mut _in0: Sequence> = list.drop(&int!(1)); - _r0 = _in0.clone(); - continue 'TAIL_CALL_START; - } else { - let mut _in1: Sequence> = list.drop(&int!(1)); - _r0 = _in1.clone(); - continue 'TAIL_CALL_START; - } - } - } - } - pub fn GetV2EncryptionContext2(fields: &Sequence>) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut fieldMap: Map>> = map![]; - let mut _hi0: DafnyInt = fields.cardinality(); - for i in integer_range(int!(0), _hi0.clone()) { - let mut keyVal: Sequence = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ATTR_PREFIX().concat(&crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::PathToString(fields.get(&i).key())); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::UTF8::_default::Encode(&keyVal).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(e) - }) - }))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut utf8Value: ValidUTF8Bytes = valueOrError0.read().Extract(); - if fieldMap.contains(&utf8Value) { - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Failure { - error: crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&keyVal.concat(&string_utf16_of(" appears twice in encryption context."))) - })); - return output.read(); - }; - fieldMap = fieldMap.update_index(&utf8Value, fields.get(&i).key()); - } - let mut keys: Sequence = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&fieldMap.keys(), &(Rc::new(move |x0: &u8,x1: &u8| crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ByteLess(x0.clone(), x1.clone())) as Rc _>)); - let mut newContext: Map = map![]; - let mut legend: Sequence = string_utf16_of(""); - let mut _hi1: DafnyInt = keys.cardinality(); - for i in integer_range(int!(0), _hi1.clone()) { - let mut fieldUtf8: ValidUTF8Bytes = keys.get(&i); - let mut fieldStr: Sequence> = fieldMap.get(&fieldUtf8); - let mut valueOrError1: Rc, Rc>> = _default::Find(fields, &fieldMap.get(&fieldUtf8)); - if valueOrError1.IsFailure() { - output = MaybePlacebo::from(valueOrError1.PropagateFailure::>()); - return output.read(); - }; - let mut item: Rc = valueOrError1.Extract(); - let mut attr: Rc = item.data().clone(); - let mut attrStr: ValidUTF8Bytes = seq![] as Sequence; - let mut legendChar = MaybePlacebo::::new(); - if attr.typeId().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::NULL() { - legendChar = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_LITERAL()); - attrStr = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::NULL_UTF8(); - } else { - if attr.typeId().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::STRING() { - legendChar = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_STRING()); - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::UTF8::_default::ValidUTF8Seq(attr.value()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Internal Error : string was not UTF8.")))); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - attrStr = attr.value().clone(); - let mut valueOrError3 = MaybePlacebo::, Sequence>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::UTF8::_default::Decode(&attrStr)); - if !(!valueOrError3.read().IsFailure()) { - panic!("Halt") - }; - let mut yy: Sequence = valueOrError3.read().Extract(); - } else { - if attr.typeId().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::NUMBER() { - legendChar = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_NUMBER()); - let mut valueOrError4 = MaybePlacebo::>>>::new(); - valueOrError4 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::UTF8::_default::ValidUTF8Seq(attr.value()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Internal Error : number was not UTF8.")))); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - attrStr = attr.value().clone(); - } else { - if attr.typeId().clone() == crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::BOOLEAN() { - legendChar = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_LITERAL()); - let mut valueOrError5 = MaybePlacebo::>>>::new(); - valueOrError5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(attr.value().cardinality() == int!(1), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Internal Error : boolean was not of length 1.")))); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - if attr.value().get(&int!(0)) == 0 { - attrStr = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::FALSE_UTF8(); - } else { - attrStr = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::TRUE_UTF8(); - } - } else { - legendChar = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_BINARY()); - attrStr = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::EncodeTerminal(&attr); - } - } - } - }; - newContext = newContext.update_index(&fieldUtf8, &attrStr); - legend = legend.concat(&seq![legendChar.read()]); - } - let mut valueOrError6 = MaybePlacebo::>>>::new(); - valueOrError6 = MaybePlacebo::from(crate::implementation_from_dafny::UTF8::_default::Encode(&legend).MapFailure::>(&({ - Rc::new(move |e: &Sequence| -> Rc{ - crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(e) - }) - }))); - if valueOrError6.read().IsFailure() { - output = MaybePlacebo::from(valueOrError6.read().PropagateFailure::>()); - return output.read(); - }; - let mut utf8Legend: ValidUTF8Bytes = valueOrError6.read().Extract(); - newContext = newContext.update_index(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::LEGEND_UTF8(), &utf8Legend); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: newContext.clone() - })); - return output.read(); - } - pub fn BuildCryptoMap2(keys: &Sequence>, plaintextStructure: &Map, Rc>, cryptoSchema: &Map, Rc>, acc: &Sequence>) -> Rc>, Rc>> { - let mut _r0 = keys.clone(); - let mut _r1 = plaintextStructure.clone(); - let mut _r2 = cryptoSchema.clone(); - let mut _r3 = acc.clone(); - 'TAIL_CALL_START: loop { - let keys = _r0; - let plaintextStructure = _r1; - let cryptoSchema = _r2; - let acc = _r3; - if keys.cardinality() == int!(0) { - return Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::>, Rc>::Success { - value: acc.clone() - }); - } else { - let mut key: Sequence = keys.get(&int!(0)); - let mut path: Sequence> = crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::StringToUniPath(&key); - let mut item: Rc = Rc::new(CryptoItem::CryptoItem { - key: path.clone(), - data: plaintextStructure.get(&key), - action: cryptoSchema.get(&key) - }); - let mut newAcc: Sequence> = acc.concat(&seq![item.clone()]); - let mut _in0: Sequence> = keys.drop(&int!(1)); - let mut _in1: Map, Rc> = plaintextStructure.clone(); - let mut _in2: Map, Rc> = cryptoSchema.clone(); - let mut _in3: Sequence> = newAcc.clone(); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - _r2 = _in2.clone(); - _r3 = _in3.clone(); - continue 'TAIL_CALL_START; - } - } - } - pub fn BuildCryptoMap(plaintextStructure: &Map, Rc>, cryptoSchema: &Map, Rc>) -> Rc>, Rc>> { - let mut keys: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&plaintextStructure.keys(), &(Rc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::CharLess(x0, x1)) as Rc _>)); - _default::BuildCryptoMap2(&keys, plaintextStructure, cryptoSchema, &(seq![] as Sequence>)) - } - pub fn BuildAuthMap2(keys: &Sequence>, plaintextStructure: &Map, Rc>, authSchema: &Map, Rc>, acc: &Sequence>) -> Rc>, Rc>> { - let mut _r0 = keys.clone(); - let mut _r1 = plaintextStructure.clone(); - let mut _r2 = authSchema.clone(); - let mut _r3 = acc.clone(); - 'TAIL_CALL_START: loop { - let keys = _r0; - let plaintextStructure = _r1; - let authSchema = _r2; - let acc = _r3; - if keys.cardinality() == int!(0) { - return Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::>, Rc>::Success { - value: acc.clone() - }); - } else { - let mut key: Sequence = keys.get(&int!(0)); - let mut path: Sequence> = crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::StringToUniPath(&key); - let mut item: Rc = Rc::new(AuthItem::AuthItem { - key: path.clone(), - data: plaintextStructure.get(&key), - action: authSchema.get(&key) - }); - let mut newAcc: Sequence> = acc.concat(&seq![item.clone()]); - let mut _in0: Sequence> = keys.drop(&int!(1)); - let mut _in1: Map, Rc> = plaintextStructure.clone(); - let mut _in2: Map, Rc> = authSchema.clone(); - let mut _in3: Sequence> = newAcc.clone(); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - _r2 = _in2.clone(); - _r3 = _in3.clone(); - continue 'TAIL_CALL_START; - } - } - } - pub fn BuildAuthMap(plaintextStructure: &Map, Rc>, authSchema: &Map, Rc>) -> Rc>, Rc>> { - let mut keys: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&plaintextStructure.keys(), &(Rc::new(move |x0: &DafnyCharUTF16,x1: &DafnyCharUTF16| crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::CharLess(x0, x1)) as Rc _>)); - _default::BuildAuthMap2(&keys, plaintextStructure, authSchema, &(seq![] as Sequence>)) - } - pub fn UnBuildCryptoMap(list: &Sequence>, dataSoFar: &Map, Rc>, actionsSoFar: &Map, Rc>) -> Rc, Rc>, Map, Rc>), Rc>> { - let mut _r0 = list.clone(); - let mut _r1 = dataSoFar.clone(); - let mut _r2 = actionsSoFar.clone(); - 'TAIL_CALL_START: loop { - let list = _r0; - let dataSoFar = _r1; - let actionsSoFar = _r2; - if list.cardinality() == int!(0) { - return Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::<(Map, Rc>, Map, Rc>), Rc>::Success { - value: ( - dataSoFar.clone(), - actionsSoFar.clone() - ) - }); - } else { - let mut valueOrError0: Rc, Rc>> = crate::implementation_from_dafny::r#_StructuredEncryptionPaths_Compile::_default::UniPathToString(list.get(&int!(0)).key()); - if valueOrError0.IsFailure() { - return valueOrError0.PropagateFailure::<(Map, Rc>, Map, Rc>)>(); - } else { - let mut key: Sequence = valueOrError0.Extract(); - let mut valueOrError1: Rc>> = crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(!dataSoFar.contains(&key), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Duplicate Key ").concat(&key))); - if valueOrError1.IsFailure() { - return valueOrError1.PropagateFailure::<(Map, Rc>, Map, Rc>)>(); - } else { - if crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::IsAuthAttr(list.get(&int!(0)).action()) { - let mut _in0: Sequence> = list.drop(&int!(1)); - let mut _in1: Map, Rc> = dataSoFar.update_index(&key, list.get(&int!(0)).data()); - let mut _in2: Map, Rc> = actionsSoFar.update_index(&key, list.get(&int!(0)).action()); - _r0 = _in0.clone(); - _r1 = _in1.clone(); - _r2 = _in2.clone(); - continue 'TAIL_CALL_START; - } else { - let mut _in3: Sequence> = list.drop(&int!(1)); - let mut _in4: Map, Rc> = dataSoFar.update_index(&key, list.get(&int!(0)).data()); - let mut _in5: Map, Rc> = actionsSoFar.clone(); - _r0 = _in3.clone(); - _r1 = _in4.clone(); - _r2 = _in5.clone(); - continue 'TAIL_CALL_START; - } - } - } - } - } - } - pub fn EncryptStructure(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(input.plaintextStructure().keys() == input.cryptoSchema().keys(), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Crypto Keys don't match.")))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError1 = MaybePlacebo::>, Rc>>>::new(); - valueOrError1 = MaybePlacebo::from(_default::BuildCryptoMap(input.plaintextStructure(), input.cryptoSchema())); - if valueOrError1.read().IsFailure() { - output = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return output.read(); - }; - let mut cryptoMap: Sequence> = valueOrError1.read().Extract(); - let mut pathInput: Rc = Rc::new(EncryptPathStructureInput::EncryptPathStructureInput { - tableName: input.tableName().clone(), - plaintextStructure: cryptoMap.clone(), - cmm: input.cmm().clone(), - algorithmSuiteId: input.algorithmSuiteId().clone(), - encryptionContext: input.encryptionContext().clone() - }); - let mut valueOrError2 = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(_default::EncryptPathStructure(config, &pathInput)); - valueOrError2 = MaybePlacebo::from(_out0.read()); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut pathOutput: Rc = valueOrError2.read().Extract(); - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(Itertools::unique(pathOutput.encryptedStructure().iter()).all(({ - let mut pathOutput = pathOutput.clone(); - Rc::new(move |r#__forall_var_0: Rc| -> bool{ - let mut k: Rc = r#__forall_var_0.clone(); - !pathOutput.encryptedStructure().contains(&k) || k.key().cardinality() == int!(1) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Internal Error")))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError4 = MaybePlacebo::, Rc>, Map, Rc>), Rc>>>::new(); - valueOrError4 = MaybePlacebo::from(_default::UnBuildCryptoMap(pathOutput.encryptedStructure(), &map![], &map![])); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut parts: (Map, Rc>, Map, Rc>) = valueOrError4.read().Extract(); - let mut plainOutput: Rc = Rc::new(EncryptStructureOutput::EncryptStructureOutput { - encryptedStructure: parts.0.clone(), - cryptoSchema: parts.1.clone(), - parsedHeader: pathOutput.parsedHeader().clone() - }); - output = MaybePlacebo::from(Rc::new(crate::implementation_from_dafny::r#_Wrappers_Compile::Result::, Rc>::Success { - value: plainOutput.clone() - })); - return output.read(); - } - pub fn EncryptPathStructure(config: &Rc, input: &Rc) -> Rc, Rc>> { - let mut output = MaybePlacebo::, Rc>>>::new(); - let mut valueOrError0 = MaybePlacebo::>>>::new(); - valueOrError0 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(matches!(input.encryptionContext().as_ref(), None{ .. }) || !input.encryptionContext().value().keys().iter().any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_0: &ValidUTF8Bytes| -> bool{ - let mut k: Sequence = r#__exists_var_0.clone(); - input.encryptionContext().value().contains(&k) && crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ReservedCryptoContextPrefixUTF8() <= input.encryptionContext().value().get(&k) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Encryption Context must not contain members beginning with ").concat(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ReservedCryptoContextPrefixString())))); - if valueOrError0.read().IsFailure() { - output = MaybePlacebo::from(valueOrError0.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError1 = MaybePlacebo::>>>::new(); - valueOrError1 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(Itertools::unique(input.plaintextStructure().iter()).any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_1: Rc| -> bool{ - let mut k: Rc = r#__exists_var_1.clone(); - input.plaintextStructure().contains(&k) && crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::IsAuthAttr(k.action()) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("At least one field in the Crypto Schema must be ENCRYPT_AND_SIGN, SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT or SIGN_ONLY.")))); - if valueOrError1.read().IsFailure() { - output = MaybePlacebo::from(valueOrError1.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError2 = MaybePlacebo::>>>::new(); - valueOrError2 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(!Itertools::unique(input.plaintextStructure().iter()).any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_2: Rc| -> bool{ - let mut x: Rc = r#__exists_var_2.clone(); - input.plaintextStructure().contains(&x) && crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderPaths().contains(x.key()) - }) - }).as_ref()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("The paths ").concat(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::HeaderField()).concat(&string_utf16_of(" and ")).concat(&crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::FooterField()).concat(&string_utf16_of(" are reserved."))))); - if valueOrError2.read().IsFailure() { - output = MaybePlacebo::from(valueOrError2.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError3 = MaybePlacebo::>>>::new(); - valueOrError3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::CryptoListHasNoDuplicatesFromSet(input.plaintextStructure()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Duplicate Paths")))); - if valueOrError3.read().IsFailure() { - output = MaybePlacebo::from(valueOrError3.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError4 = MaybePlacebo::>>>::new(); - valueOrError4 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ValidString(input.tableName()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Bad Table Name")))); - if valueOrError4.read().IsFailure() { - output = MaybePlacebo::from(valueOrError4.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError5 = MaybePlacebo::>, Rc>>>::new(); - valueOrError5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Canonize_Compile::_default::ForEncrypt(input.tableName(), input.plaintextStructure())); - if valueOrError5.read().IsFailure() { - output = MaybePlacebo::from(valueOrError5.read().PropagateFailure::>()); - return output.read(); - }; - let mut canonData: Sequence> = valueOrError5.read().Extract(); - let mut encryptionContext: Map = input.encryptionContext().UnwrapOr(&map![]); - let mut cmm: Object = input.cmm().clone(); - if Itertools::unique(input.plaintextStructure().iter()).any(({ - let mut input = input.clone(); - Rc::new(move |r#__exists_var_3: Rc| -> bool{ - let mut x: Rc = r#__exists_var_3.clone(); - input.plaintextStructure().contains(&x) && x.action().clone() == Rc::new(CryptoAction::SIGN_AND_INCLUDE_IN_ENCRYPTION_CONTEXT {}) - }) - }).as_ref()) { - let mut valueOrError6 = MaybePlacebo::, Rc>>>::new(); - let mut _out0 = MaybePlacebo::, Rc>>>::new(); - _out0 = MaybePlacebo::from(_default::GetV2EncryptionContext(input.plaintextStructure())); - valueOrError6 = MaybePlacebo::from(_out0.read()); - if valueOrError6.read().IsFailure() { - output = MaybePlacebo::from(valueOrError6.read().PropagateFailure::>()); - return output.read(); - }; - let mut newEncryptionContext: Map = valueOrError6.read().Extract(); - if newEncryptionContext.cardinality() != int!(0) { - let mut valueOrError7 = MaybePlacebo::>>>::new(); - valueOrError7 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(encryptionContext.keys().disjoint(&newEncryptionContext.keys()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Internal Error - Structured Encryption encryption context overlaps with Item Encryptor encryption context.")))); - if valueOrError7.read().IsFailure() { - output = MaybePlacebo::from(valueOrError7.read().PropagateFailure::>()); - return output.read(); - }; - encryptionContext = encryptionContext.merge(&newEncryptionContext); - let mut contextKeysX: Sequence> = crate::implementation_from_dafny::SortedSets::_default::SetToOrderedSequence2::(&newEncryptionContext.keys(), &(Rc::new(move |x0: &u8,x1: &u8| crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ByteLess(x0.clone(), x1.clone())) as Rc _>)); - let mut contextKeys: Sequence = contextKeysX.clone(); - let mut cmmR = MaybePlacebo::, Rc>>>::new(); - let mut _out1 = MaybePlacebo::, Rc>>>::new(); - _out1 = MaybePlacebo::from(IAwsCryptographicMaterialProvidersClient::CreateRequiredEncryptionContextCMM(md!(config.materialProviders().clone()), &Rc::new(CreateRequiredEncryptionContextCMMInput::CreateRequiredEncryptionContextCMMInput { - underlyingCMM: Rc::new(Option::>::Some { - value: input.cmm().clone() - }), - keyring: Rc::new(Option::>::None {}), - requiredEncryptionContextKeys: contextKeys.clone() - }))); - cmmR = MaybePlacebo::from(_out1.read()); - let mut valueOrError8: Rc, Rc>> = cmmR.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyMaterialProviders { - AwsCryptographyMaterialProviders: e.clone() - }) - }) - })); - if valueOrError8.IsFailure() { - output = MaybePlacebo::from(valueOrError8.PropagateFailure::>()); - return output.read(); - }; - cmm = valueOrError8.Extract(); - } - }; - let mut valueOrError9 = MaybePlacebo::, Rc>>>::new(); - let mut _out2 = MaybePlacebo::, Rc>>>::new(); - _out2 = MaybePlacebo::from(_default::GetStructuredEncryptionMaterials(&cmm, &Rc::new(Option::>::Some { - value: encryptionContext.clone() - }), input.algorithmSuiteId(), &_default::CountEncrypted(&canonData), &_default::SumValueSize(&canonData))); - valueOrError9 = MaybePlacebo::from(_out2.read()); - if valueOrError9.read().IsFailure() { - output = MaybePlacebo::from(valueOrError9.read().PropagateFailure::>()); - return output.read(); - }; - let mut mat: Rc = valueOrError9.read().Extract(); - let mut key: Key = mat.plaintextDataKey().value().clone(); - let mut alg: Rc = mat.algorithmSuite().clone(); - let mut valueOrError10 = MaybePlacebo::>>>::new(); - valueOrError10 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::_default::ValidEncryptionContext(mat.encryptionContext()), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Bad encryption context")))); - if valueOrError10.read().IsFailure() { - output = MaybePlacebo::from(valueOrError10.read().PropagateFailure::>()); - return output.read(); - }; - let mut randBytes = MaybePlacebo::, Rc>>>::new(); - let mut _out3 = MaybePlacebo::, Rc>>>::new(); - _out3 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Random_Compile::_default::GenerateBytes(truncate!(crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::MSGID_LEN(), i32))); - randBytes = MaybePlacebo::from(_out3.read()); - let mut valueOrError11 = MaybePlacebo::, Rc>>>::new(); - valueOrError11 = MaybePlacebo::from(randBytes.read().MapFailure::>(&({ - Rc::new(move |e: &Rc| -> Rc{ - Rc::new(crate::implementation_from_dafny::software::amazon::cryptography::dbencryptionsdk::structuredencryption::internaldafny::types::Error::AwsCryptographyPrimitives { - AwsCryptographyPrimitives: e.clone() - }) - }) - }))); - if valueOrError11.read().IsFailure() { - output = MaybePlacebo::from(valueOrError11.read().PropagateFailure::>()); - return output.read(); - }; - let mut msgID: Sequence = valueOrError11.read().Extract(); - let mut valueOrError12: Rc, Rc>> = crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::_default::Create(input.tableName(), &canonData, &msgID, &mat); - if valueOrError12.IsFailure() { - output = MaybePlacebo::from(valueOrError12.PropagateFailure::>()); - return output.read(); - }; - let mut head: Rc = valueOrError12.Extract(); - let mut valueOrError13 = MaybePlacebo::>>>::new(); - let mut _out4 = MaybePlacebo::>>>::new(); - _out4 = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionCrypt_Compile::_default::GetCommitKey(config.primitives(), &alg, &key, head.msgID())); - valueOrError13 = MaybePlacebo::from(_out4.read()); - if valueOrError13.read().IsFailure() { - output = MaybePlacebo::from(valueOrError13.read().PropagateFailure::>()); - return output.read(); - }; - let mut commitKey: Key = valueOrError13.read().Extract(); - let mut valueOrError14 = MaybePlacebo::, Rc>>>::new(); - valueOrError14 = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionHeader_Compile::_default::Serialize(&upcast_object::()(config.primitives().clone()), &alg, &commitKey, &head)); - if valueOrError14.read().IsFailure() { - output = MaybePlacebo::from(valueOrError14.read().PropagateFailure::>()); - return output.read(); - }; - let mut headerSerialized: Sequence = valueOrError14.read().Extract(); - let mut headerAttribute: Rc = crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::ValueToData(&headerSerialized, &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::BYTES_TYPE_ID()); - let mut valueOrError15 = MaybePlacebo::>>>::new(); - valueOrError15 = MaybePlacebo::from(crate::implementation_from_dafny::r#_Wrappers_Compile::_default::Need::>(canonData.cardinality() < dafny_runtime::euclidian_division(crate::implementation_from_dafny::r#_StandardLibrary_Compile::r#_UInt_Compile::_default::UINT32_LIMIT(), int!(3)), &crate::implementation_from_dafny::r#_StructuredEncryptionUtil_Compile::_default::E(&string_utf16_of("Too many encrypted fields")))); - if valueOrError15.read().IsFailure() { - output = MaybePlacebo::from(valueOrError15.read().PropagateFailure::>()); - return output.read(); - }; - let mut valueOrError16 = MaybePlacebo::>, Rc>>>::new(); - let mut _out5 = MaybePlacebo::>, Rc>>>::new(); - _out5 = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionCrypt_Compile::_default::Encrypt(config.primitives(), &alg, &key, &head, &canonData)); - valueOrError16 = MaybePlacebo::from(_out5.read()); - if valueOrError16.read().IsFailure() { - output = MaybePlacebo::from(valueOrError16.read().PropagateFailure::>()); - return output.read(); - }; - let mut encryptedItems: Sequence> = valueOrError16.read().Extract(); - let mut smallResult: Sequence> = crate::implementation_from_dafny::r#_Canonize_Compile::_default::UnCanonEncrypt(&encryptedItems); - let mut valueOrError17 = MaybePlacebo::, Rc>>>::new(); - let mut _out6 = MaybePlacebo::, Rc>>>::new(); - _out6 = MaybePlacebo::from(crate::implementation_from_dafny::r#_StructuredEncryptionFooter_Compile::_default::CreateFooter(config.primitives(), &mat, &encryptedItems, &headerSerialized)); - valueOrError17 = MaybePlacebo::from(_out6.read()); - if valueOrError17.read().IsFailure() { - output = MaybePlacebo::from(valueOrError17.read().PropagateFailure::>()); - return output.read(); - }; - let mut footer: Rc